last executing test programs: 5.460905784s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) 4.240370741s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) 3.006881479s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) 2.289972619s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) 2.213923751s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0xfffffffffffffed3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 2.198432993s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000280)={0x0, 0x1, [@remote]}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 1.936967683s ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000180), 0x0}, 0x20) 1.928867734s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000180), 0x12) write$cgroup_pid(r1, &(0x7f0000000340), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000280)={0x0, 0x1, [@remote]}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 1.605636574s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c250000000000206ea37b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fcae68da850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1807000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1b, 0x6, 0x0, 0x8000, 0x81}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x61, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000009f2000000000000000018190000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7fc000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000300)='ext4_fc_commit_start\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, &(0x7f0000000980), 0x12) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="30a0", 0x2}], 0x1}, 0x4040001) recvmsg$unix(r1, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0x1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r7, 0x58, &(0x7f0000000340)}, 0x10) recvmsg$unix(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000000c0)=""/109, 0x6d}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r11}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000400)='ns/cgroup\x00') 1.49900723s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r0}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x4}, {}, {}, {}]}, 0x90) 1.420887642s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r0}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x4}, {}, {}, {}]}, 0x90) 1.178180219s ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x4}, {}, {}, {}]}, 0x90) 1.11004989s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000280)={0x0, 0x1, [@remote]}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 873.574606ms ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000180), 0x0}, 0x20) 867.003197ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x4}, {}, {}, {}]}, 0x90) 850.77029ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) 652.78674ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000008000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r3}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x3, 0xbe, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r5, &(0x7f00000000c0), &(0x7f00000005c0)=""/4096}, 0x20) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r7}, 0x10) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r8}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 623.705294ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x7f, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f00000001c0), &(0x7f0000000ac0)}, 0x7e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='blkio.bfq.time_recursive\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x4}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6eba, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='sched_switch\x00', r0}, 0x10) 575.597562ms ago: executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYRESDEC], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x8, '\x00', 0x0, r5, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_devices(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8000000000000000"], 0x8) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) 454.89622ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000280)={0x0, 0x1, [@remote]}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 451.245171ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 325.93812ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r2}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x29, 0x43451) 290.024805ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0xfffffffffffffed3) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 266.698769ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x29d2}, 0xa0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$cgroup_type(r5, &(0x7f00000003c0), 0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff03000008000000b7040000000000008500000001000000950000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c45630002008daa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x46, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r9}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x447e, 0x8}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={0x0, 0x0, 0x5b}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x5, &(0x7f00000002c0)=@framed={{0x4e, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@generic={0x6, 0x0, 0x1, 0x1f, 0x5}, @jmp={0x5, 0x1, 0x5, 0x0, 0x9, 0x1, 0x4}]}, &(0x7f0000000480)='syzkaller\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) 247.793052ms ago: executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000b80)='tlb_flush\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa1) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="9b5ae92f93791800"/20, @ANYRES32=r4, @ANYBLOB="000000d347739500b7080000000000007b8af8ff00000003000000000000000007020000f8ffffffb7040000ff03000000000000f6000017690000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="c5"}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) 109.216593ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000180), 0x12) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000280)={0x0, 0x1, [@remote]}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 46.486983ms ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143ffd, 0x7fe2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000180), 0x0}, 0x20) 23.044546ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r0}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x2}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x4}, {}, {}, {}]}, 0x90) 13.964828ms ago: executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1, 0x4, 0x40, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x15, 0x0, 0x0, 0x6}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x45}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, 0x0, &(0x7f0000000840)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0xcb33, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0x3f, &(0x7f0000001380)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000013c0), &(0x7f0000001400), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000001440)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001680)={{r1}, &(0x7f0000001600), &(0x7f0000001640)=r1}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000016c0)={r1}, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x12) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_pid(r3, &(0x7f0000000340), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) 0s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{}, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8}, 0x90) kernel console output (not intermixed with test programs): ice syzkaller0 entered promiscuous mode [ 338.267623][T10931] device syzkaller0 entered promiscuous mode [ 338.275334][T10935] device pim6reg1 entered promiscuous mode [ 338.436534][T10946] syz-executor.0[10946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.436598][T10946] syz-executor.0[10946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.844237][T10963] device syzkaller0 entered promiscuous mode [ 339.152541][T10969] device syzkaller0 entered promiscuous mode [ 339.434144][T10996] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 339.440281][T10997] device syzkaller0 entered promiscuous mode [ 340.134171][T11013] device syzkaller0 entered promiscuous mode [ 340.397769][T11025] device syzkaller0 entered promiscuous mode [ 340.405723][ T30] audit: type=1400 audit(1719180959.711:140): avc: denied { create } for pid=11018 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 341.105312][T11077] device syzkaller0 entered promiscuous mode [ 341.678062][T11108] device syzkaller0 entered promiscuous mode [ 342.237663][ T30] audit: type=1400 audit(1719180961.551:141): avc: denied { setopt } for pid=11139 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 342.809326][T11153] device syzkaller0 entered promiscuous mode [ 343.608089][T11216] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 344.080751][T11246] device syzkaller0 entered promiscuous mode [ 344.117513][T11252] syz-executor.0[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.117577][T11252] syz-executor.0[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.173780][T11298] device syzkaller0 entered promiscuous mode [ 345.285943][T11316] syz-executor.0[11316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.286002][T11316] syz-executor.0[11316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.429596][T11301] device syzkaller0 entered promiscuous mode [ 347.327277][T11377] device syzkaller0 entered promiscuous mode [ 348.185442][T11425] device syzkaller0 entered promiscuous mode [ 349.008675][ T30] audit: type=1400 audit(1719180968.311:142): avc: denied { ioctl } for pid=11450 comm="syz-executor.4" path="cgroup:[4026532385]" dev="nsfs" ino=4026532385 ioctlcmd=0x2406 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 349.244623][T11463] device syzkaller0 entered promiscuous mode [ 349.320331][T11467] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 349.531609][T11470] device syzkaller0 entered promiscuous mode [ 350.211995][T11504] syz-executor.1[11504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.212247][T11504] syz-executor.1[11504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.285238][T11504] syz-executor.1[11504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.354783][T11504] syz-executor.1[11504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.391009][T11508] device vxcan1 entered promiscuous mode [ 351.284155][T11527] device syzkaller0 entered promiscuous mode [ 351.585700][T11521] device syzkaller0 entered promiscuous mode [ 351.837782][T11547] syz-executor.0[11547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.838032][T11547] syz-executor.0[11547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.854521][T11547] syz-executor.0[11547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.869378][T11547] syz-executor.0[11547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.658299][T11596] device syzkaller0 entered promiscuous mode [ 352.969563][T11610] syz-executor.0[11610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.969792][T11610] syz-executor.0[11610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.045710][ T30] audit: type=1400 audit(1719180972.351:143): avc: denied { create } for pid=11611 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 353.106626][T11620] tap0: tun_chr_ioctl cmd 1074025677 [ 353.112297][T11620] tap0: linktype set to 768 [ 353.183585][T11620] device syzkaller0 entered promiscuous mode [ 353.192189][ T1375] syzkaller0: tun_net_xmit 48 [ 353.200584][T11620] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 353.228245][T11624] ªªªªªª: renamed from vlan0 [ 353.788452][T11646] device syzkaller0 entered promiscuous mode [ 354.392288][T11665] device syzkaller0 entered promiscuous mode [ 355.001992][T11680] device syzkaller0 entered promiscuous mode [ 355.444932][T11694] device syzkaller0 entered promiscuous mode [ 355.494375][T11695] device syzkaller0 entered promiscuous mode [ 356.559778][T11727] device syzkaller0 entered promiscuous mode [ 356.677572][T11736] device vxcan1 entered promiscuous mode [ 356.781184][T11742] device syzkaller0 entered promiscuous mode [ 357.747900][T11779] device syzkaller0 entered promiscuous mode [ 358.622440][T11785] device syzkaller0 entered promiscuous mode [ 358.804064][T11798] device syzkaller0 entered promiscuous mode [ 360.050068][T11841] device bridge_slave_1 left promiscuous mode [ 360.056033][T11841] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.249670][T11841] device bridge_slave_0 left promiscuous mode [ 360.264547][T11841] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.523528][T11857] device syzkaller0 entered promiscuous mode [ 360.945688][T11860] device syzkaller0 entered promiscuous mode [ 362.708701][T11896] device syzkaller0 entered promiscuous mode [ 363.055374][T11903] device syzkaller0 entered promiscuous mode [ 364.953918][T11941] device syzkaller0 entered promiscuous mode [ 365.607030][T11952] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 366.682478][T11988] device syzkaller0 entered promiscuous mode [ 367.227736][T12011] ªªªªªª: renamed from vlan0 [ 368.178414][T12039] device syzkaller0 entered promiscuous mode [ 368.258782][T12042] bpf_get_probe_write_proto: 6 callbacks suppressed [ 368.258799][T12042] syz-executor.3[12042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.297480][T12042] syz-executor.3[12042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.341898][T12043] device syzkaller0 entered promiscuous mode [ 369.510516][T12096] ent_enter: renamed from ipvlan1 [ 370.053828][T12103] device syzkaller0 entered promiscuous mode [ 370.163286][T12109] device syzkaller0 entered promiscuous mode [ 370.657638][T12136] device syzkaller0 entered promiscuous mode [ 371.570619][T12147] device syzkaller0 entered promiscuous mode [ 371.621827][T12157] device syzkaller0 entered promiscuous mode [ 371.708185][T12162] device syzkaller0 entered promiscuous mode [ 371.847794][T12155] device syzkaller0 entered promiscuous mode [ 372.716686][T12182] device syzkaller0 entered promiscuous mode [ 372.887900][T12196] device syzkaller0 entered promiscuous mode [ 373.054844][T12204] device syzkaller0 entered promiscuous mode [ 373.333313][T12209] device syzkaller0 entered promiscuous mode [ 374.114343][T12240] device syzkaller0 entered promiscuous mode [ 374.531082][T12248] device syzkaller0 entered promiscuous mode [ 374.848666][T12256] device syzkaller0 entered promiscuous mode [ 374.915540][T12258] device syzkaller0 entered promiscuous mode [ 376.443632][T12291] device syzkaller0 entered promiscuous mode [ 376.759348][T12288] device syzkaller0 entered promiscuous mode [ 377.470111][T12304] device syzkaller0 entered promiscuous mode [ 377.842021][T12316] syz-executor.4 (12316) used greatest stack depth: 20592 bytes left [ 377.858916][T12306] device syzkaller0 entered promiscuous mode [ 378.055426][T12318] device syzkaller0 entered promiscuous mode [ 378.610991][T12334] device syzkaller0 entered promiscuous mode [ 379.360308][T12343] device syzkaller0 entered promiscuous mode [ 380.066736][T12361] device syzkaller0 entered promiscuous mode [ 380.401775][T12364] device syzkaller0 entered promiscuous mode [ 380.520317][T12366] device syzkaller0 entered promiscuous mode [ 381.219743][T12382] device syzkaller0 entered promiscuous mode [ 382.036227][T12387] device syzkaller0 entered promiscuous mode [ 382.982432][T12410] device syzkaller0 entered promiscuous mode [ 383.087511][T12416] device syzkaller0 entered promiscuous mode [ 383.714824][T12430] device syzkaller0 entered promiscuous mode [ 384.307658][T12433] device syzkaller0 entered promiscuous mode [ 384.811804][T12445] device syzkaller0 entered promiscuous mode [ 385.362399][T12452] device syzkaller0 entered promiscuous mode [ 385.890667][T12462] device syzkaller0 entered promiscuous mode [ 386.695733][T12491] device syzkaller0 entered promiscuous mode [ 387.383871][T12506] device syzkaller0 entered promiscuous mode [ 387.661240][T12509] device syzkaller0 entered promiscuous mode [ 388.167007][T12523] device syzkaller0 entered promiscuous mode [ 388.835727][T12536] device syzkaller0 entered promiscuous mode [ 389.931200][T12546] device syzkaller0 entered promiscuous mode [ 390.073789][T12550] device syzkaller0 entered promiscuous mode [ 390.787501][T12578] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 390.802693][T12575] device syzkaller0 entered promiscuous mode [ 391.595944][T12594] device syzkaller0 entered promiscuous mode [ 392.763787][T12611] device syzkaller0 entered promiscuous mode [ 393.088366][T12625] device syzkaller0 entered promiscuous mode [ 393.594457][T12613] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.650007][T12613] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.700378][T12613] device bridge_slave_0 entered promiscuous mode [ 393.784440][T12613] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.815892][T12613] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.823327][T12613] device bridge_slave_1 entered promiscuous mode [ 393.979400][T10629] device bridge_slave_1 left promiscuous mode [ 393.987736][T10629] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.060756][T10629] device bridge_slave_0 left promiscuous mode [ 394.106091][T10629] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.180190][T10629] device veth1_macvtap left promiscuous mode [ 394.228799][T10629] device veth0_vlan left promiscuous mode [ 394.688104][T12664] device syzkaller0 entered promiscuous mode [ 394.898051][T12667] device syzkaller0 entered promiscuous mode [ 395.172190][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.189787][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.281458][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.307517][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.410131][ T9908] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.417004][ T9908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.598577][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 395.658081][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.716840][ T9908] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.723705][ T9908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.730966][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.738788][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.755791][T12613] device veth0_vlan entered promiscuous mode [ 395.848381][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 395.878537][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.962706][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 396.068766][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 396.076095][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 396.258854][T12613] device veth1_macvtap entered promiscuous mode [ 396.336330][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 396.439552][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 396.484245][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 396.660091][T12705] device syzkaller0 entered promiscuous mode [ 396.757730][T12707] device syzkaller0 entered promiscuous mode [ 396.808014][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 396.826634][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 396.886885][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 396.895000][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 397.745854][T12743] syz-executor.2[12743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.745918][T12743] syz-executor.2[12743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.819687][T12746] device syzkaller0 entered promiscuous mode [ 398.530117][T12762] device syzkaller0 entered promiscuous mode [ 399.362603][T12802] device syzkaller0 entered promiscuous mode [ 399.554196][T12808] device syzkaller0 entered promiscuous mode [ 400.271718][T12816] device syzkaller0 entered promiscuous mode [ 400.384913][T12814] syz-executor.4 (12814) used greatest stack depth: 20568 bytes left [ 400.743615][T12841] syz-executor.1[12841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.743683][T12841] syz-executor.1[12841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.091288][T12842] device syzkaller0 entered promiscuous mode [ 401.425229][T12852] device syzkaller0 entered promiscuous mode [ 401.502741][T12859] device syzkaller0 entered promiscuous mode [ 402.851281][T12895] device syzkaller0 entered promiscuous mode [ 403.338872][T12905] device syzkaller0 entered promiscuous mode [ 403.671770][T12922] device syzkaller0 entered promiscuous mode [ 404.844372][T12942] device syzkaller0 entered promiscuous mode [ 405.324611][T12968] device syzkaller0 entered promiscuous mode [ 405.338796][T12969] device syzkaller0 entered promiscuous mode [ 405.781012][T12970] device syzkaller0 entered promiscuous mode [ 406.085153][T12977] syz-executor.1[12977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.085213][T12977] syz-executor.1[12977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.116600][T12978] device syzkaller0 entered promiscuous mode [ 407.043413][T13014] device syzkaller0 entered promiscuous mode [ 407.643216][T13019] device syzkaller0 entered promiscuous mode [ 407.702599][T13030] device syzkaller0 entered promiscuous mode [ 407.967513][T13040] device syzkaller0 entered promiscuous mode [ 408.013865][T13047] device syzkaller0 entered promiscuous mode [ 409.299864][T13063] device syzkaller0 entered promiscuous mode [ 409.802915][T13084] device syzkaller0 entered promiscuous mode [ 409.809551][T13086] device veth1_macvtap entered promiscuous mode [ 409.815730][T13086] device macsec0 entered promiscuous mode [ 409.918497][T12793] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.936566][T13089] device syzkaller0 entered promiscuous mode [ 410.382067][T13099] device syzkaller0 entered promiscuous mode [ 411.068384][T13119] device syzkaller0 entered promiscuous mode [ 412.315425][T13149] device syzkaller0 entered promiscuous mode [ 412.743158][T13159] device syzkaller0 entered promiscuous mode [ 412.974603][T13161] device syzkaller0 entered promiscuous mode [ 414.403796][T13198] device syzkaller0 entered promiscuous mode [ 414.991271][T13212] device syzkaller0 entered promiscuous mode [ 416.873578][T13271] device syzkaller0 entered promiscuous mode [ 419.351448][T13324] device syzkaller0 entered promiscuous mode [ 419.637088][T13321] device syzkaller0 entered promiscuous mode [ 419.795772][T13343] syz-executor.0[13343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.795836][T13343] syz-executor.0[13343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.029009][T13377] device syzkaller0 entered promiscuous mode [ 421.486527][T13386] device syzkaller0 entered promiscuous mode [ 423.144735][T13423] device syzkaller0 entered promiscuous mode [ 423.701042][T13441] device syzkaller0 entered promiscuous mode [ 425.387185][T13469] device syzkaller0 entered promiscuous mode [ 425.644708][T13475] device syzkaller0 entered promiscuous mode [ 427.642087][T13522] device syzkaller0 entered promiscuous mode [ 428.078283][T13534] device syzkaller0 entered promiscuous mode [ 428.450115][T13537] device syzkaller0 entered promiscuous mode [ 430.269751][T13573] device syzkaller0 entered promiscuous mode [ 430.763079][T13575] device syzkaller0 entered promiscuous mode [ 430.990197][T13588] device syzkaller0 entered promiscuous mode [ 431.056741][T13591] device syzkaller0 entered promiscuous mode [ 432.255405][T13612] device syzkaller0 entered promiscuous mode [ 432.879443][T13625] device syzkaller0 entered promiscuous mode [ 433.291083][T13632] device syzkaller0 entered promiscuous mode [ 433.831451][T13644] device syzkaller0 entered promiscuous mode [ 434.669400][T13663] device syzkaller0 entered promiscuous mode [ 435.462244][T13670] device syzkaller0 entered promiscuous mode [ 435.756394][T13678] device syzkaller0 entered promiscuous mode [ 436.586836][T13709] device syzkaller0 entered promiscuous mode [ 436.711579][T13715] device syzkaller0 entered promiscuous mode [ 437.273663][T13736] device syzkaller0 entered promiscuous mode [ 437.603833][T13741] device syzkaller0 entered promiscuous mode [ 437.627176][T13742] device syzkaller0 entered promiscuous mode [ 438.442503][T13757] device syzkaller0 entered promiscuous mode [ 438.629258][T13764] device syzkaller0 entered promiscuous mode [ 439.353595][T13776] device syzkaller0 entered promiscuous mode [ 439.960403][T13793] device syzkaller0 entered promiscuous mode [ 440.845550][T13814] device syzkaller0 entered promiscuous mode [ 441.078349][T13818] device syzkaller0 entered promiscuous mode [ 442.032682][T13839] device syzkaller0 entered promiscuous mode [ 443.017451][T13869] device syzkaller0 entered promiscuous mode [ 443.592187][T13878] device syzkaller0 entered promiscuous mode [ 443.940246][T13891] device syzkaller0 entered promiscuous mode [ 444.986610][T13912] device syzkaller0 entered promiscuous mode [ 445.123959][T13920] device syzkaller0 entered promiscuous mode [ 445.991780][T13954] device syzkaller0 entered promiscuous mode [ 446.795562][T13976] device syzkaller0 entered promiscuous mode [ 447.003818][T13982] device pim6reg1 entered promiscuous mode [ 447.021242][T13983] device syzkaller0 entered promiscuous mode [ 448.178882][T14006] device syzkaller0 entered promiscuous mode [ 448.605661][T14015] device syzkaller0 entered promiscuous mode [ 449.051462][T14025] device syzkaller0 entered promiscuous mode [ 450.106468][T14054] device syzkaller0 entered promiscuous mode [ 450.199551][T14069] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 450.240479][T14058] device syzkaller0 entered promiscuous mode [ 450.672719][T14084] device syzkaller0 entered promiscuous mode [ 451.424902][T14105] device syzkaller0 entered promiscuous mode [ 452.428591][T14114] device syzkaller0 entered promiscuous mode [ 453.025920][T14149] syz-executor.1[14149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.025982][T14149] syz-executor.1[14149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.362432][T14145] device syzkaller0 entered promiscuous mode [ 453.685165][T14170] device syzkaller0 entered promiscuous mode [ 454.038504][T14191] dvmrp1: tun_chr_ioctl cmd 2148553947 [ 454.105786][T14191] device wg2 entered promiscuous mode [ 454.836811][T14205] device syzkaller0 entered promiscuous mode [ 455.446612][T14228] device syzkaller0 entered promiscuous mode [ 455.589666][T14227] device syzkaller0 entered promiscuous mode [ 456.839902][T14269] device syzkaller0 entered promiscuous mode [ 458.942810][T14317] device syzkaller0 entered promiscuous mode [ 459.840690][T14358] device syzkaller0 entered promiscuous mode [ 460.386415][T14378] device syzkaller0 entered promiscuous mode [ 460.444464][T14387] syz-executor.1[14387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.444529][T14387] syz-executor.1[14387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.721147][T14405] device syzkaller0 entered promiscuous mode [ 462.031474][T14424] device syzkaller0 entered promiscuous mode [ 463.621778][T14474] device syzkaller0 entered promiscuous mode [ 464.998291][T14539] device syzkaller0 entered promiscuous mode [ 466.317535][T14586] device syzkaller0 entered promiscuous mode [ 466.394810][T14590] device syzkaller0 entered promiscuous mode [ 467.684811][T14623] device syzkaller0 entered promiscuous mode [ 467.932311][T14643] device syzkaller0 entered promiscuous mode [ 467.976350][T14642] device syzkaller0 entered promiscuous mode [ 469.456227][T14674] device syzkaller0 entered promiscuous mode [ 469.698235][T14689] device syzkaller0 entered promiscuous mode [ 469.916550][T14686] device syzkaller0 entered promiscuous mode [ 471.177991][T14730] device syzkaller0 entered promiscuous mode [ 471.452942][T14738] device syzkaller0 entered promiscuous mode [ 471.769045][T14761] device pim6reg1 entered promiscuous mode [ 472.502148][T14778] device syzkaller0 entered promiscuous mode [ 472.849289][T14787] device syzkaller0 entered promiscuous mode [ 473.136135][ T30] audit: type=1400 audit(1719181092.441:144): avc: denied { create } for pid=14806 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 473.931139][T14822] device syzkaller0 entered promiscuous mode [ 474.112123][T14836] syz-executor.2[14836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.112179][T14836] syz-executor.2[14836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.003789][T14869] device syzkaller0 entered promiscuous mode [ 475.248110][T14889] device syzkaller0 entered promiscuous mode [ 476.533237][T14949] device syzkaller0 entered promiscuous mode [ 477.564082][T14983] device syzkaller0 entered promiscuous mode [ 477.654905][T14994] device syzkaller0 entered promiscuous mode [ 478.055776][T15009] device macsec0 entered promiscuous mode [ 478.502425][T15030] device syzkaller0 entered promiscuous mode [ 478.708798][T15029] device syzkaller0 entered promiscuous mode [ 479.201016][T15049] device syzkaller0 entered promiscuous mode [ 480.444218][T15084] device syzkaller0 entered promiscuous mode [ 480.682799][T15098] device syzkaller0 entered promiscuous mode [ 481.697194][T15121] device syzkaller0 entered promiscuous mode [ 482.316433][T15135] device syzkaller0 entered promiscuous mode [ 483.244299][T15169] device syzkaller0 entered promiscuous mode [ 483.779953][T15171] device syzkaller0 entered promiscuous mode [ 483.882719][T15185] device syzkaller0 entered promiscuous mode [ 483.889006][T15188] : renamed from veth0_vlan [ 484.243883][T15202] device syzkaller0 entered promiscuous mode [ 484.266752][T15203] device syzkaller0 entered promiscuous mode [ 485.384746][T15214] device syzkaller0 entered promiscuous mode [ 485.546823][T15228] device syzkaller0 entered promiscuous mode [ 485.726488][T15225] device syzkaller0 entered promiscuous mode [ 486.022452][T15239] device syzkaller0 entered promiscuous mode [ 486.614803][T15245] device syzkaller0 entered promiscuous mode [ 487.101174][T15267] device syzkaller0 entered promiscuous mode [ 487.494841][T15272] device syzkaller0 entered promiscuous mode [ 487.797507][T15283] device syzkaller0 entered promiscuous mode [ 488.001449][T15281] device syzkaller0 entered promiscuous mode [ 488.596455][T15313] device syzkaller0 entered promiscuous mode [ 489.228601][T15324] device syzkaller0 entered promiscuous mode [ 489.364715][T15338] device syzkaller0 entered promiscuous mode [ 489.592404][T15348] device syzkaller0 entered promiscuous mode [ 490.000739][T15362] bond_slave_1: mtu less than device minimum [ 490.401683][T15371] device syzkaller0 entered promiscuous mode [ 490.710714][T15376] device syzkaller0 entered promiscuous mode [ 490.950006][T15392] syz-executor.1[15392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.950071][T15392] syz-executor.1[15392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.962933][T15392] syz-executor.1[15392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.976342][T15392] syz-executor.1[15392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.994878][T15384] device syzkaller0 entered promiscuous mode [ 491.080823][T15390] device syzkaller0 entered promiscuous mode [ 491.927322][T15416] device syzkaller0 entered promiscuous mode [ 492.250305][T15425] device syzkaller0 entered promiscuous mode [ 492.442960][T15427] device syzkaller0 entered promiscuous mode [ 493.918193][T15461] device syzkaller0 entered promiscuous mode [ 494.053125][T15485] device syzkaller0 entered promiscuous mode [ 494.073997][T15483] device syzkaller0 entered promiscuous mode [ 494.166829][T15484] device syzkaller0 entered promiscuous mode [ 494.877524][T15517] syz-executor.3[15517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.877586][T15517] syz-executor.3[15517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.024847][T15517] syz-executor.3[15517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.136434][T15517] syz-executor.3[15517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.320295][T15526] device syzkaller0 entered promiscuous mode [ 495.643022][T15533] device syzkaller0 entered promiscuous mode [ 495.754913][T15540] device syzkaller0 entered promiscuous mode [ 496.339500][T15561] syz-executor.1[15561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.339564][T15561] syz-executor.1[15561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.779320][T15579] device syzkaller0 entered promiscuous mode [ 498.124344][T15634] device syzkaller0 entered promiscuous mode [ 498.336789][T15632] device syzkaller0 entered promiscuous mode [ 499.440175][ T30] audit: type=1400 audit(1719181118.751:145): avc: denied { create } for pid=15674 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 499.606125][T15688] device syzkaller0 entered promiscuous mode [ 500.032277][T15691] device syzkaller0 entered promiscuous mode [ 500.046174][ C0] ------------[ cut here ]------------ [ 500.046174][ C1] ------------[ cut here ]------------ [ 500.046186][ C1] WARNING: CPU: 1 PID: 15684 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 500.051446][ C0] WARNING: CPU: 0 PID: 15692 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 500.056741][ C1] Modules linked in: [ 500.065942][ C0] Modules linked in: [ 500.075145][ C1] CPU: 1 PID: 15684 Comm: syz-executor.1 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 500.078882][ C0] CPU: 0 PID: 15692 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 500.082604][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 500.094152][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 500.105694][ C1] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 500.115587][ C0] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 500.125654][ C1] Code: 66 8b 05 e7 87 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 59 85 bf 7e 85 c0 74 02 5d c3 e8 5a 99 bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 500.131385][ C0] Code: 66 8b 05 e7 87 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 59 85 bf 7e 85 c0 74 02 5d c3 e8 5a 99 bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 500.137026][ C1] RSP: 0000:ffffc90000b37ae0 EFLAGS: 00010006 [ 500.156467][ C0] RSP: 0018:ffffc90000007ba0 EFLAGS: 00010006 [ 500.175911][ C1] [ 500.175916][ C1] RAX: 0000000080010203 RBX: ffff888111976f58 RCX: dffffc0000000000 [ 500.181810][ C0] [ 500.181814][ C0] RAX: 0000000080010203 RBX: ffff888111976f58 RCX: dffffc0000000000 [ 500.187713][ C1] RDX: 0000000080010203 RSI: 0000000000000201 RDI: ffffffff83fe6af2 [ 500.189885][ C0] RDX: 0000000080010203 RSI: 0000000000000201 RDI: ffffffff83fe6af2 [ 500.197695][ C1] RBP: ffffc90000b37ae0 R08: dffffc0000000000 R09: 0000000000000003 [ 500.199863][ C0] RBP: ffffc90000007ba0 R08: dffffc0000000000 R09: 0000000000000003 [ 500.207678][ C1] R10: fffff52000166f50 R11: dffffc0000000001 R12: 0000000000000000 [ 500.215572][ C0] R10: fffff52000000f68 R11: dffffc0000000001 R12: 0000000000000000 [ 500.223384][ C1] R13: dffffc0000000000 R14: 00000000fffffffe R15: ffff888111976f40 [ 500.231197][ C0] R13: dffffc0000000000 R14: 00000000fffffffe R15: ffff888111976f40 [ 500.239009][ C1] FS: 0000555556a65480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 500.246819][ C0] FS: 00007f8076a686c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 500.254630][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 500.262440][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 500.270253][ C1] CR2: 0000001b2e738000 CR3: 0000000126645000 CR4: 00000000003506a0 [ 500.279105][ C0] CR2: ffffffffffffffe8 CR3: 000000011a55c000 CR4: 00000000003506b0 [ 500.288015][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 500.294405][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 500.300823][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 500.308634][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 500.316444][ C1] Call Trace: [ 500.316452][ C1] [ 500.324254][ C0] Call Trace: [ 500.324261][ C0] [ 500.332071][ C1] ? show_regs+0x58/0x60 [ 500.339878][ C0] ? show_regs+0x58/0x60 [ 500.347690][ C1] ? __warn+0x160/0x2f0 [ 500.350816][ C0] ? __warn+0x160/0x2f0 [ 500.353591][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 500.356715][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 500.359408][ C1] ? report_bug+0x3d9/0x5b0 [ 500.363487][ C0] ? report_bug+0x3d9/0x5b0 [ 500.367569][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 500.371559][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 500.375551][ C1] ? handle_bug+0x41/0x70 [ 500.380589][ C0] ? handle_bug+0x41/0x70 [ 500.385621][ C1] ? exc_invalid_op+0x1b/0x50 [ 500.389959][ C0] ? exc_invalid_op+0x1b/0x50 [ 500.394298][ C1] ? asm_exc_invalid_op+0x1b/0x20 [ 500.399331][ C0] ? asm_exc_invalid_op+0x1b/0x20 [ 500.404367][ C1] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 500.408534][ C0] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 500.412698][ C1] ? __local_bh_enable_ip+0x6c/0x80 [ 500.417213][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 500.421727][ C1] _raw_spin_unlock_bh+0x51/0x60 [ 500.426585][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 500.431445][ C1] sock_hash_delete_elem+0x2a2/0x2f0 [ 500.436740][ C0] sock_hash_delete_elem+0x2a2/0x2f0 [ 500.442036][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x5f0 [ 500.447071][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x5f0 [ 500.452104][ C1] bpf_trace_run2+0xec/0x210 [ 500.456877][ C0] bpf_trace_run2+0xec/0x210 [ 500.461649][ C1] ? update_rq_clock+0x1e3/0x580 [ 500.466770][ C0] ? update_rq_clock+0x4e3/0x580 [ 500.472017][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 500.477360][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 500.482828][ C1] ? __kasan_check_write+0x14/0x20 [ 500.487256][ C0] ? __kasan_check_write+0x14/0x20 [ 500.491679][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 500.496454][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 500.501227][ C1] __bpf_trace_hrtimer_start+0x23/0x30 [ 500.505915][ C0] __bpf_trace_hrtimer_start+0x23/0x30 [ 500.510601][ C1] enqueue_hrtimer+0x1e7/0x240 [ 500.515548][ C0] enqueue_hrtimer+0x1e7/0x240 [ 500.520496][ C1] __hrtimer_run_queues+0x478/0xad0 [ 500.525445][ C0] __hrtimer_run_queues+0x478/0xad0 [ 500.530395][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 500.535688][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 500.540980][ C1] ? debug_smp_processor_id+0x17/0x20 [ 500.545580][ C0] ? clockevents_program_event+0x22f/0x300 [ 500.550179][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 500.555212][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 500.560247][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 500.565196][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 500.570154][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 500.575355][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 500.580991][ C1] sysvec_apic_timer_interrupt+0x44/0xc0 [ 500.586899][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 500.592795][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 500.597570][ C0] [ 500.602340][ C1] RIP: 0033:0x7fbfaf170b1d [ 500.608070][ C0] [ 500.608077][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 500.613802][ C1] Code: 08 48 83 c3 08 48 39 d1 72 f3 48 83 e8 08 48 39 f2 73 17 66 2e 0f 1f 84 00 00 00 00 00 48 8b 70 f8 48 83 e8 08 48 39 f2 72 f3 <48> 39 c3 73 3e 48 89 33 48 83 c3 08 48 8b 70 f8 48 89 08 48 8b 0b [ 500.619265][ C0] RIP: 0010:update_stack_state+0x76/0x460 [ 500.624909][ C1] RSP: 002b:00007ffd616bcd50 EFLAGS: 00000246 [ 500.630722][ C0] Code: e8 03 48 89 45 90 42 80 3c 30 00 48 89 7d c8 74 09 e8 2e 96 7d 00 48 8b 7d c8 48 8b 07 48 85 c0 74 08 48 05 a8 00 00 00 eb 21 <49> 8d 5f 38 48 89 d8 48 c1 e8 03 42 80 3c 30 00 74 08 48 89 df e8 [ 500.633499][ C1] [ 500.633504][ C1] RAX: 00007fbfaea6ae88 RBX: 00007fbfaea27fe0 RCX: ffffffff826459d9 [ 500.637751][ C0] RSP: 0018:ffffc90000e97090 EFLAGS: 00000246 [ 500.640529][ C1] RDX: ffffffff82645849 RSI: ffffffff82645849 RDI: 00007fbfaea9ca60 [ 500.646346][ C0] [ 500.646351][ C0] RAX: 0000000000000000 RBX: ffffc90000e975f0 RCX: 0000000000e97201 [ 500.665787][ C1] RBP: 00007fbfaea1f670 R08: 00007fbfaea5e060 R09: 0000000000000540 [ 500.671342][ C0] RDX: dffffc0000000000 RSI: ffffc90000e97660 RDI: ffffc90000e97238 [ 500.677244][ C1] R10: 00000000812e7338 R11: 00000000812e733c R12: 00007fbfaea1f668 [ 500.696685][ C0] RBP: ffffc90000e97148 R08: ffffc90000e972c8 R09: 0000000000000003 [ 500.698857][ C1] R13: 0000000000000020 R14: 0000000000167a58 R15: 00007fbfaf2ec0e8 [ 500.706666][ C0] R10: ffffc90000e972d0 R11: dffffc0000000001 R12: 0000000000000000 [ 500.712574][ C1] ? _find_next_bit+0x1b9/0x200 [ 500.720378][ C0] R13: ffffc90000e97230 R14: dffffc0000000000 R15: ffffc90000e971e0 [ 500.722549][ C1] ? _find_next_bit+0x29/0x200 [ 500.730374][ C0] unwind_next_frame+0x3cb/0x700 [ 500.738172][ C1] ? _find_next_bit+0x29/0x200 [ 500.746162][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 500.753972][ C1] [ 500.761782][ C0] arch_stack_walk+0x10d/0x140 [ 500.769592][ C1] ---[ end trace 139d920c6a0278e9 ]--- [ 500.777406][ C0] ? qdisc_alloc+0x75/0x770 [ 500.825926][ C0] stack_trace_save+0x113/0x1c0 [ 500.830610][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 500.835556][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 500.840594][ C0] ? __kasan_slab_alloc+0x63/0xe0 [ 500.845450][ C0] ____kasan_kmalloc+0xdb/0x110 [ 500.850137][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 500.854998][ C0] ? __kasan_kmalloc+0x9/0x10 [ 500.859510][ C0] ? __kmalloc+0x13a/0x270 [ 500.863801][ C0] ? qdisc_alloc+0x75/0x770 [ 500.868121][ C0] __kasan_kmalloc+0x9/0x10 [ 500.872443][ C0] __kmalloc+0x13a/0x270 [ 500.876524][ C0] ? qdisc_alloc+0x75/0x770 [ 500.880865][ C0] qdisc_alloc+0x75/0x770 [ 500.885029][ C0] ? pfifo_fast_init+0x3db/0x7a0 [ 500.889803][ C0] qdisc_create_dflt+0x6b/0x3e0 [ 500.894489][ C0] mq_init+0x2c8/0x6b0 [ 500.898397][ C0] ? local_bh_enable+0x30/0x30 [ 500.903000][ C0] ? __kasan_check_write+0x14/0x20 [ 500.907941][ C0] ? qdisc_alloc+0x5a1/0x770 [ 500.912370][ C0] qdisc_create_dflt+0x144/0x3e0 [ 500.917143][ C0] ? _raw_spin_lock+0xa4/0x1b0 [ 500.921741][ C0] dev_activate+0x127/0x1140 [ 500.926171][ C0] ? dev_set_rx_mode+0x245/0x2e0 [ 500.930943][ C0] __dev_open+0x3bf/0x4e0 [ 500.935107][ C0] ? dev_open+0x260/0x260 [ 500.939273][ C0] ? _raw_spin_unlock_bh+0x51/0x60 [ 500.944219][ C0] ? dev_set_rx_mode+0x245/0x2e0 [ 500.948994][ C0] ? __kasan_check_read+0x11/0x20 [ 500.953854][ C0] __dev_change_flags+0x1db/0x6e0 [ 500.958715][ C0] ? __request_module+0x8e0/0x8e0 [ 500.963575][ C0] ? dev_get_flags+0x1e0/0x1e0 [ 500.968184][ C0] ? __request_module+0x3fa/0x8e0 [ 500.973037][ C0] ? capable+0x78/0xe0 [ 500.976941][ C0] dev_change_flags+0x8c/0x1a0 [ 500.981543][ C0] dev_ifsioc+0x147/0x10c0 [ 500.985796][ C0] ? dev_ioctl+0xe70/0xe70 [ 500.990047][ C0] ? mutex_lock+0x135/0x1e0 [ 500.994391][ C0] ? wait_for_completion_killable_timeout+0x10/0x10 [ 501.000810][ C0] ? security_capable+0x87/0xb0 [ 501.005499][ C0] dev_ioctl+0x54d/0xe70 [ 501.009584][ C0] sock_do_ioctl+0x34f/0x5a0 [ 501.014004][ C0] ? sock_show_fdinfo+0xa0/0xa0 [ 501.018692][ C0] ? alloc_empty_file_noaccount+0x80/0x80 [ 501.024242][ C0] ? put_pid+0xc3/0x110 [ 501.028237][ C0] ? selinux_file_ioctl+0x3cc/0x540 [ 501.033272][ C0] sock_ioctl+0x455/0x740 [ 501.037462][ C0] ? sock_poll+0x400/0x400 [ 501.041688][ C0] ? __fget_files+0x31e/0x380 [ 501.046205][ C0] ? security_file_ioctl+0x84/0xb0 [ 501.051151][ C0] ? sock_poll+0x400/0x400 [ 501.055403][ C0] __se_sys_ioctl+0x114/0x190 [ 501.059916][ C0] __x64_sys_ioctl+0x7b/0x90 [ 501.064341][ C0] do_syscall_64+0x3d/0xb0 [ 501.068597][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.074323][ C0] RIP: 0033:0x7f807770f0a9 [ 501.078578][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 501.098019][ C0] RSP: 002b:00007f8076a680c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 501.106262][ C0] RAX: ffffffffffffffda RBX: 00007f8077846050 RCX: 00007f807770f0a9 [ 501.114075][ C0] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 000000000000000a [ 501.121892][ C0] RBP: 00007f807777e074 R08: 0000000000000000 R09: 0000000000000000 [ 501.129698][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 501.137508][ C0] R13: 000000000000006e R14: 00007f8077846050 R15: 00007ffeba3201b8 [ 501.145325][ C0] [ 501.148186][ C0] ---[ end trace 139d920c6a0278ea ]--- [ 501.157826][T15692] device syzkaller0 entered promiscuous mode [ 502.469158][T15732] device syzkaller0 entered promiscuous mode [ 503.082027][T15744] device syzkaller0 entered promiscuous mode [ 503.206431][T15748] device syzkaller0 entered promiscuous mode [ 503.469565][T15754] device syzkaller0 entered promiscuous mode [ 503.578798][T15778] syz-executor.1[15778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.578857][T15778] syz-executor.1[15778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.436791][T15792] device syzkaller0 entered promiscuous mode [ 504.783988][T15811] device syzkaller0 entered promiscuous mode [ 505.289597][T15820] device syzkaller0 entered promiscuous mode [ 505.812946][T15843] device syzkaller0 entered promiscuous mode [ 506.550696][T15875] device syzkaller0 entered promiscuous mode [ 507.012532][T15904] device syzkaller0 entered promiscuous mode [ 508.051669][ T30] audit: type=1400 audit(1719181127.361:146): avc: denied { create } for pid=15973 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 508.116540][T15979] device syzkaller0 entered promiscuous mode [ 508.465505][T15987] ------------[ cut here ]------------ [ 508.470811][T15987] Please remove unsupported %[ 508.475215][T15987] WARNING: CPU: 1 PID: 15987 at lib/vsprintf.c:2667 format_decode+0x12d2/0x1f10 [ 508.484016][T15987] Modules linked in: [ 508.487722][T15987] CPU: 1 PID: 15987 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 508.499274][T15987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 508.509162][T15987] RIP: 0010:format_decode+0x12d2/0x1f10 [ 508.514523][T15987] Code: 7b 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 80 7a 84 85 e8 0e 27 b9 fe <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 508.534055][T15987] RSP: 0018:ffffc90000d37620 EFLAGS: 00010246 [ 508.539894][T15987] RAX: 198b00b017e82a00 RBX: 00000000ffffffdb RCX: 0000000000040000 [ 508.547691][T15987] RDX: ffffc900038e9000 RSI: 00000000000004d6 RDI: 00000000000004d7 [ 508.555502][T15987] RBP: ffffc90000d37710 R08: ffffffff81576225 R09: fffff520001a6ded [ 508.563336][T15987] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 508.571156][T15987] R13: ffff0000ffffff00 R14: ffffc90000d3794c R15: 1ffff920001a6f29 [ 508.578949][T15987] FS: 00007f8076a896c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 508.587712][T15987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 508.594113][T15987] CR2: 0000786c6c257830 CR3: 0000000129096000 CR4: 00000000003506a0 [ 508.601969][T15987] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 508.609757][T15987] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 508.617580][T15987] Call Trace: [ 508.620672][T15987] [ 508.623455][T15987] ? show_regs+0x58/0x60 [ 508.627550][T15987] ? __warn+0x160/0x2f0 [ 508.631521][T15987] ? format_decode+0x12d2/0x1f10 [ 508.636314][T15987] ? report_bug+0x3d9/0x5b0 [ 508.640642][T15987] ? format_decode+0x12d2/0x1f10 [ 508.645411][T15987] ? handle_bug+0x41/0x70 [ 508.649597][T15987] ? exc_invalid_op+0x1b/0x50 [ 508.654175][T15987] ? asm_exc_invalid_op+0x1b/0x20 [ 508.659061][T15987] ? __wake_up_klogd+0xd5/0x110 [ 508.663723][T15987] ? format_decode+0x12d2/0x1f10 [ 508.668522][T15987] ? __kernel_text_address+0x9b/0x110 [ 508.673711][T15987] ? vsnprintf+0x1c70/0x1c70 [ 508.678162][T15987] ? bstr_printf+0x1b6/0x10c0 [ 508.682645][T15987] ? memcpy+0x56/0x70 [ 508.686488][T15987] bstr_printf+0x130/0x10c0 [ 508.690804][T15987] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 508.695863][T15987] ? vbin_printf+0x1bc0/0x1bc0 [ 508.700496][T15987] ? bpf_trace_printk+0x122/0x330 [ 508.705318][T15987] ? memcpy+0x56/0x70 [ 508.709156][T15987] bpf_trace_printk+0x1b5/0x330 [ 508.713828][T15987] ? kmem_cache_alloc+0xf5/0x200 [ 508.718621][T15987] ? ktime_get+0xf1/0x160 [ 508.722771][T15987] ? bpf_probe_write_user+0xf0/0xf0 [ 508.727811][T15987] ? do_syscall_64+0x3d/0xb0 [ 508.732227][T15987] ? ktime_get+0xf1/0x160 [ 508.736429][T15987] bpf_prog_12183cdb1cd51dab+0x2e/0x8f0 [ 508.741772][T15987] bpf_test_run+0x478/0xa10 [ 508.746220][T15987] ? convert___skb_to_skb+0x570/0x570 [ 508.751405][T15987] ? eth_type_trans+0x2c6/0x600 [ 508.756093][T15987] ? eth_get_headlen+0x240/0x240 [ 508.760885][T15987] ? convert___skb_to_skb+0x44/0x570 [ 508.765987][T15987] bpf_prog_test_run_skb+0xb41/0x1420 [ 508.771310][T15987] ? anon_inode_getfd+0x33/0x40 [ 508.775886][T15987] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 508.781631][T15987] ? __kasan_check_write+0x14/0x20 [ 508.786568][T15987] ? fput_many+0x160/0x1b0 [ 508.790807][T15987] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 508.796570][T15987] bpf_prog_test_run+0x3b0/0x630 [ 508.801310][T15987] ? bpf_prog_query+0x220/0x220 [ 508.805997][T15987] ? selinux_bpf+0xd2/0x100 [ 508.810365][T15987] ? security_bpf+0x82/0xb0 [ 508.814676][T15987] __sys_bpf+0x525/0x760 [ 508.818781][T15987] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 508.823968][T15987] ? __kasan_check_read+0x11/0x20 [ 508.828847][T15987] __x64_sys_bpf+0x7c/0x90 [ 508.833077][T15987] do_syscall_64+0x3d/0xb0 [ 508.837348][T15987] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 508.843056][T15987] RIP: 0033:0x7f807770f0a9 [ 508.847346][T15987] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 508.866792][T15987] RSP: 002b:00007f8076a890c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 508.874998][T15987] RAX: ffffffffffffffda RBX: 00007f8077845f80 RCX: 00007f807770f0a9 [ 508.882827][T15987] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 508.890636][T15987] RBP: 00007f807777e074 R08: 0000000000000000 R09: 0000000000000000 [ 508.898451][T15987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 508.906260][T15987] R13: 000000000000000b R14: 00007f8077845f80 R15: 00007ffeba3201b8 [ 508.914585][T15987] [ 508.917457][T15987] ---[ end trace 139d920c6a0278eb ]--- [ 509.100935][T15997] syz-executor.2[15997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.100989][T15997] syz-executor.2[15997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.178379][T16005] device veth1_macvtap left promiscuous mode [ 509.201927][T16002] syz-executor.2[16002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.201989][T16002] syz-executor.2[16002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.214722][T16005] device macsec0 left promiscuous mode [ 509.936251][T16029] device syzkaller0 entered promiscuous mode [ 510.017768][T16059] syz-executor.4[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.017831][T16059] syz-executor.4[16059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.320552][T16112] syz-executor.4[16112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.342410][T16112] syz-executor.4[16112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.458488][T16114] device syzkaller0 entered promiscuous mode [ 512.049861][T16133] device syzkaller0 entered promiscuous mode [ 512.292831][T16150] syz-executor.1[16150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.292911][T16150] syz-executor.1[16150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.017925][T16170] device veth0_vlan left promiscuous mode [ 513.036003][T16170] device veth0_vlan entered promiscuous mode [ 513.085713][T16171] device syzkaller0 entered promiscuous mode [ 513.220857][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 513.229584][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 513.236972][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 513.363894][T16163] device syzkaller0 entered promiscuous mode [ 514.295083][T16212] bpf_get_probe_write_proto: 2 callbacks suppressed [ 514.295099][T16212] syz-executor.1[16212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.349986][T16212] syz-executor.1[16212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 514.863077][T16223] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.092998][T16223] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.190702][T16223] device bridge_slave_0 entered promiscuous mode [ 515.445169][T16235] device syzkaller0 entered promiscuous mode [ 515.453820][T16223] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.496032][T16223] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.540435][T16223] device bridge_slave_1 entered promiscuous mode [ 515.838530][T16246] device pim6reg1 entered promiscuous mode [ 516.144466][ T344] device bridge_slave_1 left promiscuous mode [ 516.171484][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.223107][ T344] device bridge_slave_0 left promiscuous mode [ 516.229121][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.267191][ T344] device veth0_vlan left promiscuous mode [ 517.273012][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 517.281272][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 517.339882][T16223] device veth0_vlan entered promiscuous mode [ 517.351604][T16223] device veth1_macvtap entered promiscuous mode [ 517.376401][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 517.384779][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 517.392800][T16017] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.399651][T16017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.407293][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 517.415419][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 517.424487][T16017] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.431346][T16017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.500096][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 517.581148][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 517.692991][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 517.762715][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 517.819972][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 517.862069][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 517.872339][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 517.887976][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 517.895749][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 517.905689][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 517.913917][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 517.993495][T16279] device syzkaller0 entered promiscuous mode [ 518.191600][T16302] device syzkaller0 entered promiscuous mode [ 518.198004][T16306] bridge0: port 3(veth0_macvtap) entered blocking state [ 518.204750][T16306] bridge0: port 3(veth0_macvtap) entered disabled state [ 518.212235][T16306] device veth0_macvtap entered promiscuous mode [ 518.219130][T16306] bridge0: port 3(veth0_macvtap) entered blocking state [ 518.225886][T16306] bridge0: port 3(veth0_macvtap) entered forwarding state [ 518.233352][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 518.240945][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 518.248279][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 518.255510][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 518.283483][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 518.302052][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 518.310372][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 518.506029][T16314] device syzkaller0 entered promiscuous mode [ 518.904249][T16328] device syzkaller0 entered promiscuous mode [ 519.789419][T16349] device vlan1 entered promiscuous mode [ 519.851083][T16344] device pim6reg1 entered promiscuous mode [ 520.301535][T16362] device syzkaller0 entered promiscuous mode [ 520.524171][T16356] device syzkaller0 entered promiscuous mode [ 521.991089][T16412] device syzkaller0 entered promiscuous mode [ 523.497467][T16467] device syzkaller0 entered promiscuous mode [ 523.784939][T16477] device vxcan1 entered promiscuous mode [ 524.176642][T16490] syz-executor.1[16490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.176707][T16490] syz-executor.1[16490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.508333][T16495] device syzkaller0 entered promiscuous mode [ 525.428357][T16514] device syzkaller0 entered promiscuous mode [ 526.319959][T16547] device syzkaller0 entered promiscuous mode [ 526.885306][T16567] device syzkaller0 entered promiscuous mode [ 527.977742][T16602] syz-executor.1[16602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.977803][T16602] syz-executor.1[16602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.110136][T16603] syz-executor.1[16603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.358012][T16626] device vxcan1 entered promiscuous mode [ 528.759718][T16631] device syzkaller0 entered promiscuous mode [ 529.157799][T16637] device syzkaller0 entered promiscuous mode [ 529.924361][T16664] device vxcan1 entered promiscuous mode [ 530.836015][T16678] device syzkaller0 entered promiscuous mode [ 531.217450][T16687] device syzkaller0 entered promiscuous mode [ 531.739738][T16700] device syzkaller0 entered promiscuous mode [ 532.200684][T16717] device vxcan1 entered promiscuous mode [ 533.060300][T16740] device syzkaller0 entered promiscuous mode [ 533.737729][T16743] device syzkaller0 entered promiscuous mode [ 534.350944][T16751] device syzkaller0 entered promiscuous mode [ 534.533284][T16765] device vxcan1 entered promiscuous mode [ 534.656596][T16771] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 535.379090][T16788] device syzkaller0 entered promiscuous mode [ 536.145147][T16794] device syzkaller0 entered promiscuous mode [ 536.381153][T16805] device syzkaller0 entered promiscuous mode [ 537.094147][T16830] device syzkaller0 entered promiscuous mode [ 537.158614][T16833] syz-executor.3[16833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.158677][T16833] syz-executor.3[16833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.179249][T16833] syz-executor.3[16833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.191015][T16833] syz-executor.3[16833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.325499][T16832] device syzkaller0 entered promiscuous mode [ 537.353449][T16839] device syzkaller0 entered promiscuous mode [ 538.207896][T16866] device syzkaller0 entered promiscuous mode [ 538.634610][T16882] device syzkaller0 entered promiscuous mode [ 539.051527][T16899] device syzkaller0 entered promiscuous mode [ 539.993241][T16946] device syzkaller0 entered promiscuous mode [ 541.065255][T16987] device syzkaller0 entered promiscuous mode [ 542.417172][T17041] device pim6reg1 entered promiscuous mode [ 542.597586][T17078] syz-executor.4 (17078) used obsolete PPPIOCDETACH ioctl [ 542.665540][T17085] device pim6reg1 entered promiscuous mode [ 542.875567][T17099] device syzkaller0 entered promiscuous mode [ 543.030917][T17114] bond_slave_1: mtu less than device minimum [ 543.939047][T17173] device pim6reg1 entered promiscuous mode [ 543.973533][T17183] device lo entered promiscuous mode [ 544.333414][T17223] device syzkaller0 entered promiscuous mode [ 545.147664][T17241] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 545.245376][T17231] device syzkaller0 entered promiscuous mode [ 545.942753][T17255] device syzkaller0 entered promiscuous mode [ 546.595616][T17273] syz-executor.3[17273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.595670][T17273] syz-executor.3[17273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.987173][T17280] device syzkaller0 entered promiscuous mode [ 547.276275][T17294] device syzkaller0 entered promiscuous mode [ 547.360009][T17298] device syzkaller0 entered promiscuous mode [ 547.777356][T17319] device wg2 left promiscuous mode [ 548.318237][T17335] device syzkaller0 entered promiscuous mode [ 548.825695][T17348] device syzkaller0 entered promiscuous mode [ 548.881649][T17360] device syzkaller0 entered promiscuous mode [ 548.900545][T17367] device syzkaller0 entered promiscuous mode [ 549.061256][T17371] device vxcan1 entered promiscuous mode [ 549.885221][T17395] device vxcan1 entered promiscuous mode [ 550.211397][T17417] device syzkaller0 entered promiscuous mode [ 550.242995][T17413] device syzkaller0 entered promiscuous mode [ 550.804839][T17424] device syzkaller0 entered promiscuous mode [ 551.833505][T17451] device syzkaller0 entered promiscuous mode [ 551.957629][T17466] device syzkaller0 entered promiscuous mode [ 552.953512][T17522] device syzkaller0 entered promiscuous mode [ 553.246645][T17537] device wg2 entered promiscuous mode [ 553.439946][T17554] syz-executor.1[17554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 553.440007][T17554] syz-executor.1[17554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.389805][T17589] syz-executor.1[17589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.507858][T17589] syz-executor.1[17589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.557914][T17575] device syzkaller0 entered promiscuous mode [ 555.715642][T17634] device syzkaller0 entered promiscuous mode [ 556.024248][T17639] device syzkaller0 entered promiscuous mode [ 556.721718][T17668] device syzkaller0 entered promiscuous mode [ 557.427665][T17697] device syzkaller0 entered promiscuous mode [ 558.177048][T17722] device syzkaller0 entered promiscuous mode [ 558.921565][T17731] device syzkaller0 entered promiscuous mode [ 559.610875][T17773] device syzkaller0 entered promiscuous mode [ 559.692151][T17778] device syzkaller0 entered promiscuous mode [ 560.668096][T17822] device syzkaller0 entered promiscuous mode [ 560.723642][T17824] device vxcan1 entered promiscuous mode [ 560.928944][T17816] device syzkaller0 entered promiscuous mode [ 562.148802][ T30] audit: type=1400 audit(1719181181.461:147): avc: denied { create } for pid=17859 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 562.244547][T17865] device syzkaller0 entered promiscuous mode [ 562.665630][T17876] device syzkaller0 entered promiscuous mode [ 564.442746][T17923] device syzkaller0 entered promiscuous mode [ 565.264089][T17957] device vxcan1 entered promiscuous mode [ 565.840037][T17975] device syzkaller0 entered promiscuous mode [ 565.915255][T17977] device syzkaller0 entered promiscuous mode [ 567.371037][T18019] device syzkaller0 entered promiscuous mode [ 567.613811][T18020] device syzkaller0 entered promiscuous mode [ 569.227316][T18066] device syzkaller0 entered promiscuous mode [ 569.435080][T18094] device syzkaller0 entered promiscuous mode [ 569.897564][T18109] tap0: tun_chr_ioctl cmd 1074025677 [ 569.920404][T18109] tap0: linktype set to 1 [ 570.559024][T18141] device syzkaller0 entered promiscuous mode [ 571.595365][T18182] syz-executor.0[18182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.595425][T18182] syz-executor.0[18182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.852320][T18189] device syzkaller0 entered promiscuous mode [ 572.208723][T18206] syz-executor.2[18206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 572.208794][T18206] syz-executor.2[18206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 572.802996][T18241] device syzkaller0 entered promiscuous mode [ 573.075589][T18267] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 573.119760][T18257] device syzkaller0 entered promiscuous mode [ 573.488180][T18315] device syzkaller0 entered promiscuous mode [ 573.746486][T18325] syz-executor.1[18325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.746543][T18325] syz-executor.1[18325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.220562][T18359] device syzkaller0 entered promiscuous mode [ 574.369235][T18353] device syzkaller0 entered promiscuous mode [ 574.808582][T18381] rose0: tun_chr_ioctl cmd 1074025673 [ 574.833686][T18378] rose0: tun_chr_ioctl cmd 1074025681 [ 574.872516][T18377] rose0: tun_chr_ioctl cmd 1074025681 [ 575.374455][T18402] device syzkaller0 entered promiscuous mode [ 575.391894][T18406] device syzkaller0 entered promiscuous mode [ 575.498763][T18412] device syzkaller0 entered promiscuous mode [ 575.547567][T18414] device sit0 left promiscuous mode [ 576.169017][T18451] device syzkaller0 entered promiscuous mode [ 576.398671][T18455] device syzkaller0 entered promiscuous mode [ 577.432740][T18512] device syzkaller0 entered promiscuous mode [ 577.505729][T18513] device syzkaller0 entered promiscuous mode [ 577.904035][T18516] device syzkaller0 entered promiscuous mode [ 578.085939][T18524] device syzkaller0 entered promiscuous mode [ 578.622953][T18553] device syzkaller0 entered promiscuous mode [ 578.641762][T18562] device syzkaller0 entered promiscuous mode [ 578.848241][T18566] device syzkaller0 entered promiscuous mode [ 579.555465][T18601] device syzkaller0 entered promiscuous mode [ 579.830907][T18622] device syzkaller0 entered promiscuous mode [ 580.519572][T18650] device syzkaller0 entered promiscuous mode [ 580.706055][T18653] device syzkaller0 entered promiscuous mode [ 581.192750][T18661] device syzkaller0 entered promiscuous mode [ 581.966440][T18711] device syzkaller0 entered promiscuous mode [ 582.019955][T18726] syz-executor.3[18726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.020021][T18726] syz-executor.3[18726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.114233][T18715] device syzkaller0 entered promiscuous mode [ 582.510951][T18729] device syzkaller0 entered promiscuous mode [ 582.959313][T18770] device syzkaller0 entered promiscuous mode [ 583.031264][T18771] device syzkaller0 entered promiscuous mode [ 583.091462][T18773] device syzkaller0 entered promiscuous mode [ 583.926557][T18789] device syzkaller0 entered promiscuous mode [ 584.112327][T18803] device syzkaller0 entered promiscuous mode [ 584.231091][T18815] device syzkaller0 entered promiscuous mode [ 584.250971][T18817] device syzkaller0 entered promiscuous mode [ 585.359067][T18868] bridge0: port 3(veth0_macvtap) entered disabled state [ 585.365925][T18868] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.372774][T18868] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.464306][T18874] device syzkaller0 entered promiscuous mode [ 585.471703][T18868] bridge0: port 3(veth0_macvtap) entered blocking state [ 585.478504][T18868] bridge0: port 3(veth0_macvtap) entered forwarding state [ 585.485601][T18868] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.492365][T18868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.499462][T18868] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.506254][T18868] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.519337][T18868] device bridge0 entered promiscuous mode [ 585.966465][T18891] device syzkaller0 entered promiscuous mode [ 586.062449][T18905] device syzkaller0 entered promiscuous mode [ 586.723820][T18938] device syzkaller0 entered promiscuous mode [ 586.933064][T18954] device syzkaller0 entered promiscuous mode [ 587.321814][T18956] device syzkaller0 entered promiscuous mode [ 587.485095][T18964] syz-executor.3[18964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.485158][T18964] syz-executor.3[18964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.500260][T18966] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 587.951671][T18995] device syzkaller0 entered promiscuous mode [ 588.260013][T18998] device syzkaller0 entered promiscuous mode [ 588.318863][T19000] device syzkaller0 entered promiscuous mode [ 588.588379][T19036] device veth1_macvtap left promiscuous mode [ 588.636273][T19036] device macsec0 left promiscuous mode [ 589.208070][T19040] device syzkaller0 entered promiscuous mode [ 589.275730][T19042] device syzkaller0 entered promiscuous mode [ 589.458592][T19068] device syzkaller0 entered promiscuous mode [ 589.887136][T19075] device syzkaller0 entered promiscuous mode [ 590.178262][T19091] device syzkaller0 entered promiscuous mode [ 590.278961][T19100] device syzkaller0 entered promiscuous mode [ 590.371446][T19102] device syzkaller0 entered promiscuous mode [ 590.806590][T19134] device syzkaller0 entered promiscuous mode [ 591.099973][T19142] device syzkaller0 entered promiscuous mode [ 591.145360][T19144] device syzkaller0 entered promiscuous mode [ 591.250102][T19148] device syzkaller0 entered promiscuous mode [ 591.724436][T19170] device syzkaller0 entered promiscuous mode [ 591.761427][T19188] device syzkaller0 entered promiscuous mode [ 592.185755][T19228] bond_slave_1: mtu less than device minimum [ 592.282415][T19237] device syzkaller0 entered promiscuous mode [ 592.726213][T19240] device syzkaller0 entered promiscuous mode [ 593.658077][T19287] device syzkaller0 entered promiscuous mode [ 593.936611][T19291] device syzkaller0 entered promiscuous mode [ 594.660570][T19326] device syzkaller0 entered promiscuous mode [ 595.391871][T19334] device syzkaller0 entered promiscuous mode [ 595.516668][T19348] device syzkaller0 entered promiscuous mode [ 595.989279][T19368] device syzkaller0 entered promiscuous mode [ 596.584845][T19380] device syzkaller0 entered promiscuous mode [ 596.674538][T19390] device syzkaller0 entered promiscuous mode [ 596.740980][T19393] device syzkaller0 entered promiscuous mode [ 597.506824][T19416] device syzkaller0 entered promiscuous mode [ 597.956916][ T312] syz-executor.3 (312) used greatest stack depth: 20384 bytes left [ 598.129631][T19425] device syzkaller0 entered promiscuous mode [ 598.221571][T19445] device syzkaller0 entered promiscuous mode [ 598.370791][T19444] device syzkaller0 entered promiscuous mode [ 598.382368][T19436] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.389233][T19436] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.396548][T19436] device bridge_slave_0 entered promiscuous mode [ 598.466441][T19436] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.498472][T19436] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.505738][T19436] device bridge_slave_1 entered promiscuous mode [ 598.749783][T19455] device syzkaller0 entered promiscuous mode [ 598.929091][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 598.936959][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 598.950760][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 599.015984][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.079459][T15910] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.086316][T15910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.102692][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 599.111899][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 599.120009][T15910] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.126858][T15910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 599.219419][T19483] device syzkaller0 entered promiscuous mode [ 599.226024][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 599.234677][ T45] device bridge_slave_1 left promiscuous mode [ 599.240911][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.249412][ T45] device bridge_slave_0 left promiscuous mode [ 599.255373][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.522226][T19491] device syzkaller0 entered promiscuous mode [ 599.698408][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 599.710713][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 599.756387][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 599.776565][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 599.795884][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 599.803798][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 599.812544][T19436] device veth0_vlan entered promiscuous mode [ 599.819327][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 599.826764][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 599.839012][T19436] device veth1_macvtap entered promiscuous mode [ 599.845795][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 599.853996][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 599.862190][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 599.898450][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 599.909884][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 599.921614][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 599.929820][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 600.048317][T19511] device syzkaller0 entered promiscuous mode [ 600.171301][T19510] device syzkaller0 entered promiscuous mode [ 600.227092][T19508] device syzkaller0 entered promiscuous mode [ 600.662782][T19534] device syzkaller0 entered promiscuous mode [ 600.799839][T19546] device syzkaller0 entered promiscuous mode [ 600.995435][T19544] device syzkaller0 entered promiscuous mode [ 601.417680][T19561] device syzkaller0 entered promiscuous mode [ 601.874489][T19578] device syzkaller0 entered promiscuous mode [ 602.208638][T19581] device syzkaller0 entered promiscuous mode [ 602.621621][T19608] device syzkaller0 entered promiscuous mode [ 603.131804][T19623] device syzkaller0 entered promiscuous mode [ 603.204221][T19625] device syzkaller0 entered promiscuous mode [ 603.415844][T19640] device syzkaller0 entered promiscuous mode [ 603.874961][T19662] device syzkaller0 entered promiscuous mode [ 603.887556][T19663] device syzkaller0 entered promiscuous mode [ 604.028916][T19665] device syzkaller0 entered promiscuous mode [ 604.550553][T19688] device syzkaller0 entered promiscuous mode [ 604.583275][T19696] device syzkaller0 entered promiscuous mode [ 604.634157][T19698] device syzkaller0 entered promiscuous mode [ 604.812953][T19705] device syzkaller0 entered promiscuous mode [ 605.338355][T19726] device syzkaller0 entered promiscuous mode [ 605.437302][T19736] device syzkaller0 entered promiscuous mode [ 606.005308][T19741] device syzkaller0 entered promiscuous mode [ 606.298003][T19775] syz-executor.1[19775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.298071][T19775] syz-executor.1[19775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.543915][T19782] device syzkaller0 entered promiscuous mode [ 606.641932][T19777] device syzkaller0 entered promiscuous mode [ 606.935636][T19786] device syzkaller0 entered promiscuous mode [ 607.492009][T19797] device syzkaller0 entered promiscuous mode [ 608.163974][T19833] device syzkaller0 entered promiscuous mode [ 608.292631][T19834] device syzkaller0 entered promiscuous mode [ 608.679243][T19847] device syzkaller0 entered promiscuous mode [ 608.981436][T19852] device syzkaller0 entered promiscuous mode [ 609.485790][T19878] device syzkaller0 entered promiscuous mode [ 609.658521][T19879] device syzkaller0 entered promiscuous mode [ 609.975477][T19901] device syzkaller0 entered promiscuous mode [ 610.679978][T19920] device syzkaller0 entered promiscuous mode [ 610.696053][T19931] device syzkaller0 entered promiscuous mode [ 610.839733][T19934] device syzkaller0 entered promiscuous mode [ 610.965812][T19946] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 611.272636][T19954] device syzkaller0 entered promiscuous mode [ 611.937379][T19968] device syzkaller0 entered promiscuous mode [ 612.071664][T19972] device syzkaller0 entered promiscuous mode [ 612.104575][T19976] device syzkaller0 entered promiscuous mode [ 612.332883][T19988] device syzkaller0 entered promiscuous mode [ 612.849558][T20003] syz-executor.1[20003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.849619][T20003] syz-executor.1[20003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.054542][T20017] device syzkaller0 entered promiscuous mode [ 613.303112][T20025] device syzkaller0 entered promiscuous mode [ 613.363276][T20023] device syzkaller0 entered promiscuous mode [ 613.462811][T20029] device syzkaller0 entered promiscuous mode [ 613.892149][T20039] device syzkaller0 entered promiscuous mode [ 614.094408][T20055] device syzkaller0 entered promiscuous mode [ 614.127859][T20060] device syzkaller0 entered promiscuous mode [ 614.315593][T20065] device syzkaller0 entered promiscuous mode [ 614.557697][T20074] device syzkaller0 entered promiscuous mode [ 615.243150][T20098] device syzkaller0 entered promiscuous mode [ 615.268242][T20106] device syzkaller0 entered promiscuous mode [ 615.717871][T20122] device syzkaller0 entered promiscuous mode [ 615.742792][T20123] device syzkaller0 entered promiscuous mode [ 616.370836][T20152] device syzkaller0 entered promiscuous mode [ 616.458214][T20151] device syzkaller0 entered promiscuous mode [ 616.993331][T20165] device syzkaller0 entered promiscuous mode [ 617.453526][T20196] device syzkaller0 entered promiscuous mode [ 617.766372][T20195] device syzkaller0 entered promiscuous mode [ 617.929538][T20197] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.967838][T20197] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.975116][T20197] device bridge_slave_0 entered promiscuous mode [ 618.053803][T20197] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.068933][T20197] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.076322][T20197] device bridge_slave_1 entered promiscuous mode [ 618.144937][T20218] device syzkaller0 entered promiscuous mode [ 618.331542][T20220] device syzkaller0 entered promiscuous mode [ 618.375081][T20197] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.381965][T20197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.389052][T20197] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.395820][T20197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.422801][T10884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 618.430617][T10884] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.437780][T10884] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.458764][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.466997][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.473845][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.481163][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 618.489754][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.496731][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.503968][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 618.512230][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 618.579571][T10882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 618.612458][T10882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.748541][T10882] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.768278][T10882] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.776671][ T45] device veth0_macvtap left promiscuous mode [ 618.784550][ T45] bridge0: port 3(veth0_macvtap) entered disabled state [ 618.791966][ T45] device bridge_slave_1 left promiscuous mode [ 618.798013][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.855122][ T45] device bridge_slave_0 left promiscuous mode [ 618.905722][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.155088][T20197] device veth0_vlan entered promiscuous mode [ 619.174679][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 619.186110][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 619.205437][T20197] device veth1_macvtap entered promiscuous mode [ 619.218065][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 619.226619][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 619.287351][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 619.416432][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 619.424623][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 619.446625][T20251] device syzkaller0 entered promiscuous mode [ 620.061776][T20262] device syzkaller0 entered promiscuous mode [ 620.501512][T20285] device syzkaller0 entered promiscuous mode [ 620.924546][T20307] device syzkaller0 entered promiscuous mode [ 621.210463][T20319] device syzkaller0 entered promiscuous mode [ 622.205678][T20342] device syzkaller0 entered promiscuous mode [ 623.065070][T20353] device syzkaller0 entered promiscuous mode [ 623.652985][T20387] device syzkaller0 entered promiscuous mode [ 625.922891][T20460] bridge0: port 3(veth0_to_batadv) entered blocking state [ 625.959258][T20460] bridge0: port 3(veth0_to_batadv) entered disabled state [ 625.968413][T20460] device veth0_to_batadv entered promiscuous mode [ 625.975379][T20460] bridge0: port 3(veth0_to_batadv) entered blocking state [ 625.982379][T20460] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 634.510923][T20711] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.517921][T20711] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.525057][T20711] device bridge_slave_0 entered promiscuous mode [ 634.532352][T20711] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.539943][T20711] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.559572][T20711] device bridge_slave_1 entered promiscuous mode [ 634.762231][T20711] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.769109][T20711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.776184][T20711] bridge0: port 1(bridge_slave_0) entered blocking state [ 634.782971][T20711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.824473][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 634.859918][T16017] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.960191][T16017] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.030629][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 635.048892][T15909] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.055758][T15909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.063719][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 635.072018][T15909] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.078882][T15909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.086176][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 635.163531][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 635.217661][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 635.284053][ T45] device bridge_slave_1 left promiscuous mode [ 635.292567][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.303105][ T45] device bridge_slave_0 left promiscuous mode [ 635.309179][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.317251][ T45] device veth1_macvtap left promiscuous mode [ 635.328814][ T45] device veth0_vlan left promiscuous mode [ 635.609783][T20711] device veth0_vlan entered promiscuous mode [ 635.617288][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.625086][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.632802][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 635.908722][T20711] device veth1_macvtap entered promiscuous mode [ 635.929478][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 635.939955][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 635.948024][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 635.955542][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 635.967012][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 635.975180][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 635.983295][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 636.714487][T20783] syz-executor.1[20783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.714550][T20783] syz-executor.1[20783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.797951][T20786] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 639.673689][T20896] syz-executor.0[20896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.673773][T20896] syz-executor.0[20896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.469943][T20931] syz-executor.0[20931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.481813][T20931] syz-executor.0[20931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.695517][T21035] syz-executor.4[21035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.734317][T21035] syz-executor.4[21035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.927576][T21137] device syzkaller0 entered promiscuous mode [ 653.121680][T21481] device syzkaller0 entered promiscuous mode [ 653.413291][T21504] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.420310][T21504] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.427610][T21504] device bridge_slave_0 entered promiscuous mode [ 653.456017][T21504] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.472230][T21504] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.556505][T21504] device bridge_slave_1 entered promiscuous mode [ 653.738418][T21504] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.745299][T21504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.752413][T21504] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.759180][T21504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.807342][T10882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 653.815324][T10882] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.823066][T10882] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.857931][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.866007][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.872856][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.880905][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.889078][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.895907][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.923991][ T8] device bridge_slave_1 left promiscuous mode [ 653.938189][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.953593][ T8] device bridge_slave_0 left promiscuous mode [ 653.968856][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.010338][ T8] device veth1_macvtap left promiscuous mode [ 654.016351][ T8] device veth0_vlan left promiscuous mode [ 654.158352][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 654.166307][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 654.253513][T21532] device syzkaller0 entered promiscuous mode [ 654.339753][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 654.412778][T21504] device veth0_vlan entered promiscuous mode [ 654.427634][T21540] device syzkaller0 entered promiscuous mode [ 654.437488][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 654.452566][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 654.484085][T21504] device veth1_macvtap entered promiscuous mode [ 654.570235][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 654.577561][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 654.584798][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 654.593120][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 654.601095][T16017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 654.630061][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 654.638359][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 654.739546][T10888] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 654.747921][T10888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 655.459207][T21591] device syzkaller0 entered promiscuous mode [ 655.552268][T21606] syz-executor.4[21606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.552344][T21606] syz-executor.4[21606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.569727][T21606] syz-executor.4[21606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.586186][T21606] syz-executor.4[21606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.802716][T21602] device syzkaller0 entered promiscuous mode [ 656.438516][T21651] device vxcan1 entered promiscuous mode [ 656.640190][T21661] device syzkaller0 entered promiscuous mode [ 657.201542][T21691] device syzkaller0 entered promiscuous mode [ 657.446429][T21722] device veth0_vlan left promiscuous mode [ 657.452330][T21722] device veth0_vlan entered promiscuous mode [ 657.459077][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.466935][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 657.474146][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 660.054483][T21828] device syzkaller0 entered promiscuous mode [ 660.333748][T21842] device syzkaller0 entered promiscuous mode [ 661.973267][ T30] audit: type=1400 audit(1719181281.281:148): avc: denied { create } for pid=21882 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 661.993760][T21881] device syzkaller0 entered promiscuous mode [ 662.143269][ T30] audit: type=1400 audit(1719181281.451:149): avc: denied { unlink } for pid=82 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.584775][T21932] device syzkaller0 entered promiscuous mode [ 663.796802][ T30] audit: type=1400 audit(1719181283.111:150): avc: denied { tracepoint } for pid=21937 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 664.838760][T21979] device syzkaller0 entered promiscuous mode [ 666.020782][T22025] device syzkaller0 entered promiscuous mode [ 666.860711][T22047] device syzkaller0 entered promiscuous mode [ 668.211993][T22087] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.221526][T22087] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.243464][T22087] device bridge_slave_0 entered promiscuous mode [ 668.263517][T22087] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.270548][T22087] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.277873][T22087] device bridge_slave_1 entered promiscuous mode [ 668.385541][T22087] bridge0: port 2(bridge_slave_1) entered blocking state [ 668.392426][T22087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 668.399593][T22087] bridge0: port 1(bridge_slave_0) entered blocking state [ 668.406377][T22087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 668.599406][T22103] device vxcan1 entered promiscuous mode [ 668.647371][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 668.654813][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 668.691573][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 668.701549][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 668.744154][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 668.776087][T22110] device pim6reg1 entered promiscuous mode [ 668.802335][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 668.816397][T22087] device veth0_vlan entered promiscuous mode [ 668.865141][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.873410][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.880648][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.893235][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.902335][T22087] device veth1_macvtap entered promiscuous mode [ 668.912656][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.926267][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.998297][ T8] device bridge_slave_1 left promiscuous mode [ 669.052137][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.115911][ T8] device bridge_slave_0 left promiscuous mode [ 669.127978][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.145577][ T8] device veth1_macvtap left promiscuous mode [ 669.151514][ T8] device veth0_vlan left promiscuous mode [ 669.829479][T22141] device pim6reg1 entered promiscuous mode [ 670.120093][T22164] device pim6reg1 entered promiscuous mode [ 671.268041][T22201] device pim6reg1 entered promiscuous mode [ 671.931877][T22233] device pim6reg1 entered promiscuous mode [ 672.451288][T22239] device pim6reg1 entered promiscuous mode [ 677.737398][T22398] device pim6reg1 entered promiscuous mode [ 679.093963][T22442] device pim6reg1 entered promiscuous mode [ 679.312742][T22446] device pim6reg1 entered promiscuous mode [ 680.223391][T22480] device pim6reg1 entered promiscuous mode [ 680.411834][T22490] device pim6reg1 entered promiscuous mode [ 680.645576][T22500] device veth1_macvtap left promiscuous mode [ 680.731568][T22500] device veth1_macvtap entered promiscuous mode [ 680.766375][T22500] device macsec0 entered promiscuous mode [ 681.134896][T22521] device pim6reg1 entered promiscuous mode [ 681.250786][T22525] device pim6reg1 entered promiscuous mode [ 681.357348][T22538] device pim6reg1 entered promiscuous mode [ 681.769917][T22562] device pim6reg1 entered promiscuous mode [ 682.013056][T22570] device pim6reg1 entered promiscuous mode [ 682.315378][T22581] device pim6reg1 entered promiscuous mode [ 682.585525][T22606] device pim6reg1 entered promiscuous mode [ 682.820999][T22616] device pim6reg1 entered promiscuous mode [ 683.277804][T22626] device pim6reg1 entered promiscuous mode [ 683.535530][T22639] device pim6reg1 entered promiscuous mode [ 683.835115][T22650] device pim6reg1 entered promiscuous mode [ 684.162602][T22673] device pim6reg1 entered promiscuous mode [ 684.363851][T22677] device pim6reg1 entered promiscuous mode [ 684.786265][T22698] device pim6reg1 entered promiscuous mode [ 685.014391][T22708] device pim6reg1 entered promiscuous mode [ 685.067280][T22710] device pim6reg1 entered promiscuous mode [ 685.767365][T22746] device pim6reg1 entered promiscuous mode [ 686.573696][T22794] device vxcan1 entered promiscuous mode [ 690.481975][ T30] audit: type=1400 audit(1719181309.791:151): avc: denied { create } for pid=23065 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 691.264173][T23120] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 693.743230][T23221] device pim6reg1 entered promiscuous mode [ 693.824227][T23223] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.831264][T23223] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.900567][T23224] bridge0: port 2(bridge_slave_1) entered blocking state [ 693.907460][T23224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 693.914568][T23224] bridge0: port 1(bridge_slave_0) entered blocking state [ 693.921332][T23224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 693.970336][T23224] device bridge0 entered promiscuous mode [ 694.623328][T23277] device pim6reg1 entered promiscuous mode [ 694.722718][T23281] device pim6reg1 entered promiscuous mode [ 694.739003][T23279] bridge0: port 1(bridge_slave_0) entered blocking state [ 694.745840][T23279] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.753010][T23279] device bridge_slave_0 entered promiscuous mode [ 694.766117][T23279] bridge0: port 2(bridge_slave_1) entered blocking state [ 694.773005][T23279] bridge0: port 2(bridge_slave_1) entered disabled state [ 694.780275][T23279] device bridge_slave_1 entered promiscuous mode [ 694.910357][T23279] bridge0: port 2(bridge_slave_1) entered blocking state [ 694.917400][T23279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 694.924475][T23279] bridge0: port 1(bridge_slave_0) entered blocking state [ 694.931279][T23279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.007600][T22998] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.014751][T22998] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.040564][ T344] device bridge_slave_1 left promiscuous mode [ 695.048845][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.068563][ T344] device bridge_slave_0 left promiscuous mode [ 695.081616][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.107063][ T344] device veth1_macvtap left promiscuous mode [ 695.112971][ T344] device veth0_vlan left promiscuous mode [ 695.352452][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 695.360883][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 695.407279][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 695.415473][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 695.423553][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.430489][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.437761][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 695.445902][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 695.454030][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.460884][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.500654][T23317] device pim6reg1 entered promiscuous mode [ 695.524226][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 695.539774][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 695.557096][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 695.565228][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 695.573050][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 695.593058][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 695.610098][T23279] device veth0_vlan entered promiscuous mode [ 695.617759][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 695.625497][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 695.633583][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 695.641127][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 695.655035][T23279] device veth1_macvtap entered promiscuous mode [ 695.678623][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 695.688490][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 695.714627][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 695.780611][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 695.793735][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 695.805211][T23324] device pim6reg1 entered promiscuous mode [ 695.833804][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 695.842067][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 696.066357][T23332] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.117800][T23332] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.127547][T23332] device bridge_slave_0 entered promiscuous mode [ 696.176137][T23332] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.182986][T23332] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.229615][T23332] device bridge_slave_1 entered promiscuous mode [ 696.293219][T23332] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.300201][T23332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.307294][T23332] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.314058][T23332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.340417][T15909] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.348082][T15909] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.355481][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 696.364242][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.431732][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.456650][T15909] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.463514][T15909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.526333][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.534755][T15909] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.541775][T15909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.548982][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 696.556785][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.573470][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 696.585746][T23332] device veth0_vlan entered promiscuous mode [ 696.592431][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.600537][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.607957][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.622080][T23332] device veth1_macvtap entered promiscuous mode [ 696.632050][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 696.644469][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 696.657652][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 696.678376][ T344] device bridge_slave_1 left promiscuous mode [ 696.684510][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.692094][ T344] device bridge_slave_0 left promiscuous mode [ 696.698128][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.706630][ T344] device veth1_macvtap left promiscuous mode [ 696.712513][ T344] device veth0_vlan left promiscuous mode [ 696.862343][T23362] device pim6reg1 entered promiscuous mode [ 696.921289][T23365] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.928410][T23365] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.935636][T23365] device bridge_slave_0 entered promiscuous mode [ 696.943056][T23365] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.952091][T23365] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.959415][T23365] device bridge_slave_1 entered promiscuous mode [ 697.146190][T23378] device pim6reg1 entered promiscuous mode [ 697.228675][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 697.240933][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 697.257979][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 697.266783][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 697.275413][T15913] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.282296][T15913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 697.289876][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 697.308196][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 697.322831][T15913] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.329717][T15913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.434399][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 697.443082][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 697.487654][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 697.552729][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 697.601803][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 697.673006][T23365] device veth0_vlan entered promiscuous mode [ 697.740795][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 697.749800][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 697.798951][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 697.839968][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 697.870104][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 697.940224][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 697.950521][T23365] device veth1_macvtap entered promiscuous mode [ 697.957373][T23406] device pim6reg1 entered promiscuous mode [ 697.981104][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 698.036665][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 698.072426][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 698.080608][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 698.281396][T23426] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.290644][T23426] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.299903][T23426] device bridge_slave_0 entered promiscuous mode [ 698.311455][T23426] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.318681][T23426] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.326751][T23426] device bridge_slave_1 entered promiscuous mode [ 698.387171][ T344] device bridge_slave_1 left promiscuous mode [ 698.393187][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.400647][ T344] device bridge_slave_0 left promiscuous mode [ 698.406792][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.415352][ T344] device veth1_macvtap left promiscuous mode [ 698.421250][ T344] device veth0_vlan left promiscuous mode [ 698.552495][T23426] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.559376][T23426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.566458][T23426] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.573232][T23426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.730227][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.743981][T22998] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.765123][T22998] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.797106][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.805236][T15911] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.812090][T15911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.828862][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.837555][T15911] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.844413][T15911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.863608][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.887163][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.908690][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 698.917668][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.925441][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.934302][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.943203][T23426] device veth0_vlan entered promiscuous mode [ 699.033012][T23457] device pim6reg1 entered promiscuous mode [ 699.043272][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 699.052554][T23426] device veth1_macvtap entered promiscuous mode [ 699.063482][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 699.079306][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 699.404803][T23479] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.411854][T23479] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.419416][T23479] device bridge_slave_0 entered promiscuous mode [ 699.428982][T23479] bridge0: port 2(bridge_slave_1) entered blocking state [ 699.435997][T23479] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.443271][T23479] device bridge_slave_1 entered promiscuous mode [ 699.504945][T23479] bridge0: port 2(bridge_slave_1) entered blocking state [ 699.511832][T23479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 699.518919][T23479] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.525682][T23479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 699.552952][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 699.561548][T15910] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.568930][T15910] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.589437][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 699.612732][T15913] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.619625][T15913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 699.629623][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 699.638800][T15913] bridge0: port 2(bridge_slave_1) entered blocking state [ 699.645664][T15913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 699.653155][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 699.666331][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 699.689087][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 699.702590][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 699.710889][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 699.719238][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 699.727773][T23479] device veth0_vlan entered promiscuous mode [ 699.736782][ T344] device bridge_slave_1 left promiscuous mode [ 699.743388][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.751098][ T344] device bridge_slave_0 left promiscuous mode [ 699.757473][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.765640][ T344] device veth1_macvtap left promiscuous mode [ 699.803581][ T344] device veth0_vlan left promiscuous mode [ 700.003883][T23479] device veth1_macvtap entered promiscuous mode [ 700.053331][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 700.069710][T23498] device pim6reg1 entered promiscuous mode [ 700.092097][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 700.120630][T15909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 700.457367][T23521] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.464447][T23521] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.471724][T23521] device bridge_slave_0 entered promiscuous mode [ 700.490041][T23521] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.498508][T23521] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.511502][T23521] device bridge_slave_1 entered promiscuous mode [ 700.583159][T23521] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.590038][T23521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 700.597122][T23521] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.603891][T23521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 700.640250][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 700.647862][T15911] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.654871][T15911] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.664347][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 700.672428][T22998] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.679272][T22998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 700.691450][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 700.699648][T15911] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.706486][T15911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 700.724456][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 700.732661][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 700.753889][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 700.765679][T23521] device veth0_vlan entered promiscuous mode [ 700.793429][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 700.801539][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 700.809018][T10887] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 700.822880][T23521] device veth1_macvtap entered promiscuous mode [ 700.829819][T15910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 700.838445][T23542] device pim6reg1 entered promiscuous mode [ 700.856628][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 700.865450][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 701.007270][ T344] device bridge_slave_1 left promiscuous mode [ 701.013281][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.021098][ T344] device bridge_slave_0 left promiscuous mode [ 701.027164][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.035186][ T344] device bridge_slave_1 left promiscuous mode [ 701.041255][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.056451][ T344] device bridge_slave_0 left promiscuous mode [ 701.065955][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.078341][ T344] device veth1_macvtap left promiscuous mode [ 701.089916][ T344] device veth0_vlan left promiscuous mode [ 701.096755][ T344] device veth1_macvtap left promiscuous mode [ 701.115519][ T344] device veth0_vlan left promiscuous mode [ 701.528654][T23551] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.535533][T23551] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.543019][T23551] device bridge_slave_0 entered promiscuous mode [ 701.610215][T23551] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.641842][T23551] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.670847][T23551] device bridge_slave_1 entered promiscuous mode [ 701.819525][T23551] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.826499][T23551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.833549][T23551] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.840368][T23551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.895307][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 701.903312][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.910729][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.930205][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.938336][ T9908] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.945218][ T9908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.952499][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 701.960716][ T9908] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.967579][ T9908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.985971][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 701.994334][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 702.002245][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 702.015023][T23551] device veth0_vlan entered promiscuous mode [ 702.022959][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.031608][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 702.038919][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 702.060566][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 702.073937][T23551] device veth1_macvtap entered promiscuous mode [ 702.107863][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 702.122425][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 702.133001][T23578] device pim6reg1 entered promiscuous mode [ 702.403418][T23602] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.410645][T23602] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.418073][T23602] device bridge_slave_0 entered promiscuous mode [ 702.426814][T23602] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.433699][T23602] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.441244][T23602] device bridge_slave_1 entered promiscuous mode [ 702.612309][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 702.619921][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.637913][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 702.646865][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.654878][T15913] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.661751][T15913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.669057][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 702.680103][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 702.688246][T15913] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.695098][T15913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.702407][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 702.718388][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 702.743718][ T344] device bridge_slave_1 left promiscuous mode [ 702.764349][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.786124][ T344] device bridge_slave_0 left promiscuous mode [ 702.800039][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.900183][ T344] device veth1_macvtap left promiscuous mode [ 702.914903][ T344] device veth0_vlan left promiscuous mode [ 703.163505][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 703.171824][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 703.179621][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.187068][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.194285][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 703.204848][T23602] device veth0_vlan entered promiscuous mode [ 703.262839][T23602] device veth1_macvtap entered promiscuous mode [ 703.284973][T23625] device pim6reg1 entered promiscuous mode [ 703.299035][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 703.332631][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 703.341297][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 703.687076][T23650] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.693953][T23650] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.701092][T23650] device bridge_slave_0 entered promiscuous mode [ 703.743874][T23650] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.782662][T23650] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.821260][T23650] device bridge_slave_1 entered promiscuous mode [ 703.877406][T23650] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.884237][T23650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 703.891362][T23650] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.898138][T23650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 703.920756][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 703.928279][T15911] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.935287][T15911] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.946930][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 703.954892][T22998] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.961818][T22998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 703.969000][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 703.977373][T22998] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.984209][T22998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 704.003858][T23650] device veth0_vlan entered promiscuous mode [ 704.010244][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 704.018499][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 704.026395][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 704.033527][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 704.040579][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 704.048372][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 704.062936][T23650] device veth1_macvtap entered promiscuous mode [ 704.070764][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 704.085887][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 704.097502][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 704.256821][ T344] device bridge_slave_1 left promiscuous mode [ 704.262870][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.271419][T23667] syz-executor.4[23667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.271483][T23667] syz-executor.4[23667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.283814][ T344] device bridge_slave_0 left promiscuous mode [ 704.306635][T23667] syz-executor.4[23667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.306698][T23667] syz-executor.4[23667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.310924][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.361710][ T344] device bridge_slave_1 left promiscuous mode [ 704.368147][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.375478][ T344] device bridge_slave_0 left promiscuous mode [ 704.381551][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.389757][ T344] device veth1_macvtap left promiscuous mode [ 704.395597][ T344] device veth0_vlan left promiscuous mode [ 704.401584][ T344] device veth1_macvtap left promiscuous mode [ 704.407695][ T344] device veth0_vlan left promiscuous mode [ 704.681033][T23675] device pim6reg1 entered promiscuous mode [ 704.877751][T23681] syz-executor.3[23681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.877827][T23681] syz-executor.3[23681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.937416][T23668] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.959130][T23668] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.966804][T23668] device bridge_slave_0 entered promiscuous mode [ 704.975225][T23668] bridge0: port 2(bridge_slave_1) entered blocking state [ 704.982196][T23668] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.024950][T23668] device bridge_slave_1 entered promiscuous mode [ 705.145256][T23668] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.152146][T23668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 705.159224][T23668] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.165994][T23668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.272585][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 705.280690][T15911] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.288278][T15911] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.307772][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 705.327938][T15913] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.334804][T15913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.343051][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 705.352588][T15913] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.359445][T15913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 705.366939][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 705.376835][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 705.394160][T23668] device veth0_vlan entered promiscuous mode [ 705.402035][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 705.410833][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 705.419008][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 705.426725][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 705.441882][T23668] device veth1_macvtap entered promiscuous mode [ 705.451163][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 705.464605][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 705.481039][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 705.745372][T23713] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.752465][T23713] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.759738][T23713] device bridge_slave_0 entered promiscuous mode [ 705.768578][T23713] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.775756][T23713] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.783266][T23713] device bridge_slave_1 entered promiscuous mode [ 705.854318][T23713] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.861203][T23713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 705.868627][T23713] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.875414][T23713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.884082][T23723] device pim6reg1 entered promiscuous mode [ 705.913614][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 705.921427][T15913] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.928948][T15913] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.946796][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 705.954704][T15913] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.961468][T15913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.977152][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 705.985246][T15913] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.992106][T15913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.000095][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 706.011687][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 706.027439][T22998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 706.041736][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.049804][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.057173][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 706.065994][T23713] device veth0_vlan entered promiscuous mode [ 706.087143][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 706.124767][ T344] device bridge_slave_1 left promiscuous mode [ 706.143109][ T344] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.150603][ T344] device bridge_slave_0 left promiscuous mode [ 706.162397][ T344] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.183303][ T344] device veth1_macvtap left promiscuous mode [ 706.191048][ T344] device veth0_vlan left promiscuous mode [ 706.301106][T23713] device veth1_macvtap entered promiscuous mode [ 706.327244][T15911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 706.344924][T15913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/23 22:22:05 SYZFATAL: executor 1 failed 11 times: executor 1: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67