last executing test programs: 3.321186394s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000060018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000080), &(0x7f00000003c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x9) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 3.256153884s ago: executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x74}, {}, {}, {0x6}]}) 2.561595182s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f00000003c0)=ANY=[@ANYRES32], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, 0x0}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x4, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.127725309s ago: executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x93}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) openat$cgroup_freezer_state(r2, &(0x7f0000000040), 0x2, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000380)) 2.034624944s ago: executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x1a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x0, 0xfffffffffffffffd}, 0x10) 1.894878226s ago: executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x4, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000040)={r3, &(0x7f00000007c0), 0x20000004}, 0x20) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x23) 1.862721971s ago: executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{}, {0x74}, {}, {}, {0x6}]}) 1.642213145s ago: executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x22a200, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000300)='ext4_fc_commit_start\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x58}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff014}, {0x6}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000903000000080000000000000105000000080000000000000000000003000000000200000002000000000000000000000003000000"], 0x0, 0x66}, 0x20) 1.631520866s ago: executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000b00), 0x0}, 0x20) r0 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1a, 0x4, 0x2, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) 1.309657386s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={&(0x7f0000000080), 0x10, &(0x7f0000004340)=[{0x0}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) 804.813335ms ago: executing program 1: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 773.3051ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x8}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x54}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 748.668643ms ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 742.672334ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x0, 0x200000}}, 0x10, 0x0}, 0x0) 585.528169ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x4}, 0x48) 568.936222ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x220104, 0xb, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) 521.858309ms ago: executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0xa8}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 500.367033ms ago: executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9"], &(0x7f0000281ffc)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0x1f, 0x0, &(0x7f0000000240)="5cdd3086ddff0066b3c9bbac88a8862c00dffd0013dd000000000000000081", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800000c000000638af8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018240000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000008000020850000009400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002024207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 438.658302ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x5, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0xfdef) 354.421575ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_ext_rm_leaf\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 337.188508ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) 315.686031ms ago: executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x22a200, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000300)='ext4_fc_commit_start\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x58}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff014}, {0x6}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c00000002000000000000000000000903000000080000000000000105000000080000000000000000000003000000000200000002000000000000000000000003000000"], 0x0, 0x66}, 0x20) 157.927545ms ago: executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r3}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) 137.821178ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r0) 82.865067ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)=r1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="30a0", 0x2}], 0x1}, 0x4040001) recvmsg$unix(r2, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) recvmsg$unix(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/109, 0x6d}], 0x1}, 0x0) 79.407438ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001001000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x0, 0x200000}}, 0x10, 0x0}, 0x0) 37.752414ms ago: executing program 3: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x1a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x0, 0xfffffffffffffffd}, 0x10) 29.062415ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000002c00)="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", 0xd4d}], 0x1}, 0x0) 20.498077ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x4}, 0x48) 0s ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b40)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xff4d}, 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='ext4_da_update_reserve_space\x00', r4}, 0x10) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r9, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_type(r3, &(0x7f0000000180), 0x2000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.78' (ED25519) to the list of known hosts. 2024/06/15 05:28:27 fuzzer started 2024/06/15 05:28:27 dialing manager at 10.128.0.163:30010 [ 20.714427][ T30] audit: type=1400 audit(1718429307.695:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.735038][ T30] audit: type=1400 audit(1718429307.695:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.778140][ T30] audit: type=1400 audit(1718429307.765:68): avc: denied { integrity } for pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.781749][ T291] cgroup: Unknown subsys name 'net' [ 20.800850][ T30] audit: type=1400 audit(1718429307.765:69): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.828037][ T30] audit: type=1400 audit(1718429307.765:70): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.828390][ T291] cgroup: Unknown subsys name 'devices' [ 20.854776][ T30] audit: type=1400 audit(1718429307.795:71): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.861040][ T293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.874991][ T30] audit: type=1400 audit(1718429307.845:72): avc: denied { setattr } for pid=295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.908255][ T30] audit: type=1400 audit(1718429307.875:73): avc: denied { mounton } for pid=296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.928867][ T292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.933145][ T30] audit: type=1400 audit(1718429307.875:74): avc: denied { mount } for pid=296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.964294][ T30] audit: type=1400 audit(1718429307.875:75): avc: denied { relabelto } for pid=293 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.088923][ T291] cgroup: Unknown subsys name 'hugetlb' [ 21.094397][ T291] cgroup: Unknown subsys name 'rlimit' 2024/06/15 05:28:28 starting 5 executor processes [ 21.551946][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.558932][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.566165][ T310] device bridge_slave_0 entered promiscuous mode [ 21.572933][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.579975][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.587245][ T310] device bridge_slave_1 entered promiscuous mode [ 21.593661][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.600706][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.607890][ T308] device bridge_slave_0 entered promiscuous mode [ 21.615371][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.622266][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.629454][ T308] device bridge_slave_1 entered promiscuous mode [ 21.683176][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.690146][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.697510][ T309] device bridge_slave_0 entered promiscuous mode [ 21.705108][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.712002][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.719110][ T309] device bridge_slave_1 entered promiscuous mode [ 21.790161][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.797133][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.804107][ T311] device bridge_slave_0 entered promiscuous mode [ 21.810739][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.817602][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.824694][ T312] device bridge_slave_0 entered promiscuous mode [ 21.841045][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.847922][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.855009][ T311] device bridge_slave_1 entered promiscuous mode [ 21.861422][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.868281][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.875476][ T312] device bridge_slave_1 entered promiscuous mode [ 21.955829][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.962697][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.969802][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.976557][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.023218][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.030103][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.037197][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.043965][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.082341][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.089207][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.096303][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.103193][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.114816][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.121772][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.128843][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.135633][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.150691][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.157729][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.164652][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.171850][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.178934][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.185856][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.193157][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.200113][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.207606][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.214777][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.241093][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.249073][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.255890][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.263690][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.271642][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.278481][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.307871][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.315252][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.323100][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.337454][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.345355][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.352128][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.359480][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.367709][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.374528][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.382281][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.390063][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.411739][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.419986][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.427877][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.435552][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.443783][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.450635][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.457765][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.465565][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.472329][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.479662][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.487651][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.494574][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.501768][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.509682][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.516493][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.533278][ T308] device veth0_vlan entered promiscuous mode [ 22.552268][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.560525][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.568924][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.577571][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.584732][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.592735][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.601070][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.608925][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.616086][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.627026][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.635050][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.641903][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.649271][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.657480][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.664316][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.671549][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.679296][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.687145][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.695047][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.702940][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.710916][ T312] device veth0_vlan entered promiscuous mode [ 22.722613][ T308] device veth1_macvtap entered promiscuous mode [ 22.729183][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.736997][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.744894][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.752984][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.760757][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.768631][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.776805][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.784614][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.795718][ T310] device veth0_vlan entered promiscuous mode [ 22.807018][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.815227][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.823701][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.831560][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.839825][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.847393][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.858957][ T312] device veth1_macvtap entered promiscuous mode [ 22.869041][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.877390][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.885360][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.900390][ T310] device veth1_macvtap entered promiscuous mode [ 22.911452][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.919575][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.927846][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.935732][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.943867][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.951438][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.959440][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.969505][ T311] device veth0_vlan entered promiscuous mode [ 22.976866][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.984607][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.992919][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.001013][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.010517][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.018043][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.025264][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.033381][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.054298][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.062787][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.071004][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.079004][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.096202][ T309] device veth0_vlan entered promiscuous mode [ 23.103725][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.112640][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.121037][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.137103][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.145239][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.153268][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.161632][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.169143][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.203229][ T309] device veth1_macvtap entered promiscuous mode [ 23.211695][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.221109][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.229467][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.239054][ T311] device veth1_macvtap entered promiscuous mode [ 23.254120][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.262741][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.271544][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.279985][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.288561][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.322575][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.333347][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.341767][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.350838][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.380689][ T346] device syzkaller0 entered promiscuous mode [ 23.601314][ T392] device syzkaller0 entered promiscuous mode [ 24.045900][ T444] device pim6reg1 entered promiscuous mode [ 24.310248][ T474] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 24.366728][ C1] hrtimer: interrupt took 34982 ns [ 24.607281][ T487] device veth0_vlan left promiscuous mode [ 24.628236][ T487] device veth0_vlan entered promiscuous mode [ 24.669781][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.698325][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.705680][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.191177][ T535] device pim6reg1 entered promiscuous mode [ 25.227921][ T540] syz-executor.2[540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.227987][ T540] syz-executor.2[540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.298011][ T548] device syzkaller0 entered promiscuous mode [ 25.595885][ T572] device veth0_vlan left promiscuous mode [ 25.645651][ T572] device veth0_vlan entered promiscuous mode [ 25.744888][ T575] device pim6reg1 entered promiscuous mode [ 25.864277][ T579] syz-executor.3[579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.864363][ T579] syz-executor.3[579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.462544][ T599] syz-executor.4[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.481749][ T599] syz-executor.4[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.487568][ T597] device syzkaller0 entered promiscuous mode [ 26.572052][ T607] device pim6reg1 entered promiscuous mode [ 26.598104][ T616] syz-executor.1[616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.598170][ T616] syz-executor.1[616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.075602][ T645] device pim6reg1 entered promiscuous mode [ 27.138990][ T649] syz-executor.4[649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.139055][ T649] syz-executor.4[649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.376773][ T659] device veth1_macvtap left promiscuous mode [ 27.537372][ T659] device veth1_macvtap entered promiscuous mode [ 27.569894][ T659] device macsec0 entered promiscuous mode [ 27.743306][ T675] syz-executor.3 (675) used greatest stack depth: 21984 bytes left [ 27.768819][ T681] device pim6reg1 entered promiscuous mode [ 27.847247][ T310] syz-executor.3 (310) used greatest stack depth: 20880 bytes left [ 28.440698][ T694] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.534539][ T694] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.561498][ T694] device bridge_slave_0 entered promiscuous mode [ 28.568637][ T694] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.575734][ T694] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.584367][ T694] device bridge_slave_1 entered promiscuous mode [ 28.713412][ T10] device bridge_slave_1 left promiscuous mode [ 28.725454][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.760974][ T10] device bridge_slave_0 left promiscuous mode [ 28.811767][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.858964][ T10] device veth1_macvtap left promiscuous mode [ 28.933627][ T10] device veth0_vlan left promiscuous mode [ 29.112502][ T732] device syzkaller0 entered promiscuous mode [ 29.209957][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.220028][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.245248][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.258509][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.267376][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.274244][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.282619][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.290805][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.298874][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.305709][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.313003][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.320823][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.329035][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 29.352156][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.362739][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.373618][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 29.382607][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 29.394150][ T694] device veth0_vlan entered promiscuous mode [ 29.408445][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.416253][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.433135][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.450820][ T694] device veth1_macvtap entered promiscuous mode [ 29.470223][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.520295][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.528469][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.536592][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.545273][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.623023][ T777] device syzkaller0 entered promiscuous mode [ 30.483647][ T869] device veth0_vlan left promiscuous mode [ 30.512686][ T869] device veth0_vlan entered promiscuous mode [ 30.576082][ T867] device syzkaller0 entered promiscuous mode [ 30.649543][ T878] bpf_get_probe_write_proto: 8 callbacks suppressed [ 30.649561][ T878] syz-executor.2[878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.688262][ T878] syz-executor.2[878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.707488][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 30.707501][ T30] audit: type=1400 audit(1718429317.695:115): avc: denied { write } for pid=879 comm="syz-executor.3" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 31.089588][ T905] syz-executor.4[905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.089660][ T905] syz-executor.4[905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.199785][ T909] device syzkaller0 entered promiscuous mode [ 31.439841][ T939] device pim6reg1 entered promiscuous mode [ 31.618298][ T970] device pim6reg1 entered promiscuous mode [ 31.666464][ T976] device pim6reg1 entered promiscuous mode [ 31.792424][ T992] device syzkaller0 entered promiscuous mode [ 31.951276][ T1005] device pim6reg1 entered promiscuous mode [ 31.959065][ T1015] device veth0_vlan left promiscuous mode [ 31.966191][ T1015] device veth0_vlan entered promiscuous mode [ 31.977629][ T1017] device pim6reg1 entered promiscuous mode [ 32.082870][ T1029] device syzkaller0 entered promiscuous mode [ 32.277788][ T1050] device pim6reg1 entered promiscuous mode [ 32.464007][ T1059] device veth0_vlan left promiscuous mode [ 32.470576][ T1059] device veth0_vlan entered promiscuous mode [ 32.504537][ T1061] device syzkaller0 entered promiscuous mode [ 32.757822][ T1072] device syzkaller0 entered promiscuous mode [ 32.853931][ T1078] device syzkaller0 entered promiscuous mode [ 32.995202][ T1092] device pim6reg1 entered promiscuous mode [ 33.011307][ T1097] device veth0_vlan left promiscuous mode [ 33.021833][ T1097] device veth0_vlan entered promiscuous mode [ 33.299922][ T1091] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.313640][ T1091] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.328912][ T1091] device bridge_slave_0 entered promiscuous mode [ 33.389308][ T1091] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.396371][ T1091] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.408636][ T1091] device bridge_slave_1 entered promiscuous mode [ 33.571920][ T1145] device pim6reg1 entered promiscuous mode [ 33.594203][ T1130] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.601973][ T1130] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.612102][ T1130] device bridge_slave_0 entered promiscuous mode [ 33.642405][ T1130] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.649442][ T1130] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.657424][ T1130] device bridge_slave_1 entered promiscuous mode [ 33.820753][ T10] device bridge_slave_1 left promiscuous mode [ 33.831647][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.855449][ T10] device bridge_slave_0 left promiscuous mode [ 33.864229][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.876374][ T10] device veth1_macvtap left promiscuous mode [ 33.882365][ T10] device veth0_vlan left promiscuous mode [ 34.255968][ T1091] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.262849][ T1091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.269959][ T1091] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.276730][ T1091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.324154][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.337152][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.435384][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.443248][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.477073][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.485292][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.493875][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.500739][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.509637][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 34.567160][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.576434][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.583314][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.590913][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.598881][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.607932][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.615903][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.624041][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.632532][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.650234][ T1091] device veth0_vlan entered promiscuous mode [ 34.695622][ T1201] device syzkaller0 entered promiscuous mode [ 34.708886][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.723016][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.745299][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 34.833838][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.880696][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 34.927105][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.989235][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.996113][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.082988][ T1091] device veth1_macvtap entered promiscuous mode [ 35.133592][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.142966][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.166179][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.175643][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.199553][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.208136][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.229277][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.255057][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.263411][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.270263][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.277422][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 35.285216][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.293361][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.337464][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.346008][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.354867][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.363216][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.371139][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.397078][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.405174][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.413479][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.422748][ T1130] device veth0_vlan entered promiscuous mode [ 35.438875][ T1228] device syzkaller0 entered promiscuous mode [ 35.562097][ T1220] device veth0_vlan left promiscuous mode [ 35.568456][ T1220] device veth0_vlan entered promiscuous mode [ 35.613277][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.623195][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.639744][ T1130] device veth1_macvtap entered promiscuous mode [ 35.656525][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.664473][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.673466][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.695225][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.703595][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 35.862692][ T30] audit: type=1400 audit(1718429322.845:116): avc: denied { ioctl } for pid=1255 comm="syz-executor.1" path="socket:[18509]" dev="sockfs" ino=18509 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.108015][ T1275] syz-executor.3[1275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.108088][ T1275] syz-executor.3[1275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.335523][ T1275] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 36.384345][ T10] device bridge_slave_1 left promiscuous mode [ 36.405170][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.498598][ T10] device bridge_slave_0 left promiscuous mode [ 36.555570][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.693726][ T10] device veth1_macvtap left promiscuous mode [ 36.700342][ T10] device veth0_vlan left promiscuous mode [ 37.162230][ T1311] device pim6reg1 entered promiscuous mode [ 37.429991][ T1305] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.436918][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.444188][ T1305] device bridge_slave_0 entered promiscuous mode [ 37.454661][ T1305] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.476941][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.485927][ T1305] device bridge_slave_1 entered promiscuous mode [ 37.814049][ T1305] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.820957][ T1305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.828083][ T1305] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.834920][ T1305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.874667][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.882675][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.890786][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.899180][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.919195][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.927313][ T415] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.934179][ T415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.941585][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.950295][ T415] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.957172][ T415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.964374][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.972243][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.990497][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.021306][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.034405][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.046207][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.068685][ T1305] device veth0_vlan entered promiscuous mode [ 38.095026][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.104796][ T1305] device veth1_macvtap entered promiscuous mode [ 38.143791][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.183423][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.261544][ T10] device bridge_slave_1 left promiscuous mode [ 38.293074][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.374463][ T10] device bridge_slave_0 left promiscuous mode [ 38.415510][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.457754][ T10] device veth1_macvtap left promiscuous mode [ 38.496479][ T10] device veth0_vlan left promiscuous mode [ 39.809385][ T1452] device syzkaller0 entered promiscuous mode [ 40.247938][ T1481] syz-executor.3[1481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.248007][ T1481] syz-executor.3[1481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.360104][ T1481] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 40.615230][ T1509] device vxcan1 entered promiscuous mode [ 40.721366][ T1521] device syzkaller0 entered promiscuous mode [ 40.736505][ T1521] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 41.808666][ T1557] device syzkaller0 entered promiscuous mode [ 42.368433][ T1593] : renamed from ipvlan1 [ 43.292450][ T1633] device pim6reg1 entered promiscuous mode [ 43.749997][ T1656] device syzkaller0 entered promiscuous mode [ 43.813461][ T1660] device pim6reg1 entered promiscuous mode [ 44.138128][ T1685] device syzkaller0 entered promiscuous mode [ 44.427363][ T1702] device pim6reg1 entered promiscuous mode [ 48.377324][ T1935] device vxcan1 entered promiscuous mode [ 50.407415][ T30] audit: type=1400 audit(1718429337.395:117): avc: denied { create } for pid=2142 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 50.481988][ T2141] device syzkaller0 entered promiscuous mode [ 50.584896][ T2158] syz-executor.0[2158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.584960][ T2158] syz-executor.0[2158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.716442][ T2164] device syzkaller0 entered promiscuous mode [ 51.229936][ T2186] syz-executor.0[2186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.230001][ T2186] syz-executor.0[2186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.677599][ T2220] syz-executor.1[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.839258][ T2220] syz-executor.1[2220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.006695][ C1] sched: RT throttling activated [ 56.077684][ T2251] device syzkaller0 entered promiscuous mode [ 56.158661][ T2270] syz-executor.2[2270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.158780][ T2270] syz-executor.2[2270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.242690][ T2264] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 25 (only 8 groups) [ 60.096477][ T2295] device syzkaller0 entered promiscuous mode [ 60.119534][ T308] syz-executor.1 (308) used greatest stack depth: 19776 bytes left [ 60.285635][ T2308] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.292573][ T2308] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.300662][ T2308] device bridge_slave_0 entered promiscuous mode [ 60.311118][ T2308] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.318326][ T2308] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.325662][ T2308] device bridge_slave_1 entered promiscuous mode [ 60.401806][ T2341] device syzkaller0 entered promiscuous mode [ 60.579509][ T2308] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.586389][ T2308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.593701][ T2308] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.600490][ T2308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.625917][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.645234][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.652966][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.668143][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.676162][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.683014][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.690230][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.698505][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.705363][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.714338][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.754829][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.765945][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.797946][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.817047][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.828621][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.840366][ T2308] device veth0_vlan entered promiscuous mode [ 60.875046][ T2308] device veth1_macvtap entered promiscuous mode [ 60.890218][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.899934][ T8] device bridge_slave_1 left promiscuous mode [ 60.906215][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.913761][ T8] device bridge_slave_0 left promiscuous mode [ 60.931964][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.946294][ T8] device veth1_macvtap left promiscuous mode [ 60.952287][ T8] device veth0_vlan left promiscuous mode [ 61.103507][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.111980][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 61.134331][ T2433] device syzkaller0 entered promiscuous mode [ 61.370648][ T2410] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.420943][ T2410] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.449596][ T2410] device bridge_slave_0 entered promiscuous mode [ 61.520015][ T2410] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.613407][ T2410] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.660514][ T2410] device bridge_slave_1 entered promiscuous mode [ 62.058181][ T2410] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.065148][ T2410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.072332][ T2410] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.079101][ T2410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.145049][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.183794][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.279830][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.288092][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.297278][ T2500] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 62.328404][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.337788][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.346511][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.353408][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.361845][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.370544][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.379450][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.386511][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.454048][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.471800][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.522880][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.580422][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.632481][ T2516] device team_slave_0 entered promiscuous mode [ 62.664919][ T2410] device veth0_vlan entered promiscuous mode [ 62.707578][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.758575][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.767153][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.775407][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.790917][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.799019][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.823654][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.833358][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.846637][ T2410] device veth1_macvtap entered promiscuous mode [ 62.905759][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.931688][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.949925][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.957549][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.965708][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.974001][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.982832][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.078349][ T2544] geneve1: tun_chr_ioctl cmd 2147767511 [ 63.107984][ T8] device bridge_slave_1 left promiscuous mode [ 63.114720][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.123202][ T8] device bridge_slave_0 left promiscuous mode [ 63.129515][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.138586][ T8] device veth1_macvtap left promiscuous mode [ 63.155240][ T8] device veth0_vlan left promiscuous mode [ 63.546422][ T2580] device team_slave_0 entered promiscuous mode [ 63.574035][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.586477][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.769528][ T2592] geneve1: tun_chr_ioctl cmd 2147767511 [ 64.150735][ T2619] syz-executor.4[2619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.150804][ T2619] syz-executor.4[2619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.243813][ T2622] device syzkaller0 entered promiscuous mode [ 65.260062][ T2707] device syzkaller0 entered promiscuous mode [ 65.407336][ T2722] ------------[ cut here ]------------ [ 65.412654][ T2722] Please remove unsupported %[ 65.417201][ T2722] WARNING: CPU: 1 PID: 2722 at lib/vsprintf.c:2667 format_decode+0x12d2/0x1f10 [ 65.425979][ T2722] Modules linked in: [ 65.429823][ T2722] CPU: 1 PID: 2722 Comm: syz-executor.4 Not tainted 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 65.439985][ T2722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 65.449902][ T2722] RIP: 0010:format_decode+0x12d2/0x1f10 [ 65.455268][ T2722] Code: 7b 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 80 7a 84 85 e8 0e 27 b9 fe <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 65.474911][ T2722] RSP: 0018:ffffc90001197620 EFLAGS: 00010246 [ 65.480820][ T2722] RAX: 31d2ad41b4e83300 RBX: 00000000ffffffdb RCX: 0000000000040000 [ 65.488610][ T2722] RDX: ffffc9000136d000 RSI: 00000000000004b6 RDI: 00000000000004b7 [ 65.496324][ T2722] RBP: ffffc90001197710 R08: ffffffff81576225 R09: fffff52000232ded [ 65.504203][ T2722] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 65.511977][ T2722] R13: ffff0000ffffff00 R14: ffffc9000119794c R15: 1ffff92000232f29 [ 65.519773][ T2722] FS: 00007f89feacc6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 65.528635][ T2722] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.535032][ T2722] CR2: 0000001b2fc22000 CR3: 0000000122e28000 CR4: 00000000003506a0 [ 65.542866][ T2722] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.550682][ T2722] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 65.558501][ T2722] Call Trace: [ 65.561594][ T2722] [ 65.564380][ T2722] ? show_regs+0x58/0x60 [ 65.568604][ T2722] ? __warn+0x160/0x2f0 [ 65.572572][ T2722] ? format_decode+0x12d2/0x1f10 [ 65.577367][ T2722] ? report_bug+0x3d9/0x5b0 [ 65.581686][ T2722] ? format_decode+0x12d2/0x1f10 [ 65.586461][ T2722] ? handle_bug+0x41/0x70 [ 65.590656][ T2722] ? exc_invalid_op+0x1b/0x50 [ 65.595143][ T2722] ? asm_exc_invalid_op+0x1b/0x20 [ 65.600018][ T2722] ? __wake_up_klogd+0xd5/0x110 [ 65.604860][ T2722] ? format_decode+0x12d2/0x1f10 [ 65.609655][ T2722] ? __kernel_text_address+0x9b/0x110 [ 65.614841][ T2722] ? vsnprintf+0x1c70/0x1c70 [ 65.619383][ T2722] ? bstr_printf+0x1b6/0x10c0 [ 65.623954][ T2722] ? memcpy+0x56/0x70 [ 65.627791][ T2722] bstr_printf+0x130/0x10c0 [ 65.632113][ T2722] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 65.637086][ T2722] ? vbin_printf+0x1bc0/0x1bc0 [ 65.641658][ T2722] ? bpf_trace_printk+0x122/0x330 [ 65.646608][ T2722] ? memcpy+0x56/0x70 [ 65.650382][ T2722] bpf_trace_printk+0x1b5/0x330 [ 65.655028][ T2722] ? kmem_cache_alloc+0xf5/0x200 [ 65.659817][ T2722] ? ktime_get+0xf1/0x160 [ 65.663971][ T2722] ? bpf_probe_write_user+0xf0/0xf0 [ 65.669017][ T2722] ? do_syscall_64+0x3d/0xb0 [ 65.673425][ T2722] ? ktime_get+0xf1/0x160 [ 65.677629][ T2722] bpf_prog_12183cdb1cd51dab+0x2e/0xd60 [ 65.682973][ T2722] bpf_test_run+0x478/0xa10 [ 65.687427][ T2722] ? convert___skb_to_skb+0x570/0x570 [ 65.692815][ T2722] ? eth_type_trans+0x2c6/0x600 [ 65.697516][ T2722] ? eth_get_headlen+0x240/0x240 [ 65.702272][ T2722] ? convert___skb_to_skb+0x44/0x570 [ 65.707412][ T2722] bpf_prog_test_run_skb+0xb41/0x1420 [ 65.712693][ T2722] ? anon_inode_getfd+0x33/0x40 [ 65.717410][ T2722] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 65.723196][ T2722] ? __kasan_check_write+0x14/0x20 [ 65.728166][ T2722] ? fput_many+0x160/0x1b0 [ 65.732397][ T2722] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 65.738157][ T2722] bpf_prog_test_run+0x3b0/0x630 [ 65.742899][ T2722] ? bpf_prog_query+0x220/0x220 [ 65.747604][ T2722] ? selinux_bpf+0xd2/0x100 [ 65.751925][ T2722] ? security_bpf+0x82/0xb0 [ 65.756267][ T2722] __sys_bpf+0x525/0x760 [ 65.760370][ T2722] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 65.765559][ T2722] ? __kasan_check_read+0x11/0x20 [ 65.770437][ T2722] __x64_sys_bpf+0x7c/0x90 [ 65.774663][ T2722] do_syscall_64+0x3d/0xb0 [ 65.778940][ T2722] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 65.784655][ T2722] RIP: 0033:0x7f89ff751ea9 [ 65.789017][ T2722] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 65.808479][ T2722] RSP: 002b:00007f89feacc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 65.816674][ T2722] RAX: ffffffffffffffda RBX: 00007f89ff888f80 RCX: 00007f89ff751ea9 [ 65.824481][ T2722] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 65.832318][ T2722] RBP: 00007f89ff7c0ff4 R08: 0000000000000000 R09: 0000000000000000 [ 65.840222][ T2722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 65.848033][ T2722] R13: 000000000000000b R14: 00007f89ff888f80 R15: 00007fff1bc5bf78 [ 65.855914][ T2722] [ 65.858792][ T2722] ---[ end trace 2afd509fb08929c1 ]--- [ 66.332617][ T2757] syz-executor.4[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.332687][ T2757] syz-executor.4[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.470520][ T2757] device syzkaller0 entered promiscuous mode [ 66.708099][ T2774] device pim6reg1 entered promiscuous mode [ 66.781359][ T2774] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 67.095786][ T2801] syz-executor.2[2801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.095855][ T2801] syz-executor.2[2801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.239363][ T2801] device syzkaller0 entered promiscuous mode [ 67.592606][ T30] audit: type=1400 audit(1718429354.575:118): avc: denied { create } for pid=2817 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 69.025323][ T2899] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 69.167275][ T2912] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 69.611623][ T2937] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 69.871354][ T2958] device syzkaller0 entered promiscuous mode [ 70.060257][ T2980] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 70.326775][ T30] audit: type=1400 audit(1718429357.305:119): avc: denied { create } for pid=2986 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 70.683679][ T2999] device pim6reg1 entered promiscuous mode [ 71.009109][ T30] audit: type=1400 audit(1718429357.995:120): avc: denied { create } for pid=3029 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 72.535652][ T3107] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 72.773558][ T3117] syz-executor.4[3117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.773632][ T3117] syz-executor.4[3117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.937336][ T3123] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 73.410175][ T3136] device syzkaller0 entered promiscuous mode [ 73.974045][ T3186] device sit0 entered promiscuous mode [ 76.479102][ T3282] syz-executor.1[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.479173][ T3282] syz-executor.1[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.035694][ T3337] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.054212][ T3337] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.127519][ T3341] device vxcan1 entered promiscuous mode [ 78.133819][ T3337] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.140732][ T3337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.148055][ T3337] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.154907][ T3337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.545367][ T3351] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.580101][ T3351] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.588499][ T3351] device bridge_slave_0 entered promiscuous mode [ 78.632005][ T3351] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.667669][ T3351] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.686049][ T3351] device bridge_slave_1 entered promiscuous mode [ 78.871340][ T3379] device syzkaller0 entered promiscuous mode [ 78.928854][ T8] device bridge_slave_1 left promiscuous mode [ 78.937105][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.950782][ T8] device bridge_slave_0 left promiscuous mode [ 78.970152][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.980813][ T8] device veth1_macvtap left promiscuous mode [ 78.987301][ T8] device veth0_vlan left promiscuous mode [ 79.215555][ T3385] device vxcan1 entered promiscuous mode [ 79.221705][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.293937][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.301540][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.311609][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.322617][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.331323][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.338198][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.346804][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.354256][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.362561][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.371160][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.378010][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.392557][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.400531][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.408733][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.416627][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.428666][ T3401] syz-executor.0[3401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.428730][ T3401] syz-executor.0[3401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.460032][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.494882][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.506584][ T3407] syz-executor.2[3407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.506652][ T3407] syz-executor.2[3407] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.523597][ T3351] device veth0_vlan entered promiscuous mode [ 79.552295][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.608137][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.647700][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.683228][ T543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.819584][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.861633][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.915383][ T3351] device veth1_macvtap entered promiscuous mode [ 80.061144][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.074480][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.083954][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.104532][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.113981][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.240482][ T3416] device syzkaller0 entered promiscuous mode [ 80.466392][ T3433] device vxcan1 entered promiscuous mode [ 80.570117][ T3444] syz-executor.0[3444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.570185][ T3444] syz-executor.0[3444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.263940][ T3467] device vxcan1 entered promiscuous mode [ 82.149320][ T3504] device syzkaller0 entered promiscuous mode [ 82.201047][ T3508] device vxcan1 entered promiscuous mode [ 82.655323][ T3543] device vxcan1 entered promiscuous mode [ 83.121186][ T3549] device syzkaller0 entered promiscuous mode [ 83.812980][ T3598] device syzkaller0 entered promiscuous mode [ 84.418613][ T3635] device syzkaller0 entered promiscuous mode [ 85.265476][ T3683] device syzkaller0 entered promiscuous mode [ 85.939876][ T3735] device syzkaller0 entered promiscuous mode [ 86.303747][ T3751] device syzkaller0 entered promiscuous mode [ 87.064611][ T3763] device syzkaller0 entered promiscuous mode [ 88.668955][ T3873] device pim6reg1 entered promiscuous mode [ 88.737552][ T3880] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 9 (only 8 groups) [ 88.797744][ T30] audit: type=1400 audit(1718429375.785:121): avc: denied { create } for pid=3878 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 91.015903][ T3902] device syzkaller0 entered promiscuous mode [ 93.629567][ T3950] device syzkaller0 entered promiscuous mode [ 93.924826][ T30] audit: type=1400 audit(1718429380.905:122): avc: denied { create } for pid=3990 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 94.192835][ T4011] device syzkaller0 entered promiscuous mode [ 94.467455][ T4047] syz-executor.4[4047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.467523][ T4047] syz-executor.4[4047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.579635][ T4064] device syzkaller0 entered promiscuous mode [ 94.598778][ T39] syzkaller0: tun_net_xmit 48 [ 94.617210][ T4064] syzkaller0: create flow: hash 1252682489 index 2 [ 94.659586][ T4064] syzkaller0: delete flow: hash 1252682489 index 2 [ 94.727456][ T4079] syz-executor.1[4079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.727526][ T4079] syz-executor.1[4079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.984819][ T4104] syz-executor.4[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.016464][ T4104] syz-executor.4[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.771475][ T4148] device sit0 entered promiscuous mode [ 96.097542][ T4185] syz-executor.1[4185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.097615][ T4185] syz-executor.1[4185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.862243][ T4258] geneve1: tun_chr_ioctl cmd 1074025684 [ 98.338200][ T30] audit: type=1400 audit(1718429385.325:123): avc: denied { create } for pid=4328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 98.449522][ T30] audit: type=1400 audit(1718429385.395:124): avc: denied { create } for pid=4328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.532848][ T4314] device syzkaller0 entered promiscuous mode [ 98.653244][ T30] audit: type=1400 audit(1718429385.405:125): avc: denied { read } for pid=4328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 98.726785][ T30] audit: type=1400 audit(1718429385.455:126): avc: denied { write } for pid=4328 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 100.010341][ T30] audit: type=1400 audit(1718429386.985:127): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 103.280969][ T4404] device sit0 left promiscuous mode [ 103.496196][ T4412] device sit0 entered promiscuous mode [ 106.447754][ T4528] device pim6reg1 entered promiscuous mode [ 106.715670][ T4541] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.169163][ T4564] device pim6reg1 entered promiscuous mode [ 107.460310][ T4579] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.602872][ T4618] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.540759][ T4650] device syzkaller0 entered promiscuous mode [ 109.698360][ T4659] device syzkaller0 entered promiscuous mode [ 110.672199][ T4682] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.754333][ T4682] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.773908][ T4682] device bridge_slave_0 entered promiscuous mode [ 110.846853][ T4682] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.853771][ T4682] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.864737][ T4682] device bridge_slave_1 entered promiscuous mode [ 110.915037][ T4695] device syzkaller0 entered promiscuous mode [ 111.022481][ T2514] device bridge_slave_1 left promiscuous mode [ 111.043185][ T2514] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.075039][ T2514] device bridge_slave_0 left promiscuous mode [ 111.106820][ T2514] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.145479][ T2514] device veth1_macvtap left promiscuous mode [ 111.179129][ T2514] device veth0_vlan left promiscuous mode [ 111.648476][ T4711] device pim6reg1 entered promiscuous mode [ 111.846814][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.855120][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.874108][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.883796][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.892026][ T1414] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.898986][ T1414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.906881][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.915174][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.923475][ T1414] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.930437][ T1414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.948330][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.955861][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.964339][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.972387][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.981585][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.989759][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 112.017037][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.029464][ T4682] device veth0_vlan entered promiscuous mode [ 112.071509][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 112.085896][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.094105][ T30] audit: type=1400 audit(1718429399.075:128): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 112.128089][ T4682] device veth1_macvtap entered promiscuous mode [ 112.180669][ T30] audit: type=1400 audit(1718429399.075:129): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.222759][ T4725] device syzkaller0 entered promiscuous mode [ 112.230336][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.277340][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.284757][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 112.293104][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.342970][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.352868][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.364617][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.375082][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.389757][ T4735] device pim6reg1 entered promiscuous mode [ 112.413723][ T30] audit: type=1400 audit(1718429399.395:130): avc: denied { mounton } for pid=4682 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 112.595192][ T4738] device sit0 entered promiscuous mode [ 112.850471][ T4757] bridge0: port 3(syz_tun) entered blocking state [ 112.861646][ T4757] bridge0: port 3(syz_tun) entered disabled state [ 112.869300][ T4757] device syz_tun entered promiscuous mode [ 112.875377][ T4757] bridge0: port 3(syz_tun) entered blocking state [ 112.881662][ T4757] bridge0: port 3(syz_tun) entered forwarding state [ 113.161077][ T4779] device pim6reg1 entered promiscuous mode [ 113.255282][ T4783] device syzkaller0 entered promiscuous mode [ 113.710346][ T4797] bridge0: port 3(syz_tun) entered blocking state [ 113.716607][ T4797] bridge0: port 3(syz_tun) entered disabled state [ 113.826457][ T4797] device syz_tun entered promiscuous mode [ 113.869034][ T4797] bridge0: port 3(syz_tun) entered blocking state [ 113.875286][ T4797] bridge0: port 3(syz_tun) entered forwarding state [ 115.353985][ T4858] device pim6reg1 entered promiscuous mode [ 117.787770][ T4961] device pim6reg1 entered promiscuous mode [ 118.010935][ T4968] device sit0 left promiscuous mode [ 118.107105][ T30] audit: type=1400 audit(1718429405.095:131): avc: denied { create } for pid=4967 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 118.247851][ T3351] bridge0: port 3(syz_tun) entered disabled state [ 118.265412][ T3351] device syz_tun left promiscuous mode [ 118.273166][ T3351] bridge0: port 3(syz_tun) entered disabled state [ 118.307100][ T4969] device sit0 entered promiscuous mode [ 118.581534][ T4982] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.588481][ T4982] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.595856][ T4982] device bridge_slave_0 entered promiscuous mode [ 118.666787][ T4982] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.673652][ T4982] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.791752][ T4982] device bridge_slave_1 entered promiscuous mode [ 119.399006][ T8] device bridge_slave_1 left promiscuous mode [ 119.404962][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.430413][ T8] device bridge_slave_0 left promiscuous mode [ 119.487099][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.505106][ T8] device veth1_macvtap left promiscuous mode [ 119.524404][ T8] device veth0_vlan left promiscuous mode [ 119.807001][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 119.814231][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.857632][ T5034] device sit0 left promiscuous mode [ 119.951100][ T5037] device sit0 entered promiscuous mode [ 120.207841][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.233716][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.269961][ T415] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.276874][ T415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.287636][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 120.295970][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.304248][ T415] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.311141][ T415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.329524][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 120.337301][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 120.345316][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.353461][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 120.361677][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.377428][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 120.386172][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.396118][ T4982] device veth0_vlan entered promiscuous mode [ 120.425058][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 120.441419][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.473374][ T4982] device veth1_macvtap entered promiscuous mode [ 120.536899][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.544253][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.589200][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 120.613269][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.627140][ T1414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 120.678263][ T30] audit: type=1400 audit(1718429407.665:132): avc: denied { ioctl } for pid=5055 comm="syz-executor.4" path="socket:[30493]" dev="sockfs" ino=30493 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 120.726810][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 120.735604][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.753986][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 120.767062][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 121.002937][ T5081] syz-executor.4[5081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.003007][ T5081] syz-executor.4[5081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.016458][ T5081] syz-executor.4[5081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.028401][ T5081] syz-executor.4[5081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.036663][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 221.054545][ C0] rcu: 0-...!: (1 GPs behind) idle=80d/1/0x4000000000000000 softirq=23047/23055 fqs=0 last_accelerate: b9bc/e0dc dyntick_enabled: 1 [ 221.068087][ C0] (t=10003 jiffies g=18769 q=100) [ 221.073116][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10002 jiffies! g18769 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 221.085261][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=5717 [ 221.092898][ C0] rcu: rcu_preempt kthread starved for 10005 jiffies! g18769 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 221.104099][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 221.113989][ C0] rcu: RCU grace-period kthread stack dump: [ 221.119718][ C0] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 221.128752][ C0] Call Trace: [ 221.131877][ C0] [ 221.134650][ C0] __schedule+0xccc/0x1590 [ 221.138899][ C0] ? __sched_text_start+0x8/0x8 [ 221.143584][ C0] ? __kasan_check_write+0x14/0x20 [ 221.148532][ C0] schedule+0x11f/0x1e0 [ 221.152527][ C0] schedule_timeout+0x18c/0x370 [ 221.157213][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 221.162245][ C0] ? console_conditional_schedule+0x30/0x30 [ 221.167976][ C0] ? update_process_times+0x200/0x200 [ 221.173182][ C0] ? prepare_to_swait_event+0x308/0x320 [ 221.178565][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 221.183165][ C0] ? debug_smp_processor_id+0x17/0x20 [ 221.188370][ C0] ? __note_gp_changes+0x4ab/0x920 [ 221.193328][ C0] ? rcu_gp_init+0xc30/0xc30 [ 221.197745][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 221.202777][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 221.207207][ C0] rcu_gp_kthread+0xa4/0x350 [ 221.211631][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 221.216325][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 221.220841][ C0] ? __kasan_check_read+0x11/0x20 [ 221.225691][ C0] ? __kthread_parkme+0xb2/0x200 [ 221.230467][ C0] kthread+0x421/0x510 [ 221.234372][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 221.238885][ C0] ? kthread_blkcg+0xd0/0xd0 [ 221.243310][ C0] ret_from_fork+0x1f/0x30 [ 221.247568][ C0] [ 221.250427][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 221.256601][ C0] Sending NMI from CPU 0 to CPUs 1: [ 221.261662][ C1] NMI backtrace for cpu 1 [ 221.261673][ C1] CPU: 1 PID: 5081 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 221.261689][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 221.261700][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 221.261725][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 221.261737][ C1] RSP: 0018:ffffc90000aa7140 EFLAGS: 00000246 [ 221.261751][ C1] RAX: 0000000000000001 RBX: 1ffff92000154e2c RCX: 1ffffffff0d1aa9c [ 221.261762][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 221.261771][ C1] RBP: ffffc90000aa71f0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 221.261782][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 221.261793][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000154e30 [ 221.261803][ C1] FS: 00007f89feacc6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 221.261816][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 221.261827][ C1] CR2: 0000000000000000 CR3: 00000001273fd000 CR4: 00000000003506a0 [ 221.261842][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 221.261850][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 221.261860][ C1] Call Trace: [ 221.261864][ C1] [ 221.261870][ C1] ? show_regs+0x58/0x60 [ 221.261885][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 221.261904][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 221.261922][ C1] ? kvm_wait+0x147/0x180 [ 221.261935][ C1] ? kvm_wait+0x147/0x180 [ 221.261948][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 221.261965][ C1] ? nmi_handle+0xa8/0x280 [ 221.261980][ C1] ? kvm_wait+0x147/0x180 [ 221.261993][ C1] ? default_do_nmi+0x69/0x160 [ 221.262010][ C1] ? exc_nmi+0xaf/0x120 [ 221.262023][ C1] ? end_repeat_nmi+0x16/0x31 [ 221.262043][ C1] ? kvm_wait+0x147/0x180 [ 221.262056][ C1] ? kvm_wait+0x147/0x180 [ 221.262070][ C1] ? kvm_wait+0x147/0x180 [ 221.262083][ C1] [ 221.262087][ C1] [ 221.262091][ C1] ? asm_common_interrupt+0x27/0x40 [ 221.262105][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 221.262121][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 221.262142][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 221.262161][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 221.262178][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 221.262196][ C1] sock_map_delete_elem+0x99/0x130 [ 221.262214][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 221.262227][ C1] bpf_trace_run4+0x1b6/0x270 [ 221.262245][ C1] ? bpf_trace_run3+0x250/0x250 [ 221.262263][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 221.262280][ C1] __alloc_pages+0x3cb/0x8f0 [ 221.262296][ C1] ? prep_new_page+0x110/0x110 [ 221.262313][ C1] ? __kasan_kmalloc+0x9/0x10 [ 221.262327][ C1] ? __kmalloc+0x13a/0x270 [ 221.262342][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 221.262358][ C1] __vmalloc_node_range+0x482/0x8d0 [ 221.262376][ C1] module_alloc+0x81/0x90 [ 221.262389][ C1] ? bpf_jit_alloc_exec+0x15/0x20 [ 221.262405][ C1] bpf_jit_alloc_exec+0x15/0x20 [ 221.262420][ C1] bpf_jit_binary_alloc+0x12b/0x260 [ 221.262435][ C1] ? bpf_int_jit_compile+0xc6d0/0xc6d0 [ 221.262453][ C1] bpf_int_jit_compile+0xb2a2/0xc6d0 [ 221.262476][ C1] ? emit_bpf_dispatcher+0xd90/0xd90 [ 221.262501][ C1] bpf_prog_select_runtime+0x706/0x9e0 [ 221.262524][ C1] ? memset+0x35/0x40 [ 221.262538][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 221.262553][ C1] bpf_prog_load+0x1315/0x1b50 [ 221.262569][ C1] ? map_freeze+0x370/0x370 [ 221.262587][ C1] ? selinux_bpf+0xcb/0x100 [ 221.262601][ C1] ? security_bpf+0x82/0xb0 [ 221.262616][ C1] __sys_bpf+0x4bc/0x760 [ 221.262629][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 221.262647][ C1] ? __kasan_check_read+0x11/0x20 [ 221.262663][ C1] __x64_sys_bpf+0x7c/0x90 [ 221.262677][ C1] do_syscall_64+0x3d/0xb0 [ 221.262691][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 221.262705][ C1] RIP: 0033:0x7f89ff751ea9 [ 221.262728][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 221.262739][ C1] RSP: 002b:00007f89feacc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 221.262753][ C1] RAX: ffffffffffffffda RBX: 00007f89ff888f80 RCX: 00007f89ff751ea9 [ 221.262764][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 221.262773][ C1] RBP: 00007f89ff7c0ff4 R08: 0000000000000000 R09: 0000000000000000 [ 221.262782][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.262790][ C1] R13: 000000000000000b R14: 00007f89ff888f80 R15: 00007fff1bc5bf78 [ 221.262804][ C1] [ 221.263667][ C0] NMI backtrace for cpu 0 [ 221.728493][ C0] CPU: 0 PID: 5078 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 221.739940][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 221.749922][ C0] Call Trace: [ 221.753052][ C0] [ 221.755738][ C0] dump_stack_lvl+0x151/0x1b7 [ 221.760251][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 221.765716][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 221.770405][ C0] dump_stack+0x15/0x17 [ 221.774396][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 221.779173][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 221.785159][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 221.790476][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 221.795139][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 221.801051][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 221.806856][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 221.812759][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 221.818487][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 221.823436][ C0] print_cpu_stall+0x315/0x5f0 [ 221.828213][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 221.833244][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 221.839233][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 221.844270][ C0] update_process_times+0x198/0x200 [ 221.849300][ C0] tick_sched_timer+0x188/0x240 [ 221.853996][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 221.859368][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 221.864407][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 221.869347][ C0] ? clockevents_program_event+0x22f/0x300 [ 221.874989][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 221.880895][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 221.885668][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 221.891393][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 221.896864][ C0] [ 221.899637][ C0] [ 221.902414][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 221.908230][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 221.913007][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 221.932533][ C0] RSP: 0018:ffffc90000bb6580 EFLAGS: 00000246 [ 221.938436][ C0] RAX: 0000000000000003 RBX: 1ffff92000176cb4 RCX: ffffffff8154fb7f [ 221.946248][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881267cb528 [ 221.954058][ C0] RBP: ffffc90000bb6630 R08: dffffc0000000000 R09: ffffed1024cf96a6 [ 221.961868][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 221.969682][ C0] R13: ffff8881267cb528 R14: 0000000000000003 R15: 1ffff92000176cb8 [ 221.977494][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 221.983572][ C0] ? __set_page_owner+0x2c7/0x2e0 [ 221.988434][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 221.993376][ C0] ? pv_hash+0x86/0x150 [ 221.997369][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 222.003270][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 222.009521][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 222.014292][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 222.019329][ C0] sock_map_delete_elem+0x99/0x130 [ 222.024276][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 222.029657][ C0] bpf_trace_run4+0x1b6/0x270 [ 222.034168][ C0] ? bpf_trace_run3+0x250/0x250 [ 222.039031][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.044325][ C0] __alloc_pages+0x3cb/0x8f0 [ 222.048764][ C0] ? prep_new_page+0x110/0x110 [ 222.053442][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.058910][ C0] ? stack_trace_save+0x113/0x1c0 [ 222.063767][ C0] __stack_depot_save+0x38d/0x470 [ 222.068629][ C0] stack_depot_save+0xe/0x10 [ 222.073052][ C0] save_stack+0x104/0x1e0 [ 222.077264][ C0] ? __reset_page_owner+0x190/0x190 [ 222.082251][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 222.087025][ C0] ? prep_new_page+0x1b/0x110 [ 222.091541][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 222.097095][ C0] ? __alloc_pages+0x27e/0x8f0 [ 222.101695][ C0] ? __stack_depot_save+0x38d/0x470 [ 222.106730][ C0] ? kasan_set_track+0x5d/0x70 [ 222.111328][ C0] ? kasan_set_free_info+0x23/0x40 [ 222.116274][ C0] ? ____kasan_slab_free+0x126/0x160 [ 222.121396][ C0] ? __kasan_slab_free+0x11/0x20 [ 222.126169][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 222.131551][ C0] ? kfree+0xc8/0x220 [ 222.135458][ C0] ? sock_map_unref+0x352/0x4d0 [ 222.140144][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 222.145265][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 222.150819][ C0] ? bpf_trace_run4+0x1b6/0x270 [ 222.155512][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.160979][ C0] __set_page_owner+0x28/0x2e0 [ 222.165574][ C0] ? kernel_init_free_pages+0xda/0xf0 [ 222.170787][ C0] post_alloc_hook+0x1a3/0x1b0 [ 222.175383][ C0] prep_new_page+0x1b/0x110 [ 222.179723][ C0] get_page_from_freelist+0x3550/0x35d0 [ 222.185104][ C0] ? strncpy_from_user+0x209/0x2d0 [ 222.190059][ C0] ? search_extable+0xaf/0xf0 [ 222.194566][ C0] ? search_extable+0xf0/0xf0 [ 222.199077][ C0] ? strncpy_from_user+0x209/0x2d0 [ 222.204027][ C0] ? lruvec_init+0x150/0x150 [ 222.208457][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 222.213053][ C0] ? __alloc_pages_bulk+0xe40/0xe40 [ 222.218085][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 222.222946][ C0] __alloc_pages+0x27e/0x8f0 [ 222.227459][ C0] ? prep_new_page+0x110/0x110 [ 222.232062][ C0] ? stack_trace_save+0x113/0x1c0 [ 222.236919][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 222.241955][ C0] ? stack_trace_save+0x113/0x1c0 [ 222.246813][ C0] __stack_depot_save+0x38d/0x470 [ 222.251674][ C0] ? kfree+0xc8/0x220 [ 222.255493][ C0] kasan_set_track+0x5d/0x70 [ 222.259920][ C0] ? kasan_set_track+0x4b/0x70 [ 222.264519][ C0] ? kasan_set_free_info+0x23/0x40 [ 222.269472][ C0] ? ____kasan_slab_free+0x126/0x160 [ 222.274588][ C0] ? __kasan_slab_free+0x11/0x20 [ 222.279360][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 222.284742][ C0] ? kfree+0xc8/0x220 [ 222.288559][ C0] ? sock_map_unref+0x352/0x4d0 [ 222.293247][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 222.298370][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 222.303924][ C0] ? bpf_trace_run4+0x1b6/0x270 [ 222.308609][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.314079][ C0] ? __alloc_pages+0x3cb/0x8f0 [ 222.318679][ C0] ? __get_free_pages+0x10/0x30 [ 222.323372][ C0] ? kasan_populate_vmalloc_pte+0x39/0x130 [ 222.329007][ C0] ? __apply_to_page_range+0x8dd/0xbe0 [ 222.334302][ C0] ? apply_to_page_range+0x3b/0x50 [ 222.339249][ C0] ? kasan_populate_vmalloc+0x65/0x70 [ 222.344455][ C0] ? alloc_vmap_area+0x192f/0x1a80 [ 222.349404][ C0] ? __get_vm_area_node+0x158/0x360 [ 222.354442][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 222.359564][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 222.364417][ C0] ? array_map_alloc+0x278/0x6d0 [ 222.369257][ C0] ? map_create+0x411/0x2050 [ 222.373794][ C0] ? __sys_bpf+0x296/0x760 [ 222.378045][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 222.382472][ C0] ? do_syscall_64+0x3d/0xb0 [ 222.386899][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.392805][ C0] kasan_set_free_info+0x23/0x40 [ 222.397575][ C0] ____kasan_slab_free+0x126/0x160 [ 222.402520][ C0] __kasan_slab_free+0x11/0x20 [ 222.407122][ C0] slab_free_freelist_hook+0xbd/0x190 [ 222.412327][ C0] ? sock_map_unref+0x352/0x4d0 [ 222.417017][ C0] kfree+0xc8/0x220 [ 222.420662][ C0] sock_map_unref+0x352/0x4d0 [ 222.425174][ C0] sock_map_delete_elem+0xc1/0x130 [ 222.430123][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 222.435501][ C0] bpf_trace_run4+0x1b6/0x270 [ 222.440018][ C0] ? bpf_trace_run3+0x250/0x250 [ 222.444705][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.450085][ C0] __alloc_pages+0x3cb/0x8f0 [ 222.454519][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 222.458937][ C0] ? prep_new_page+0x110/0x110 [ 222.463625][ C0] __get_free_pages+0x10/0x30 [ 222.468139][ C0] kasan_populate_vmalloc_pte+0x39/0x130 [ 222.473612][ C0] ? __apply_to_page_range+0x8ca/0xbe0 [ 222.478900][ C0] __apply_to_page_range+0x8dd/0xbe0 [ 222.484027][ C0] ? kasan_populate_vmalloc+0x70/0x70 [ 222.489229][ C0] ? kasan_populate_vmalloc+0x70/0x70 [ 222.494436][ C0] apply_to_page_range+0x3b/0x50 [ 222.499211][ C0] kasan_populate_vmalloc+0x65/0x70 [ 222.504331][ C0] alloc_vmap_area+0x192f/0x1a80 [ 222.509194][ C0] ? vm_map_ram+0xa90/0xa90 [ 222.513618][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 222.519036][ C0] ? __get_vm_area_node+0x117/0x360 [ 222.524032][ C0] __get_vm_area_node+0x158/0x360 [ 222.528902][ C0] ? selinux_capset+0xf0/0xf0 [ 222.533425][ C0] __vmalloc_node_range+0xe2/0x8d0 [ 222.538368][ C0] ? array_map_alloc+0x278/0x6d0 [ 222.543214][ C0] ? bpf_link_settle+0xc0/0x150 [ 222.547900][ C0] ? cap_capable+0x1d2/0x270 [ 222.552326][ C0] bpf_map_area_alloc+0xd9/0xf0 [ 222.557016][ C0] ? array_map_alloc+0x278/0x6d0 [ 222.561788][ C0] array_map_alloc+0x278/0x6d0 [ 222.566388][ C0] map_create+0x411/0x2050 [ 222.570640][ C0] __sys_bpf+0x296/0x760 [ 222.574720][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 222.579933][ C0] ? __kasan_check_read+0x11/0x20 [ 222.584787][ C0] __x64_sys_bpf+0x7c/0x90 [ 222.589050][ C0] do_syscall_64+0x3d/0xb0 [ 222.593294][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.599028][ C0] RIP: 0033:0x7f8347e93ea9 [ 222.603279][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.622716][ C0] RSP: 002b:00007f834720e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.630962][ C0] RAX: ffffffffffffffda RBX: 00007f8347fcaf80 RCX: 00007f8347e93ea9 [ 222.638773][ C0] RDX: 0000000000000048 RSI: 0000000020000280 RDI: 0000000000000000 [ 222.646585][ C0] RBP: 00007f8347f02ff4 R08: 0000000000000000 R09: 0000000000000000 [ 222.654484][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 222.662308][ C0] R13: 000000000000000b R14: 00007f8347fcaf80 R15: 00007fffd13da6b8 [ 222.670127][ C0] [ 222.672976][ C0] Sending NMI from CPU 0 to CPUs 1: [ 222.678022][ C1] NMI backtrace for cpu 1 [ 222.678033][ C1] CPU: 1 PID: 5081 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 222.678051][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 222.678059][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 222.678080][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 222.678092][ C1] RSP: 0018:ffffc90000aa7140 EFLAGS: 00000246 [ 222.678106][ C1] RAX: 0000000000000001 RBX: 1ffff92000154e2c RCX: 1ffffffff0d1aa9c [ 222.678117][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 222.678127][ C1] RBP: ffffc90000aa71f0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 222.678138][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 222.678148][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000154e30 [ 222.678158][ C1] FS: 00007f89feacc6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 222.678172][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 222.678182][ C1] CR2: 0000000000000000 CR3: 00000001273fd000 CR4: 00000000003506a0 [ 222.678195][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 222.678204][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 222.678212][ C1] Call Trace: [ 222.678217][ C1] [ 222.678225][ C1] ? show_regs+0x58/0x60 [ 222.678240][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 222.678259][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 222.678278][ C1] ? kvm_wait+0x147/0x180 [ 222.678290][ C1] ? kvm_wait+0x147/0x180 [ 222.678304][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 222.678320][ C1] ? nmi_handle+0xa8/0x280 [ 222.678336][ C1] ? kvm_wait+0x147/0x180 [ 222.678348][ C1] ? kvm_wait+0x147/0x180 [ 222.678366][ C1] ? default_do_nmi+0x69/0x160 [ 222.678382][ C1] ? exc_nmi+0xaf/0x120 [ 222.678396][ C1] ? end_repeat_nmi+0x16/0x31 [ 222.678414][ C1] ? kvm_wait+0x147/0x180 [ 222.678427][ C1] ? kvm_wait+0x147/0x180 [ 222.678441][ C1] ? kvm_wait+0x147/0x180 [ 222.678454][ C1] [ 222.678458][ C1] [ 222.678463][ C1] ? asm_common_interrupt+0x27/0x40 [ 222.678477][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 222.678493][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 222.678513][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 222.678532][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 222.678549][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 222.678568][ C1] sock_map_delete_elem+0x99/0x130 [ 222.678586][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 222.678599][ C1] bpf_trace_run4+0x1b6/0x270 [ 222.678616][ C1] ? bpf_trace_run3+0x250/0x250 [ 222.678634][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 222.678651][ C1] __alloc_pages+0x3cb/0x8f0 [ 222.678667][ C1] ? prep_new_page+0x110/0x110 [ 222.678685][ C1] ? __kasan_kmalloc+0x9/0x10 [ 222.678698][ C1] ? __kmalloc+0x13a/0x270 [ 222.678713][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 222.678729][ C1] __vmalloc_node_range+0x482/0x8d0 [ 222.678748][ C1] module_alloc+0x81/0x90 [ 222.678760][ C1] ? bpf_jit_alloc_exec+0x15/0x20 [ 222.678776][ C1] bpf_jit_alloc_exec+0x15/0x20 [ 222.678791][ C1] bpf_jit_binary_alloc+0x12b/0x260 [ 222.678807][ C1] ? bpf_int_jit_compile+0xc6d0/0xc6d0 [ 222.678825][ C1] bpf_int_jit_compile+0xb2a2/0xc6d0 [ 222.678848][ C1] ? emit_bpf_dispatcher+0xd90/0xd90 [ 222.678873][ C1] bpf_prog_select_runtime+0x706/0x9e0 [ 222.678890][ C1] ? memset+0x35/0x40 [ 222.678904][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 222.678921][ C1] bpf_prog_load+0x1315/0x1b50 [ 222.678938][ C1] ? map_freeze+0x370/0x370 [ 222.678956][ C1] ? selinux_bpf+0xcb/0x100 [ 222.678970][ C1] ? security_bpf+0x82/0xb0 [ 222.678985][ C1] __sys_bpf+0x4bc/0x760 [ 222.678999][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 222.679017][ C1] ? __kasan_check_read+0x11/0x20 [ 222.679034][ C1] __x64_sys_bpf+0x7c/0x90 [ 222.679048][ C1] do_syscall_64+0x3d/0xb0 [ 222.679063][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 222.679077][ C1] RIP: 0033:0x7f89ff751ea9 [ 222.679091][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 222.679103][ C1] RSP: 002b:00007f89feacc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 222.679118][ C1] RAX: ffffffffffffffda RBX: 00007f89ff888f80 RCX: 00007f89ff751ea9 [ 222.679129][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 222.679139][ C1] RBP: 00007f89ff7c0ff4 R08: 0000000000000000 R09: 0000000000000000 [ 222.679148][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 222.679157][ C1] R13: 000000000000000b R14: 00007f89ff888f80 R15: 00007fff1bc5bf78 [ 222.679171][ C1] [ 353.043994][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 225s! [syz-executor.3:5078] [ 353.052412][ C0] Modules linked in: [ 353.056139][ C0] CPU: 0 PID: 5078 Comm: syz-executor.3 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 353.067593][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 353.077601][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 353.082372][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 353.102340][ C0] RSP: 0018:ffffc90000bb6580 EFLAGS: 00000246 [ 353.108232][ C0] RAX: 0000000000000003 RBX: 1ffff92000176cb4 RCX: ffffffff8154fb7f [ 353.116044][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881267cb528 [ 353.123854][ C0] RBP: ffffc90000bb6630 R08: dffffc0000000000 R09: ffffed1024cf96a6 [ 353.131669][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 353.139478][ C0] R13: ffff8881267cb528 R14: 0000000000000003 R15: 1ffff92000176cb8 [ 353.147381][ C0] FS: 00007f834720e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 353.156143][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.162574][ C0] CR2: 0000000000000000 CR3: 0000000114f2e000 CR4: 00000000003506b0 [ 353.170468][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.178275][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 353.186086][ C0] Call Trace: [ 353.189214][ C0] [ 353.191907][ C0] ? show_regs+0x58/0x60 [ 353.195982][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 353.200935][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 353.206049][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 353.211386][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 353.216381][ C0] ? clockevents_program_event+0x22f/0x300 [ 353.222022][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 353.227924][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 353.232875][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 353.238771][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 353.244418][ C0] [ 353.247192][ C0] [ 353.249971][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 353.256047][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 353.262121][ C0] ? kvm_wait+0x147/0x180 [ 353.266285][ C0] ? __set_page_owner+0x2c7/0x2e0 [ 353.271151][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 353.276180][ C0] ? pv_hash+0x86/0x150 [ 353.280173][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 353.286077][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 353.292323][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 353.297185][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 353.302221][ C0] sock_map_delete_elem+0x99/0x130 [ 353.307167][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 353.312546][ C0] bpf_trace_run4+0x1b6/0x270 [ 353.317063][ C0] ? bpf_trace_run3+0x250/0x250 [ 353.321746][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.327130][ C0] __alloc_pages+0x3cb/0x8f0 [ 353.331554][ C0] ? prep_new_page+0x110/0x110 [ 353.336156][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.341622][ C0] ? stack_trace_save+0x113/0x1c0 [ 353.347007][ C0] __stack_depot_save+0x38d/0x470 [ 353.351865][ C0] stack_depot_save+0xe/0x10 [ 353.356289][ C0] save_stack+0x104/0x1e0 [ 353.360460][ C0] ? __reset_page_owner+0x190/0x190 [ 353.365493][ C0] ? post_alloc_hook+0x1a3/0x1b0 [ 353.370262][ C0] ? prep_new_page+0x1b/0x110 [ 353.374779][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 353.380427][ C0] ? __alloc_pages+0x27e/0x8f0 [ 353.385025][ C0] ? __stack_depot_save+0x38d/0x470 [ 353.390061][ C0] ? kasan_set_track+0x5d/0x70 [ 353.394771][ C0] ? kasan_set_free_info+0x23/0x40 [ 353.399719][ C0] ? ____kasan_slab_free+0x126/0x160 [ 353.404838][ C0] ? __kasan_slab_free+0x11/0x20 [ 353.409620][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 353.415002][ C0] ? kfree+0xc8/0x220 [ 353.418813][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.423500][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 353.428623][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 353.434175][ C0] ? bpf_trace_run4+0x1b6/0x270 [ 353.438864][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.444332][ C0] __set_page_owner+0x28/0x2e0 [ 353.448932][ C0] ? kernel_init_free_pages+0xda/0xf0 [ 353.454138][ C0] post_alloc_hook+0x1a3/0x1b0 [ 353.458941][ C0] prep_new_page+0x1b/0x110 [ 353.463277][ C0] get_page_from_freelist+0x3550/0x35d0 [ 353.468663][ C0] ? strncpy_from_user+0x209/0x2d0 [ 353.473606][ C0] ? search_extable+0xaf/0xf0 [ 353.478122][ C0] ? search_extable+0xf0/0xf0 [ 353.482635][ C0] ? strncpy_from_user+0x209/0x2d0 [ 353.487755][ C0] ? lruvec_init+0x150/0x150 [ 353.492181][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 353.496784][ C0] ? __alloc_pages_bulk+0xe40/0xe40 [ 353.501814][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 353.506711][ C0] __alloc_pages+0x27e/0x8f0 [ 353.511105][ C0] ? prep_new_page+0x110/0x110 [ 353.515702][ C0] ? stack_trace_save+0x113/0x1c0 [ 353.520562][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 353.525508][ C0] ? stack_trace_save+0x113/0x1c0 [ 353.530368][ C0] __stack_depot_save+0x38d/0x470 [ 353.535231][ C0] ? kfree+0xc8/0x220 [ 353.539058][ C0] kasan_set_track+0x5d/0x70 [ 353.543480][ C0] ? kasan_set_track+0x4b/0x70 [ 353.548074][ C0] ? kasan_set_free_info+0x23/0x40 [ 353.553020][ C0] ? ____kasan_slab_free+0x126/0x160 [ 353.560512][ C0] ? __kasan_slab_free+0x11/0x20 [ 353.565279][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 353.570657][ C0] ? kfree+0xc8/0x220 [ 353.574473][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.579161][ C0] ? sock_map_delete_elem+0xc1/0x130 [ 353.584285][ C0] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 353.589836][ C0] ? bpf_trace_run4+0x1b6/0x270 [ 353.594975][ C0] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.600554][ C0] ? __alloc_pages+0x3cb/0x8f0 [ 353.605150][ C0] ? __get_free_pages+0x10/0x30 [ 353.609836][ C0] ? kasan_populate_vmalloc_pte+0x39/0x130 [ 353.615476][ C0] ? __apply_to_page_range+0x8dd/0xbe0 [ 353.620778][ C0] ? apply_to_page_range+0x3b/0x50 [ 353.625735][ C0] ? kasan_populate_vmalloc+0x65/0x70 [ 353.631020][ C0] ? alloc_vmap_area+0x192f/0x1a80 [ 353.635969][ C0] ? __get_vm_area_node+0x158/0x360 [ 353.641358][ C0] ? __vmalloc_node_range+0xe2/0x8d0 [ 353.646463][ C0] ? bpf_map_area_alloc+0xd9/0xf0 [ 353.651484][ C0] ? array_map_alloc+0x278/0x6d0 [ 353.656207][ C0] ? map_create+0x411/0x2050 [ 353.660733][ C0] ? __sys_bpf+0x296/0x760 [ 353.664978][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 353.669784][ C0] ? do_syscall_64+0x3d/0xb0 [ 353.674287][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.680358][ C0] kasan_set_free_info+0x23/0x40 [ 353.685122][ C0] ____kasan_slab_free+0x126/0x160 [ 353.690065][ C0] __kasan_slab_free+0x11/0x20 [ 353.694666][ C0] slab_free_freelist_hook+0xbd/0x190 [ 353.700042][ C0] ? sock_map_unref+0x352/0x4d0 [ 353.704732][ C0] kfree+0xc8/0x220 [ 353.708378][ C0] sock_map_unref+0x352/0x4d0 [ 353.712892][ C0] sock_map_delete_elem+0xc1/0x130 [ 353.717840][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 353.723315][ C0] bpf_trace_run4+0x1b6/0x270 [ 353.727821][ C0] ? bpf_trace_run3+0x250/0x250 [ 353.732507][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.737889][ C0] __alloc_pages+0x3cb/0x8f0 [ 353.742311][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 353.746752][ C0] ? prep_new_page+0x110/0x110 [ 353.751543][ C0] __get_free_pages+0x10/0x30 [ 353.756052][ C0] kasan_populate_vmalloc_pte+0x39/0x130 [ 353.761520][ C0] ? __apply_to_page_range+0x8ca/0xbe0 [ 353.766814][ C0] __apply_to_page_range+0x8dd/0xbe0 [ 353.772110][ C0] ? kasan_populate_vmalloc+0x70/0x70 [ 353.777318][ C0] ? kasan_populate_vmalloc+0x70/0x70 [ 353.782534][ C0] apply_to_page_range+0x3b/0x50 [ 353.787302][ C0] kasan_populate_vmalloc+0x65/0x70 [ 353.792339][ C0] alloc_vmap_area+0x192f/0x1a80 [ 353.797106][ C0] ? vm_map_ram+0xa90/0xa90 [ 353.801444][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 353.806913][ C0] ? __get_vm_area_node+0x117/0x360 [ 353.812232][ C0] __get_vm_area_node+0x158/0x360 [ 353.817175][ C0] ? selinux_capset+0xf0/0xf0 [ 353.821777][ C0] __vmalloc_node_range+0xe2/0x8d0 [ 353.826835][ C0] ? array_map_alloc+0x278/0x6d0 [ 353.831595][ C0] ? bpf_link_settle+0xc0/0x150 [ 353.836292][ C0] ? cap_capable+0x1d2/0x270 [ 353.840708][ C0] bpf_map_area_alloc+0xd9/0xf0 [ 353.845466][ C0] ? array_map_alloc+0x278/0x6d0 [ 353.850172][ C0] array_map_alloc+0x278/0x6d0 [ 353.854773][ C0] map_create+0x411/0x2050 [ 353.859022][ C0] __sys_bpf+0x296/0x760 [ 353.863103][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 353.868307][ C0] ? __kasan_check_read+0x11/0x20 [ 353.873461][ C0] __x64_sys_bpf+0x7c/0x90 [ 353.877861][ C0] do_syscall_64+0x3d/0xb0 [ 353.882134][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.887833][ C0] RIP: 0033:0x7f8347e93ea9 [ 353.892085][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 353.911961][ C0] RSP: 002b:00007f834720e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.920210][ C0] RAX: ffffffffffffffda RBX: 00007f8347fcaf80 RCX: 00007f8347e93ea9 [ 353.928017][ C0] RDX: 0000000000000048 RSI: 0000000020000280 RDI: 0000000000000000 [ 353.936355][ C0] RBP: 00007f8347f02ff4 R08: 0000000000000000 R09: 0000000000000000 [ 353.944160][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 353.952064][ C0] R13: 000000000000000b R14: 00007f8347fcaf80 R15: 00007fffd13da6b8 [ 353.959966][ C0] [ 353.962821][ C0] Sending NMI from CPU 0 to CPUs 1: [ 353.967874][ C1] NMI backtrace for cpu 1 [ 353.967885][ C1] CPU: 1 PID: 5081 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 353.967902][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 353.967912][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 353.967933][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 4b 02 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 353.967947][ C1] RSP: 0018:ffffc90000aa7140 EFLAGS: 00000246 [ 353.967962][ C1] RAX: 0000000000000001 RBX: 1ffff92000154e2c RCX: 1ffffffff0d1aa9c [ 353.967973][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 353.967983][ C1] RBP: ffffc90000aa71f0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 353.967998][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 353.968009][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff92000154e30 [ 353.968020][ C1] FS: 00007f89feacc6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 353.968034][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 353.968045][ C1] CR2: 0000000000000000 CR3: 00000001273fd000 CR4: 00000000003506a0 [ 353.968057][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 353.968067][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 353.968076][ C1] Call Trace: [ 353.968081][ C1] [ 353.968087][ C1] ? show_regs+0x58/0x60 [ 353.968103][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 353.968122][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 353.968141][ C1] ? kvm_wait+0x147/0x180 [ 353.968154][ C1] ? kvm_wait+0x147/0x180 [ 353.968168][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 353.968184][ C1] ? nmi_handle+0xa8/0x280 [ 353.968200][ C1] ? kvm_wait+0x147/0x180 [ 353.968212][ C1] ? kvm_wait+0x147/0x180 [ 353.968226][ C1] ? default_do_nmi+0x69/0x160 [ 353.968243][ C1] ? exc_nmi+0xaf/0x120 [ 353.968257][ C1] ? end_repeat_nmi+0x16/0x31 [ 353.968275][ C1] ? kvm_wait+0x147/0x180 [ 353.968289][ C1] ? kvm_wait+0x147/0x180 [ 353.968302][ C1] ? kvm_wait+0x147/0x180 [ 353.968316][ C1] [ 353.968320][ C1] [ 353.968324][ C1] ? asm_common_interrupt+0x27/0x40 [ 353.968338][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 353.968355][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 353.968376][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 353.968396][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 353.968413][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 353.968432][ C1] sock_map_delete_elem+0x99/0x130 [ 353.968452][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xf40 [ 353.968464][ C1] bpf_trace_run4+0x1b6/0x270 [ 353.968482][ C1] ? bpf_trace_run3+0x250/0x250 [ 353.968501][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 353.968518][ C1] __alloc_pages+0x3cb/0x8f0 [ 353.968535][ C1] ? prep_new_page+0x110/0x110 [ 353.968553][ C1] ? __kasan_kmalloc+0x9/0x10 [ 353.968567][ C1] ? __kmalloc+0x13a/0x270 [ 353.968582][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 353.968598][ C1] __vmalloc_node_range+0x482/0x8d0 [ 353.968616][ C1] module_alloc+0x81/0x90 [ 353.968629][ C1] ? bpf_jit_alloc_exec+0x15/0x20 [ 353.968645][ C1] bpf_jit_alloc_exec+0x15/0x20 [ 353.968661][ C1] bpf_jit_binary_alloc+0x12b/0x260 [ 353.968676][ C1] ? bpf_int_jit_compile+0xc6d0/0xc6d0 [ 353.968699][ C1] bpf_int_jit_compile+0xb2a2/0xc6d0 [ 353.968723][ C1] ? emit_bpf_dispatcher+0xd90/0xd90 [ 353.968748][ C1] bpf_prog_select_runtime+0x706/0x9e0 [ 353.968765][ C1] ? memset+0x35/0x40 [ 353.968779][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 353.968794][ C1] bpf_prog_load+0x1315/0x1b50 [ 353.968811][ C1] ? map_freeze+0x370/0x370 [ 353.968829][ C1] ? selinux_bpf+0xcb/0x100 [ 353.968843][ C1] ? security_bpf+0x82/0xb0 [ 353.968858][ C1] __sys_bpf+0x4bc/0x760 [ 353.968872][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 353.968889][ C1] ? __kasan_check_read+0x11/0x20 [ 353.968905][ C1] __x64_sys_bpf+0x7c/0x90 [ 353.968919][ C1] do_syscall_64+0x3d/0xb0 [ 353.968933][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.968948][ C1] RIP: 0033:0x7f89ff751ea9 [ 353.968962][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 353.968974][ C1] RSP: 002b:00007f89feacc0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.968989][ C1] RAX: ffffffffffffffda RBX: 00007f89ff888f80 RCX: 00007f89ff751ea9 [ 353.969000][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 353.969009][ C1] RBP: 00007f89ff7c0ff4 R08: 0000000000000000 R09: 0000000000000000 [ 353.969019][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 353.969028][ C1] R13: 000000000000000b R14: 00007f89ff888f80 R15: 00007fff1bc5bf78 [ 353.969041][ C1]