last executing test programs: 1.640316262s ago: executing program 4 (id=4855): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0x5}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0xe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81}, 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x15) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000000), &(0x7f0000000040)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.587792075s ago: executing program 4 (id=4859): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={&(0x7f0000000300)="def5820587644d4d3bb1ae7815a1b49942d5f228f3a3bcca220dfac4eb958e7eb26d5317eb64e92ce3db0da82983214adce1c2e5349e7b847624b302c287a8ae33c62a011cfb41dc059d6dd3bb47eaf21013e3c52ca0855d4f875bb448884658a380824919291d1893ce0f65ce923516a8d1bdf58e0fbdc30fdfca6531907f9baa9ae29680c6ee45390901b2356dbf42d730e2e8a15e83b0641518651408a8dd5c6abfcfb07e88abbbb586f47fe1e320a9f1bbec953694ced75384dd14460014d674645fef06ab683d11652d1f10ac45796323991a", &(0x7f00000005c0)=""/139, &(0x7f0000000680)="95ab4f2ad7c6d36500f7cf528680a36bbfdce28c9a39246bde07cc8df1448abec28e836424c0b5fce91580c527b1f2324254c0904549a7a942459ccd6362ae54991cbc161f94334dcf924d26f1cb6617a1d71da67f4acd51be8496fc0b80c46bb9f87e1be48c7d94945b4aaa4adde24688388794a3febf974185e7da99b5335f63bdff71a9cb1dce6f3d1aa8f6af5ad9d1983bbe95b4504daa584d30ebb287a551c9e590949b4d2f433a3b7c6abd49e94fcf0261c2d148", &(0x7f0000000740)="83ea997d47bf86af57e3300382f5304a9040a31d7ab925f0b46c9676986793c5f4e75ba21199a5a16b05ed3abcd502de6653f8bedbaaf9034a000c6c9f12fbd959a29135d3bdc383fec362d26500e98fd5db938ecd5669766eea9977412917b8b83409481451e2d56909ca27b6d164e67ee05ffce79156c412552d4814d478c5e6563eddd005e51471b4be867da4d1af05f0bd9da1c345aa6704174d57c9c6852f237c243477160d8db26cb5fe6f94674b0a1d27b53fafb068e182c1322d89c996f454c0e325e564575c739980c51ea5d234154a63ac75057299b37ebe46c213f9e4ca03", 0x8, 0xffffffffffffffff, 0x4}, 0x38) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff004}, {0x6}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x13, 0x7, 0x80000000, 0x8, 0x83, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1201, r2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0x9, 0x7, 0x400, 0x2304, r6, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x5, 0x2}, 0x48) recvmsg(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000840)=""/54, 0x36}, {&(0x7f0000000e40)=""/262, 0x106}], 0x2, &(0x7f0000000940)=""/125, 0x7d}, 0x0) socketpair(0x26, 0x2, 0xfff, &(0x7f00000002c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, 0x0) 1.533576187s ago: executing program 3 (id=4861): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800fa00b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.338595145s ago: executing program 0 (id=4865): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1, 0x4, 0x8}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[], 0x5) write$cgroup_type(r1, &(0x7f0000000000), 0xd000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xd, 0x0, 0x0, 0x0, 0x83000000}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x2292f76207602815, &(0x7f0000000240)=""/146, 0x0, 0x8}, 0x80) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000140), 0x12) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x810, 0x2}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd={0x18, 0x0, 0x1, 0x0, r4}, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ITER_CREATE(0x21, 0x0, 0xfec6) openat$cgroup_ro(r2, &(0x7f0000000300)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.337738255s ago: executing program 3 (id=4866): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x800, 0x6, &(0x7f00000006c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000580)='THAWED\x00', 0x7) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r2, &(0x7f0000000300), 0x20000000}, 0x20) close(r0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}, 0x20) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1.21670892s ago: executing program 4 (id=4869): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x1c, &(0x7f0000000bc0)=ANY=[@ANYBLOB="80000a7cefd9840fd858d0450cfc17727a420000ed0904cb8f868bdf22bfbcec8f3e863ce818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000020000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000007b000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r4, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x53, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xb0, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_lsm={0x1d, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xca6, 0x0, 0x0, 0x0, 0xffffff81}, [@ldst={0x2, 0x1, 0x1, 0x2, 0x5, 0xffffffffffffffc0, 0xffffffffffffffff}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x15}, @map_fd={0x18, 0x1, 0x1, 0x0, r0}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f0000000000)='GPL\x00', 0x81, 0x45, &(0x7f0000000340)=""/69, 0x40f00, 0x1, '\x00', r5, 0x1b, r6, 0x8, &(0x7f0000000480)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x10, 0x0, 0x7}, 0x10, r7, 0x0, 0x6, &(0x7f0000000880)=[r1, r0, r1], &(0x7f00000008c0)=[{0x2, 0x1, 0xb, 0x4}, {0x0, 0x1, 0x8, 0x9}, {0x4, 0x3, 0x10, 0xa}, {0x5, 0x5, 0xe}, {0x5, 0x1, 0xc, 0x1}, {0x0, 0x2, 0x0, 0xb}], 0x10, 0x6}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r4, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 1.21455181s ago: executing program 0 (id=4871): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe2, 0x1, 0x0, r0, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='block_split\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='block_split\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) 1.117293464s ago: executing program 4 (id=4874): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fffe00000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='ext4_drop_inode\x00', r1}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa3230b0"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0xe4ffffff00000000, &(0x7f0000004440)=@base={0x11, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 994.798899ms ago: executing program 2 (id=4875): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x50, 0xa7f, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 942.235821ms ago: executing program 0 (id=4876): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800fa00b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 940.174671ms ago: executing program 2 (id=4877): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x20, 0x0, &(0x7f0000000040)="ded61b966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e", 0x0, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000004000000000000100000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"/2356], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x10, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800004800000000000100000000000000110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f0000001700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x8, [@const={0xf, 0x0, 0x0, 0xa, 0x5}, @ptr={0x9}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1}]}, @typedef={0x6, 0x0, 0x0, 0x8, 0x4}, @const={0xc, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x61, 0x2e, 0x5f, 0x0, 0x0, 0x2e]}}, &(0x7f0000001780)=""/214, 0x64, 0xd6, 0x0, 0x3}, 0x20) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000640)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000740), 0x0, 0x0, 0x4c, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="18120000", @ANYRES32=r4, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc0, &(0x7f0000000300)=""/192, 0x0, 0x74, '\x00', r6, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x1, 0x100, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f00000004c0)=[r4, r5], &(0x7f0000000500)=[{0x0, 0x5, 0x7, 0xb}, {0x4, 0x5, 0x1, 0x7}, {0x0, 0x1, 0xc, 0x6}], 0x10, 0x6}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000600)={r7, r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r9}, 0x10) 914.544342ms ago: executing program 0 (id=4878): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth0_to_team\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r3, @ANYRES32, @ANYRESOCT=r3], 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r6}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1e, 0x16, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffc000}, @call={0x85, 0x0, 0x0, 0xb0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, &(0x7f00000001c0), 0x40f00, 0x1, '\x00', r7, 0x36, r5, 0x8, &(0x7f0000000340)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x10, 0x5, 0x36e9}, 0x10, r8, r4, 0x1, &(0x7f0000000400)=[r3, r3, r3, r3, r3], &(0x7f00000004c0)=[{0x5, 0x3, 0x10, 0x3}], 0x10, 0x3}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') 852.267545ms ago: executing program 2 (id=4879): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x9, 0x1, 0x5, 0x0, 0x8001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x1040, 0xfffffffffffffffc, 0x9, 0x1, 0xfff, 0x1f, 0x1000, 0x0, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000100)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000200)=""/201, 0xc9}, {&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f0000000400)=""/153, 0x99}], 0x3, &(0x7f0000000500)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x40000040) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x3, &(0x7f00000005c0)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x92, 0x0, 0x0, 0x0, 0x401}], &(0x7f0000000600)='GPL\x00', 0xca, 0xd, &(0x7f0000000640)=""/13, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x9, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x7f}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000580)='jbd2_handle_extend\x00', r3}, 0x10) r5 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000800), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000840), 0x9) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000880), 0x8) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000ac0)={r6, &(0x7f00000008c0)="c18fa80280c77235d235737c5ba5e90312d8294bbaacf6142c489ae5769f3ecd9f264f9226e8f9569bf0b5a56c4fbf1969e9eee063d6d3e2514d5c1dca6c29fb892c50b6f70f867e68a1575510c46c8c999b8cee483ccd4ba81b09a4698971d906cf1993c82ad06c254d01b0c50dedcd4b972a6787821ad0d3ef4ecbd7739005b571bf419e3dfbcf02299d3ee7fb6cd3d54ddfae7380137af5a50b87aa64f690f2a92ff5e5862f3ef4f6f5fbe4baef358424324eda1b82a6fb5db38cb5defff4e28ba5dede09e3ed3db1ae694f3a6bb07f88b8a881aa39", &(0x7f00000009c0)=""/230}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000b00)='f2fs_iostat_latency\x00', r6}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r3, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x26, &(0x7f0000000e00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0xb8, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000010c0)={0x3, 0x0}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x7, 0x13, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x8}, [@cb_func={0x18, 0xa, 0x4, 0x0, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @alu={0x4, 0x1, 0xb, 0xb, 0x0, 0x20, 0xffffffffffffffff}]}, &(0x7f0000000c40)='syzkaller\x00', 0x80000000, 0x88, &(0x7f0000000c80)=""/136, 0x41100, 0x2, '\x00', r7, 0x35, r6, 0x8, &(0x7f0000001040)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001080)={0x2, 0x9, 0x363, 0x100}, 0x10, r8, 0xffffffffffffffff, 0x6, &(0x7f0000001100)=[r6, r6, r6], &(0x7f0000001140)=[{0x5, 0x5, 0xb, 0x7}, {0x0, 0x2, 0xd, 0x2}, {0x1, 0x4, 0xc, 0xb}, {0x0, 0x5, 0x8, 0x7}, {0x4, 0x3, 0x1, 0x5}, {0x2, 0x4, 0x5, 0x9}], 0x10, 0xffc}, 0x90) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000012c0)={0x7, &(0x7f0000001280)=[{0x3, 0x5, 0x7f, 0x7}, {0x8, 0x0, 0x1f, 0x1}, {0x1ff, 0xff, 0x2, 0x88}, {0x7, 0x0, 0xb9, 0x16}, {0x4, 0x5, 0x48, 0x5}, {0x1, 0x4, 0x5, 0xe37}, {0x101, 0x6, 0x80, 0x1}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000001300)='syzkaller\x00') ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000001340)={'vlan1\x00', @random="f4126b248147"}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x324) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000001380)=""/58) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001440)={{0x1, 0xffffffffffffffff}, &(0x7f00000013c0), &(0x7f0000001400)=r3}, 0x20) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={&(0x7f0000001740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x6, [@ptr={0xf, 0x0, 0x0, 0x2, 0x5}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x1, [{}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x1}, @typedef={0x1}, @var={0xf, 0x0, 0x0, 0xe, 0x2}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0x6, 0x2}, {0xb, 0x6}, {0x2, 0x200}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xf, 0x3}, {0x2}, {0x0, 0x3}, {0x3, 0x3}, {0xd, 0x1}, {0x4, 0x1}, {0xf, 0x1}]}]}, {0x0, [0x0, 0x5f, 0x5f, 0x0]}}, &(0x7f0000001840)=""/67, 0xd2, 0x43}, 0x20) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001940)={r6}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x11, 0x2d, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10c0000}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @call={0x85, 0x0, 0x0, 0x23}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @exit, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8000}]}, &(0x7f0000001600)='syzkaller\x00', 0x1, 0xea, &(0x7f0000001640)=""/234, 0x40f00, 0x4e, '\x00', r7, 0x0, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0xa, 0xffffffff, 0x98}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001980)=[r6, r6, r12, r6, r6], &(0x7f00000019c0)=[{0x3, 0x2, 0x0, 0x2}, {0x4, 0x5, 0xe, 0xa}, {0x5, 0x4, 0x2, 0x4}, {0x2, 0x4, 0x10, 0x4}, {0x0, 0x5, 0x8, 0x6}], 0x10, 0x4}, 0x90) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000001b00)={'pimreg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001d40)={&(0x7f0000001b40)="baccc62b23b28e1fa6599ffc7da87175aebd7116e6666acd3b0309d92f8fca5ea4073ec23a6071e9919a1c17ea47daab30503a27eece223384dfd00c05436732c37b77d4d636fb1434e55e1e7155fc3c5e1fa7b97f", &(0x7f0000001bc0)=""/106, &(0x7f0000001c40)="78eb5be59473b64e12f01a81fbbc39031ad327a144affb6852d298a3169f74a238152f183b3183bda0a82ae2106042d4ac04a983687ce5a595a02f5a7f946aa91bea4c7dad7444ae425e4665318be45038326fcc7ec16423d88478cca0e078b75ba5d46f013b28e7dc3af632e82e6f9190174c0a2e60f83c1574daa3b29404f99cc2", &(0x7f0000001d00)="137f7ad934f5ab4b1b75ea000c7d4a5c8a6b6a5d6921bdd9663750d704045f0b3dc1786cf3da347f38c1273150984939ca7746", 0x4, r10, 0x4}, 0x38) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x1, 0x6f, 0x2, 0x3f, 0x0, 0x98, 0x131181, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9cb, 0x4, @perf_config_ext={0x200, 0x401}, 0x100800, 0x39, 0x7, 0x3, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, 0x6}, r2, 0x9, r4, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001f40)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0xf, 0xf, &(0x7f0000001e00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10000}, [@ldst={0x2, 0x1, 0x1, 0x6, 0x9, 0x0, 0x1}, @exit, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_val={0x18, 0x2, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000001e80)='GPL\x00', 0x3, 0x3c, &(0x7f0000001ec0)=""/60, 0x41100, 0x20, '\x00', r7, 0x18, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001f00)={0x1, 0x7, 0x81, 0x3}, 0x10, r13, r6, 0x2, &(0x7f0000002080)=[r10, 0xffffffffffffffff, r10, r12, r6, r12, r10, 0xffffffffffffffff, r10], &(0x7f00000020c0)=[{0x3, 0x1, 0x4, 0xc}, {0x5, 0x5, 0xc, 0x9}], 0x10, 0x200}, 0x90) 806.217387ms ago: executing program 1 (id=4880): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000004007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_unlink_enter\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) unlink(&(0x7f0000000140)='./cgroup\x00') 800.291297ms ago: executing program 2 (id=4881): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={0xffffffffffffffff, 0x58, &(0x7f0000001380)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001440)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0xc6, 0xa, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3a}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1c, 0x10, &(0x7f00000007c0)=@raw=[@generic={0x4, 0x0, 0x0, 0x0, 0x7b}, @ringbuf_query, @call, @alu={0x4, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ringbuf_query, @ringbuf_query], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x20, &(0x7f0000000180)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}}, @call={0x85, 0x0, 0x0, 0xc4}, @call={0x85, 0x0, 0x0, 0x7f}, @generic={0x20, 0xb, 0x1, 0xffff, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x2}], &(0x7f0000000280)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000001480)=""/4096, 0x41100, 0x43, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0xe, 0x9}, 0x10, 0x0, r1, 0x6, &(0x7f0000000340)=[0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000380)=[{0x5, 0x4, 0x0, 0x7}, {0x4, 0x3, 0x7, 0xc}, {0x4, 0x4, 0x0, 0xb}, {0x5, 0x5, 0xd}, {0x0, 0x3, 0x10, 0x8}, {0x1, 0x1, 0x6, 0x2}], 0x10, 0x1}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r3}, &(0x7f0000000140), &(0x7f00000004c0)=r4}, 0x20) ioctl$SIOCSIFHWADDR(r2, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0608002000"}) 786.170158ms ago: executing program 3 (id=4882): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400)=[{}], 0x10, 0x10000}, 0x90) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x98, 0x98, 0x3, [@const={0x5, 0x0, 0x0, 0xa, 0x1}, @struct={0xa, 0x3, 0x0, 0x4, 0x1, 0x1, [{0x9, 0x3, 0xffffffff}, {0x0, 0x1, 0x1}, {0x0, 0x4, 0x7}]}, @enum={0x2, 0xa, 0x0, 0x6, 0x4, [{0xb, 0xffffffff}, {0x5, 0xbd3}, {0xb, 0x7fffffff}, {0xc, 0x8}, {0xe, 0x7}, {0x1, 0x7fff}, {0x2, 0x7}, {0x9, 0x81}, {0xd, 0x36e2}, {0x5, 0x1000}]}]}, {0x0, [0x61]}}, &(0x7f0000000700)=""/254, 0xb3, 0xfe, 0x0, 0x40}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000240), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x16, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000003c0)="16", 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000640)='powernv_throttle\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xa8, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x5, 0x1, 0x0, 0xf, 0x3, [{0x5}], "d7998c"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'O'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e, 0x61, 0x61]}}, &(0x7f0000000640)=""/207, 0x49, 0xcf, 0x1}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001980)={0xffffffffffffffff, 0xe0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5, &(0x7f0000001700)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000001780), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000017c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x5, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat$cgroup_procs(r2, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000001480)=ANY=[@ANYBLOB="00000000d2e5e710452c97c086ba0bb2659717a357c357f71f913d284909c7795a"], 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x0, 0xa, 0x9, 0x102, r6, 0x400, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xa}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 785.853277ms ago: executing program 0 (id=4883): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000030000000000000000000000850000008700000085000000050000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0810", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x1001, 0x81}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r4}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x12) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2180, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 769.105828ms ago: executing program 1 (id=4884): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000f018000000000000181100000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r2}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000300000000000000000000001801000020a0702500000000008000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000000400000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r5, 0x4) sendmsg(r3, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r1}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x12) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x2, 0x80, 0xc2, 0xc}}) 767.531368ms ago: executing program 3 (id=4885): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x200000000000000b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f00000001c0)='%+9llu \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_evict_inode\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_evict_inode\x00', r2}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') 682.090872ms ago: executing program 2 (id=4886): sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000020086000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f00000007c0)="9c98ea22d5c537dbfe22f16b02420bc6b7f615faeaa78edcd383fb00000000ef16a4c3be97c71c59ff4b1b28d740ace3c0728b58408a87afcc11782df7bb6daded4ee2dc0d1772dce3e127c5eef2c7bccf0045ca2efb585ee3660cfd0d36acea885b37a19802fcba72bb851cba7ab4e9702eaef05d558d0a405f3648500b95ff1cef32571eda45708374e7545bc03ec5d2cfba3433c17c621a35e9bf00"/166, &(0x7f0000000a40)=""/168}, 0x19) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5e, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x18, 0x4, 0x8000, 0x61, 0x3000, 0xffffffffffffffff, 0x2000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000005c0), 0x6, r6}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 678.763012ms ago: executing program 1 (id=4887): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000040000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x1, 0xc}]}, {0x0, [0x5f]}}, &(0x7f0000000640)=""/159, 0x27, 0x9f, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r2}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_ext_remove_space_done\x00', r1}, 0x10) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x7, 0x4}, 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r5}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @alu={0x7, 0x0, 0x8, 0x3, 0x6, 0x10, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @cb_func={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x46}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}]}, &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x4b, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x8, 0x7c000000, 0x9}, 0x10, 0x554d, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000340)=[{0x4, 0x4, 0x2, 0x7}, {0x2, 0x5, 0x8, 0xa}, {0x5, 0x5, 0x4, 0xc}], 0x10, 0x80000001}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000001500)=ANY=[@ANYBLOB="180000000000000000000000000000007912000000000000950000000000000096dadc19871255dc17a1fcfcf1b8cacfa3975c77f3a3a7d5aa32d4c0124a0ceaf17781072e1236edce34736da678c97ca90e7dea1113cc3f21bd73e09a3038111e0fd017b77b4a2fc2a8204890ee4c9673215e7451587ed90ad448f0b497b0a6c8d64814db220417356edd1de4cafae2bd6112ef691595df17fb989b6020efcab2343f056c9756702c7c269af8d2947dba3a4ece393825bd94bb156e796d703d405ca3f0d2b33d986ef56e4d6aa707889fdb3d87cde429df"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000dc181100", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000b30000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000800000085000000a5000000185100000f000000000000000000000085000000ae000000186200000600000000000000eafeffff18000000010000000000000001000100bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x0, 0xf8, &(0x7f00000008c0)=""/248, 0x41000, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x1, 0xb, 0x7, 0x99}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r7, r6]}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc76, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r8, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) 565.744727ms ago: executing program 3 (id=4888): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800fa00b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 535.923018ms ago: executing program 1 (id=4889): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb1, 0x7f}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f40)={r5, 0x58, &(0x7f0000001600)}, 0x10) 365.966685ms ago: executing program 1 (id=4890): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) close(r0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x101, 0x0, r0, 0xffffffe1, '\x00', 0x0, r0, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb7, 0xb7, 0x9, [@fwd={0x6}, @datasec={0x4, 0x2, 0x0, 0xf, 0x1, [{0x1, 0x40, 0x8}, {0x2, 0x2, 0x1}], '4'}, @ptr={0x10, 0x0, 0x0, 0x2, 0x4}, @datasec={0x1, 0x5, 0x0, 0xf, 0x2, [{0x1, 0x6c04, 0xe07d}, {0x2, 0x80, 0x2}, {0x1, 0x5, 0x400}, {0x4, 0x5, 0x80000000}, {0x4, 0xff, 0x10001}], 'C9'}, @fwd={0x1}, @enum={0xc, 0x3, 0x0, 0x6, 0x4, [{0x9}, {0xa, 0x690}, {0x7, 0x80000001}]}]}, {0x0, [0x30, 0x61, 0x30, 0x5f, 0x30, 0x0, 0x5f]}}, &(0x7f0000000380)=""/100, 0xd9, 0x64, 0x0, 0x401}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x4e81, 0x0}, 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000500)=@raw=[@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @generic={0x1, 0x9, 0xd, 0xff, 0x4}, @alu={0x4, 0x0, 0xb, 0x2, 0x0, 0xffffffffffffffe0}, @ldst={0x3, 0x0, 0x1, 0x7, 0x2, 0x6, 0x8}], &(0x7f0000000580)='syzkaller\x00', 0x2, 0x46, &(0x7f00000005c0)=""/70, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xd, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000006c0)=[{0x5, 0x1, 0x10, 0x4}, {0x5, 0x3, 0xb, 0x9}, {0x5, 0x3, 0x8, 0x4}, {0x4, 0x3, 0xe, 0x1}, {0x0, 0x2, 0xe, 0x1}], 0x10, 0x3}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0xffffff01, 0x0, r0, 0x24, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1f, 0x10, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x4, 0x1, 0x127e755012b4ee06, 0x6, 0xb, 0x0, 0xfffffffffffffff0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x464, 0x15, &(0x7f0000000180)=""/21, 0x41100, 0x0, '\x00', r3, 0x8, r4, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x6, 0x9, 0xd60c}, 0x10, r5, r6, 0x1, &(0x7f0000000880)=[r7, r0, r0, r0, r0], &(0x7f00000008c0)=[{0x2, 0x2, 0x1, 0x2}], 0x10, 0x1}, 0x90) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc3, 0xc3, 0x5, [@ptr={0xa, 0x0, 0x0, 0x2, 0x1}, @var={0x5, 0x0, 0x0, 0xe, 0x2}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x6, 0x2}, {0x6, 0x4}, {0xe, 0x2}, {0xf, 0x5}, {0x2, 0x3}, {0x10, 0x3}, {0x8, 0x2}, {0x5, 0x1}, {0x3, 0x2}, {0x8, 0x3}]}, @datasec={0x4, 0x5, 0x0, 0xf, 0x3, [{0x2, 0x3be7e1d7, 0x2}, {0x5, 0x80, 0x20}, {0x5, 0x0, 0x20}, {0x4, 0x4, 0x5}, {0x1, 0xb2, 0xff}], "c02562"}]}, {0x0, [0x2e, 0x61, 0x5f]}}, &(0x7f0000000ac0)=""/102, 0xe1, 0x66, 0x1, 0x1}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x18, 0x3, 0x1, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r3, r9, 0x1, 0x4, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000dc0)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xd, 0x1c, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x53, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@ldst={0x3, 0x2, 0x7, 0xa, 0x9, 0xfffffffffffffffe}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}, @ldst={0x1, 0x0, 0x3, 0x7, 0x3, 0x80, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000d00)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x19, '\x00', 0x0, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x4, 0x1, 0x5, 0xffffffff}, 0x10, r11, r6, 0x4, 0x0, &(0x7f0000000e00)=[{0x5, 0x4, 0xa, 0x6}, {0x1, 0x1, 0xf, 0x7}, {0x4, 0x5, 0x8, 0xb}, {0x4, 0x1, 0x9, 0x3}], 0x10, 0x7f}, 0x90) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000f00), 0x2, 0x0) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f80)=@generic={&(0x7f0000000f40)='./file0\x00', 0x0, 0x20}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000fc0)={r2, 0x17, 0xc}, 0xc) r13 = syz_clone(0x40000000, &(0x7f0000001000)="68b4d6cc9562e8f6b841af7715301450461b2f6bd9f3b808", 0x18, &(0x7f0000001040), &(0x7f0000001080), &(0x7f00000010c0)="3bbb216fb2f6d64dc4ef2ba14f5b4d460f9dc7dd3cacb11094c94c9e6ab86a0db0fba0eafe4f26da15e61d57d92d146a480e0471aa3405ca5052be5a84346c4f9fc15a74") syz_open_procfs$namespace(r13, &(0x7f0000001140)='ns/user\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000012c0)={r4, 0x20, &(0x7f0000001280)={&(0x7f0000001180)=""/61, 0x3d, 0x0, &(0x7f00000011c0)=""/144, 0x90}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001300)={0x7}, 0x8) r14 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f0000001380)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001400)=@o_path={&(0x7f00000013c0)='./file0\x00', r8, 0x4000, r9}, 0x18) r16 = openat$cgroup_ro(r14, &(0x7f0000001440)='pids.current\x00', 0x0, 0x0) socketpair(0xf, 0x2, 0x4, &(0x7f0000001480)) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001700)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xd, 0x17, &(0x7f00000014c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8fb2, 0x0, 0x0, 0x0, 0xfff}, [@map_val={0x18, 0x9, 0x2, 0x0, r10, 0x0, 0x0, 0x0, 0x8}, @generic={0x9, 0x7, 0x0, 0x6, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r16}}, @map_val={0x18, 0x7453773eac773d06, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1000}]}, &(0x7f0000001580)='syzkaller\x00', 0xe2b, 0xa6, &(0x7f00000015c0)=""/166, 0x40f00, 0x1, '\x00', r3, 0x0, r9, 0x8, &(0x7f0000001680)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000016c0)={0x1, 0x9, 0x43, 0x1fe}, 0x10, r17, r12, 0x3, &(0x7f0000001740)=[r10], &(0x7f0000001780)=[{0x0, 0x4, 0xd, 0x4}, {0x3, 0x1, 0xa, 0x3}, {0x4, 0x3, 0x4, 0x5}], 0x10, 0x2800}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001880)) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@base={0x3, 0x9, 0x1, 0xff, 0x240c, r4, 0xfffffeff, '\x00', r3, r15, 0x3, 0x0, 0x5}, 0x48) gettid() 363.791915ms ago: executing program 0 (id=4891): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair(0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 341.736536ms ago: executing program 3 (id=4892): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x800, 0x6, &(0x7f00000006c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000580)='THAWED\x00', 0x7) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r2, &(0x7f0000000300), 0x20000000}, 0x20) close(r0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}, 0x20) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 286.281988ms ago: executing program 1 (id=4893): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x800, 0x6, &(0x7f00000006c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000580)='THAWED\x00', 0x7) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r2, &(0x7f0000000300), 0x20000000}, 0x20) close(r0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}, 0x20) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="61106800000000006113740000000000bfa00000000000000700000008ffffffd503010017740040950000000000000069163a0000000000bf67000000000000350607000fff07201706000020190000160300000ee60060bf050000000000007b650000000000006507f9ff01000000070700004d83dde4c375000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f17540faf80250aa20c669a5e12814cb1cea5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369226066812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000400c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20ceddf4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10fd7ed6735154beb4000000000000000000000000004000bc00f6746a9709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c1d926a0f6a5480a55c22fe3a5ac00000000000000000000000500002000000000fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e14d90deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b06ff7f0000000000007f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a1f37302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089e0b1c23c0f3cdad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a1a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631d22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0af1cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4c6ea9604faf0453bedf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c29984864961a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a09d8be0fc5beecf153236c19740be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000000000000000000000000000000000001386866b311bd144bc32e059658c9f8342c90c1ade31b78072841b8b5a943d62a44cea6b050c42e3c205fad6a23fb43c93da0f49d911877265e6ee443e37397ecf89021e7f579e8d3a74c12b52938d91e9de07fc8eeeb9505f4a9c26266bf5449484ccc1317c7476"], &(0x7f0000000100)='GPL\x00'}, 0x48) 151.930884ms ago: executing program 4 (id=4894): r0 = getpid() perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x4, 0x8, 0x80, 0x20, 0x0, 0x1000, 0x184000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x20, 0x1f, 0xe6, 0x8, 0x3, 0x7f, 0x8, 0x0, 0x3, 0x0, 0xffffffff00000000}, r0, 0xe, 0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x22, 0x6, 0xd, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000006c0)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000280)="266f6a8fd4116e83472a5481adabaac4e28965049ef62547dc56f0f066b8d8fda6b5957f90a882ab730f676f6ba5341703ce8038dd1333afabba43b02feb678dae46b201b41b6a216772bef91a87e1313357463f5e97fca8809fcdbb5010ff2fdecad14493197a60c30d5726cd03e1463e5774646d42ef6de2eb02726312e69a68d8275a59801eb3a67bc4", 0x8b}, {&(0x7f00000004c0)="ae61716809bf1b84c4adcbc9da77df1868e0d7bfd330a9ba4d1e7506344049047342e982eb352d12e0bd0e656c20c44a234bbacd4a5450bf381d3ebb19e6418fdc44d2ac7644293b8d623e8d656aa81bd3124f3248f4ba959cd322359db11cc78d7b1ecb65e7e43245fcadbfe318597fe5bc1c027cb5f490d2232f498d4372a13a5d69f81dbf4fafae192350f36c21133d1bcd8df0883a7168caaea05bea3dde79a85fe7e8087288076dc157892ac2bd4ecab4d1b99d26c089197d5ed29c931c252b3247b73c107349257a9249355f", 0xcf}, {&(0x7f0000000180)="30609ff3269bbf2a08b56b5651c79bb772fa1b2a8d8f39c526fb70b77cc18804c8eb64aead38d6ff706fab35633e7624524d966a9020a6121d24c2043934070223190e1d38e502e77a380500bc6d27865832b1713b30997456", 0x59}, {&(0x7f0000000080)="3e6a58ee98f3d07ac803ced839476ab0c408fe601b9b7c611bfb7e65a750a3287672ed336d6c088f4e3ed5528cb9c90cf4b380c713", 0x35}, {&(0x7f00000003c0)="01ef4fd0126557c16ba1a66bdf4997ec706fbbd1d297b2b3fb59823577d8bd58722df49e9feb50a2a746a5e4bf0422ef9ca97ab2e6ba9d618b64c91a1f5efc400c32ffc653e9045c448ff4b47216c7ab07a66d8a1e80e48d169c1a5a28a82a322e28c42739102d9a10", 0x69}, {&(0x7f00000005c0)="9a9dd68c4d7ef79150cf13f6e10a75e7e395643ee94be29b80f8a5d20f29c5426c087aabd20f3badd58d6adc5cb0d98bd2482441c1e1e781bab320da21cbcc256a044f4b85fb420e85dc1edc", 0x4c}], 0x6, &(0x7f0000000340)="596a596db5358e828647f35511bc9c05512976448bb5915d81ad7c0c381fb196460c583dbcb870b0c43bb9cec3aba2673942f6d6e239ae25e16b", 0x3a, 0x4801}, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 68.114027ms ago: executing program 2 (id=4895): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="d71f5303d4529522808f9d8b635175fbc424926acaed360dc76605d3fe4fffe5337a7226a668f21d37916e1a2a84ba118cce577aeaec7e083a475cb3350effc904a236e5d109c314739559c5d157c2c979e9039ce4be5b1957906e2cb01d2bfed1c544bab7", @ANYRESHEX=r1, @ANYRESHEX=r0, @ANYRESHEX=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x90) 0s ago: executing program 4 (id=4896): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000010008500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x2000a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x8000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0x7ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000800)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043", @ANYRES8=r4, @ANYRESHEX=r5, @ANYRES64=r2, @ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x103, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002240)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0xaa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x1, 0x80004, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r10}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r8}, &(0x7f0000000940), &(0x7f0000000980)=r7}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) kernel console output (not intermixed with test programs): need to use ext2online to resize further [ 75.664571][ T3189] syz.1.1159[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.674194][ T3189] syz.1.1159[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.725624][ T3189] syz.1.1159[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.745870][ T3189] syz.1.1159[3189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.808592][ T3189] device syzkaller0 entered promiscuous mode [ 76.652622][ T3215] device syzkaller0 entered promiscuous mode [ 78.357757][ T3274] device syzkaller0 entered promiscuous mode [ 78.609091][ T3283] syz.0.1194[3283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.609142][ T3283] syz.0.1194[3283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.787600][ T3284] syz.0.1194[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.840287][ T24] audit: type=1400 audit(1719775799.910:154): avc: denied { create } for pid=3289 comm="syz.4.1195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 78.878442][ T3284] syz.0.1194[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.938617][ T3290] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.159851][ T3290] O3ãc¤±: renamed from bridge_slave_0 [ 81.093683][ T3384] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 81.236313][ T3393] device syzkaller0 entered promiscuous mode [ 81.623466][ T93] udevd[93]: worker [344] terminated by signal 33 (Unknown signal 33) [ 81.631496][ T93] udevd[93]: worker [344] failed while handling '/devices/virtual/block/loop0' [ 81.660963][ T93] udevd[93]: worker [346] terminated by signal 33 (Unknown signal 33) [ 81.676440][ T93] udevd[93]: worker [346] failed while handling '/devices/virtual/block/loop4' [ 81.878209][ T24] audit: type=1400 audit(1719775802.950:155): avc: denied { setattr } for pid=3455 comm="syz.0.1265" path="/dev/net/tun" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 82.059211][ T93] udevd[93]: worker [345] terminated by signal 33 (Unknown signal 33) [ 82.098466][ T93] udevd[93]: worker [345] failed while handling '/devices/virtual/block/loop2' [ 82.121770][ T3474] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 82.216543][ T93] udevd[93]: worker [304] terminated by signal 33 (Unknown signal 33) [ 82.273441][ T93] udevd[93]: worker [304] failed while handling '/devices/virtual/block/loop1' [ 82.703179][ T3510] syzkaller0: refused to change device tx_queue_len [ 82.826620][ T3522] tap0: tun_chr_ioctl cmd 1074025677 [ 82.832065][ T3522] tap0: linktype set to 774 [ 83.146908][ T3542] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 83.156067][ T3540] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.164226][ T3540] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.171700][ T3540] device bridge_slave_0 entered promiscuous mode [ 83.179229][ T3540] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.186123][ T3540] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.193856][ T3540] device bridge_slave_1 entered promiscuous mode [ 83.243390][ T3540] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.250267][ T3540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.257387][ T3540] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.264151][ T3540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.292296][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.301552][ T2738] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.309348][ T2738] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.333644][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.341606][ T2738] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.348462][ T2738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.356164][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.365146][ T2738] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.372032][ T2738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.379431][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.389372][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.411745][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.421998][ T3540] device veth0_vlan entered promiscuous mode [ 83.429956][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.438421][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.446398][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.458750][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.468213][ T3540] device veth1_macvtap entered promiscuous mode [ 83.480144][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.497456][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.506950][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.658578][ T3562] device pim6reg1 entered promiscuous mode [ 83.863085][ T749] device bridge_slave_1 left promiscuous mode [ 83.869077][ T749] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.891622][ T749] device O3ãc¤± left promiscuous mode [ 83.896989][ T749] bridge0: port 1(O3ãc¤±) entered disabled state [ 83.923939][ T3601] syz.0.1325[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.923992][ T3601] syz.0.1325[3601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.935455][ T749] device veth1_macvtap left promiscuous mode [ 83.955624][ T749] device veth0_vlan left promiscuous mode [ 84.492597][ T3659] syz.4.1354[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.492653][ T3659] syz.4.1354[3659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.533712][ T3657] device veth0_vlan left promiscuous mode [ 84.552981][ T3657] device veth0_vlan entered promiscuous mode [ 84.560296][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.570380][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.577821][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.824846][ T3678] device pim6reg1 entered promiscuous mode [ 85.015486][ T3704] syz.4.1374[3704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.015538][ T3704] syz.4.1374[3704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.038665][ T24] audit: type=1400 audit(1719775806.110:156): avc: denied { create } for pid=3705 comm="syz.1.1375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 85.293422][ T3730] device vxcan1 entered promiscuous mode [ 85.650623][ T3745] device syzkaller0 entered promiscuous mode [ 86.518391][ T3791] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 49 (only 8 groups) [ 86.755185][ T3798] device veth0_vlan left promiscuous mode [ 86.785131][ T3798] device veth0_vlan entered promiscuous mode [ 86.818284][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.827298][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.840385][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.064626][ T3824] device syzkaller0 entered promiscuous mode [ 87.172279][ T3835] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.179288][ T3835] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.301573][ T3841] device veth0_vlan left promiscuous mode [ 87.327626][ T3841] device veth0_vlan entered promiscuous mode [ 87.670700][ T3876] device veth0_vlan left promiscuous mode [ 87.691330][ T3876] device veth0_vlan entered promiscuous mode [ 87.850376][ T3890] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 87.923436][ T3900] syz.4.1456[3900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.923471][ T3900] syz.4.1456[3900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.943279][ T3899] device veth1_macvtap left promiscuous mode [ 87.965445][ T3899] device veth1_macvtap entered promiscuous mode [ 87.971733][ T3899] device macsec0 entered promiscuous mode [ 87.994190][ T3907] syz.1.1459[3907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.994250][ T3907] syz.1.1459[3907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.083686][ T3909] tap0: tun_chr_ioctl cmd 1074025677 [ 88.099903][ T3909] tap0: linktype set to 776 [ 88.692508][ T3963] device veth0_vlan left promiscuous mode [ 88.735639][ T3963] device veth0_vlan entered promiscuous mode [ 90.458993][ T24] audit: type=1400 audit(1719775811.530:157): avc: denied { create } for pid=4048 comm="syz.4.1520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 91.002223][ T4067] Â: renamed from pim6reg1 [ 91.763070][ T4117] device wg2 entered promiscuous mode [ 91.899005][ T4131] device vxcan1 entered promiscuous mode [ 91.931073][ T4132] device veth0_vlan left promiscuous mode [ 91.937383][ T4132] device veth0_vlan entered promiscuous mode [ 92.432809][ T4178] device veth1_macvtap left promiscuous mode [ 92.468011][ T4178] device veth1_macvtap entered promiscuous mode [ 92.494567][ T4178] device macsec0 entered promiscuous mode [ 94.553236][ T4270] bpf_get_probe_write_proto: 6 callbacks suppressed [ 94.553246][ T4270] syz.2.1613[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.622123][ T4270] syz.2.1613[4270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.655222][ T4280] syz.4.1616[4280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.690197][ T4280] syz.4.1616[4280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.704576][ T4279] syz.2.1613[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.718324][ T4279] syz.2.1613[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.952797][ T4300] syz.2.1625[4300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.033308][ T4300] syz.2.1625[4300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.071936][ T4302] syz.2.1625[4302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.084359][ T4302] syz.2.1625[4302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.682722][ T24] audit: type=1400 audit(1719775816.760:158): avc: denied { create } for pid=4338 comm="syz.3.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 95.733443][ T24] audit: type=1400 audit(1719775816.760:159): avc: denied { create } for pid=4338 comm="syz.3.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 95.979356][ T4363] device pim6reg1 entered promiscuous mode [ 96.184902][ T4369] device pim6reg1 entered promiscuous mode [ 97.850894][ T4499] device syzkaller0 entered promiscuous mode [ 97.867425][ T4501] device pim6reg1 entered promiscuous mode [ 100.416187][ T4618] device pim6reg1 entered promiscuous mode [ 100.741688][ T4641] bpf_get_probe_write_proto: 4 callbacks suppressed [ 100.741697][ T4641] syz.4.1765[4641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.756991][ T4641] syz.4.1765[4641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.783322][ T4641] syz.4.1765[4641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.806551][ T4641] syz.4.1765[4641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.532287][ T4701] syz.2.1790[4701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.573139][ T4701] syz.2.1790[4701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.834347][ T4706] device sit0 left promiscuous mode [ 101.865689][ T4708] device sit0 entered promiscuous mode [ 102.178111][ T4721] device sit0 left promiscuous mode [ 102.487098][ T4737] device wg2 left promiscuous mode [ 102.681746][ T4743] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 103.341159][ T4790] syz.2.1822[4790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.341222][ T4790] syz.2.1822[4790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.766536][ T4806] device vxcan1 entered promiscuous mode [ 103.814245][ T4808] device macsec0 entered promiscuous mode [ 103.831544][ T4808] device veth1_macvtap entered promiscuous mode [ 105.152890][ T4882] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 105.357275][ T4894] device syzkaller0 entered promiscuous mode [ 106.095973][ T4927] device syzkaller0 entered promiscuous mode [ 106.813256][ T4947] syz.0.1879[4947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.813314][ T4947] syz.0.1879[4947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.843750][ T4947] syz.0.1879[4947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.865184][ T4947] syz.0.1879[4947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.127697][ T4962] device wg2 entered promiscuous mode [ 107.771939][ T5019] device syzkaller0 entered promiscuous mode [ 107.812664][ T24] audit: type=1400 audit(1719775828.890:160): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 107.912547][ T24] audit: type=1400 audit(1719775828.890:161): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 108.386862][ T5051] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 108.419219][ T5047] syz.2.1918[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.419268][ T5047] syz.2.1918[5047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.760526][ T5065] : renamed from ipvlan1 [ 109.233647][ T5081] device syzkaller0 entered promiscuous mode [ 109.570058][ T5110] syz.4.1941[5110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.570126][ T5110] syz.4.1941[5110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.691575][ T5115] sock: sock_set_timeout: `syz.3.1943' (pid 5115) tries to set negative timeout [ 110.774465][ T5154] device veth1_macvtap left promiscuous mode [ 110.783973][ T5154] device veth1_macvtap entered promiscuous mode [ 110.814268][ T5154] device macsec0 entered promiscuous mode [ 110.834711][ T5156] device pim6reg1 entered promiscuous mode [ 111.519293][ T24] audit: type=1400 audit(1719775832.590:162): avc: denied { create } for pid=5188 comm="syz.2.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 111.575721][ T5196] syz.3.1974[5196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.575792][ T5196] syz.3.1974[5196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.411807][ T24] audit: type=1400 audit(1719775833.480:163): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.446589][ T5236] device pim6reg1 entered promiscuous mode [ 112.472715][ T24] audit: type=1400 audit(1719775833.480:164): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.502059][ T24] audit: type=1400 audit(1719775833.480:165): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.859432][ T5255] bpf_get_probe_write_proto: 2 callbacks suppressed [ 112.859442][ T5255] syz.4.1997[5255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.912758][ T5255] syz.4.1997[5255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.968402][ T5257] syz.1.1998[5257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.018360][ T5257] syz.1.1998[5257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.029905][ T5260] syz.4.1997[5260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.063337][ T5265] syz.1.1998[5265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.079269][ T5263] device pim6reg1 entered promiscuous mode [ 113.103265][ T5265] syz.1.1998[5265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.402424][ T5287] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 113.812229][ T5305] device veth1_macvtap left promiscuous mode [ 113.818224][ T5305] device macsec0 left promiscuous mode [ 113.909256][ T5305] device macsec0 entered promiscuous mode [ 113.944774][ T5305] device veth1_macvtap entered promiscuous mode [ 115.329695][ T5374] device pim6reg1 entered promiscuous mode [ 115.340955][ T5375] syz.2.2043[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.340998][ T5375] syz.2.2043[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.576960][ T5375] syz.2.2043[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.729935][ T5387] device vxcan1 entered promiscuous mode [ 115.996890][ T5394] device vxcan1 entered promiscuous mode [ 116.337039][ T5405] device syzkaller0 entered promiscuous mode [ 116.424333][ T5407] device vxcan1 entered promiscuous mode [ 116.698852][ T5435] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (524287) [ 118.140788][ T5503] device pim6reg1 entered promiscuous mode [ 118.334760][ T5530] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 118.600041][ T5555] bpf_get_probe_write_proto: 7 callbacks suppressed [ 118.600051][ T5555] syz.0.2120[5555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.600292][ T5545] device syzkaller0 entered promiscuous mode [ 118.608413][ T5555] syz.0.2120[5555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.670781][ T5560] device sit0 left promiscuous mode [ 119.289049][ T5585] device syzkaller0 entered promiscuous mode [ 119.467583][ T5625] device syzkaller0 entered promiscuous mode [ 119.474139][ T331] syzkaller0: tun_net_xmit 48 [ 119.479827][ T5625] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 119.492164][ T5625] syzkaller0: Linktype set failed because interface is up [ 119.520454][ T5625] syzkaller0: tun_net_xmit 1280 [ 119.526209][ T5625] syzkaller0: create flow: hash 3826500622 index 2 [ 120.332158][ T5624] syzkaller0: delete flow: hash 3826500622 index 2 [ 120.946045][ T5680] device vxcan1 entered promiscuous mode [ 121.777905][ T5720] device pim6reg1 entered promiscuous mode [ 121.935402][ T5728] syz.4.2188[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.935457][ T5728] syz.4.2188[5728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.698659][ T5758] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 122.979886][ T5769] €Â: renamed from pim6reg1 [ 123.108465][ T5784] device syzkaller0 entered promiscuous mode [ 123.538397][ T5813] syz.2.2221[5813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.538472][ T5813] syz.2.2221[5813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.306207][ T5865] device pim6reg1 entered promiscuous mode [ 126.357239][ T5957] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 126.880490][ T6014] syz.0.2304[6014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.880542][ T6014] syz.0.2304[6014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.917328][ T6014] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 127.121594][ T6034] device syzkaller0 entered promiscuous mode [ 128.704147][ T6144] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 128.903911][ T6154] device sit0 entered promiscuous mode [ 129.435719][ T6198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 129.444234][ T6198] bridge0: port 3(veth0_to_batadv) entered disabled state [ 129.452423][ T6198] device veth0_to_batadv entered promiscuous mode [ 129.461646][ T6198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 129.468652][ T6198] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 129.483794][ T6198] device veth0_to_batadv left promiscuous mode [ 129.490413][ T6198] bridge0: port 3(veth0_to_batadv) entered disabled state [ 130.139246][ T6240] syz.4.2400[6240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.139303][ T6240] syz.4.2400[6240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.188751][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 130.208712][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 130.219279][ T6240] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.226329][ T6240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.233696][ T6240] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.240567][ T6240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.248008][ T6240] device bridge0 entered promiscuous mode [ 130.417647][ T6265] device syzkaller0 entered promiscuous mode [ 131.193068][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.372947][ T6348] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.380028][ T6348] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.417103][ T6348] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.423973][ T6348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.431056][ T6348] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.437894][ T6348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.506415][ T6348] device bridge0 entered promiscuous mode [ 131.628973][ T6355] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.640600][ T6355] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.648271][ T6355] device bridge_slave_0 entered promiscuous mode [ 131.656979][ T6355] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.665950][ T6355] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.673417][ T6355] device bridge_slave_1 entered promiscuous mode [ 131.821283][ T6372] device syzkaller0 entered promiscuous mode [ 131.966075][ T6355] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.973046][ T6355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.980131][ T6355] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.986930][ T6355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.074414][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.084242][ T2738] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.180264][ T2738] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.271576][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.356795][ T2738] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.363683][ T2738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.418624][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.432381][ T2738] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.439232][ T2738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.482327][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.490202][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.501255][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.510634][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.525007][ T6385] device sit0 entered promiscuous mode [ 132.552083][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.560375][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.575547][ T6355] device veth0_vlan entered promiscuous mode [ 132.599929][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.617817][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.626189][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.635641][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.677729][ T6355] device veth1_macvtap entered promiscuous mode [ 132.726697][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.734863][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.754314][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.835445][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.864777][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.912656][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.920880][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.971129][ T471] device bridge_slave_1 left promiscuous mode [ 132.977610][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.985829][ T471] device bridge_slave_0 left promiscuous mode [ 132.991854][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.000751][ T471] device veth1_macvtap left promiscuous mode [ 133.393086][ T6429] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 133.486576][ T6435] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 133.858683][ T6468] device syzkaller0 entered promiscuous mode [ 134.171389][ T6500] syzkaller0: refused to change device tx_queue_len [ 134.284468][ T6508] device syzkaller0 entered promiscuous mode [ 135.302961][ T6566] device syzkaller0 entered promiscuous mode [ 135.317613][ T6571] syz.0.2526[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.317663][ T6571] syz.0.2526[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.361620][ T6650] syz.0.2562[6650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.392051][ T6650] syz.0.2562[6650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.405789][ T6650] syz.0.2562[6650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.417369][ T6650] syz.0.2562[6650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.608440][ T6664] device syzkaller0 entered promiscuous mode [ 137.291571][ T6711] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 137.650289][ T6733] syz.3.2596[6733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.650351][ T6733] syz.3.2596[6733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.010432][ T6763] syz.4.2609[6763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.034596][ T6763] syz.4.2609[6763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.308850][ T6778] device veth0_vlan left promiscuous mode [ 138.347370][ T6778] device veth0_vlan entered promiscuous mode [ 138.432010][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.446920][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.466542][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.544723][ T6791] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.551735][ T6791] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.586059][ T6791] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.592945][ T6791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.600041][ T6791] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.606834][ T6791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.631479][ T6791] device bridge0 entered promiscuous mode [ 139.467147][ T6830] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 9 (only 8 groups) [ 139.600756][ T6832] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 139.702739][ T6840] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 140.919454][ T6893] bpf_get_probe_write_proto: 2 callbacks suppressed [ 140.919464][ T6893] syz.2.2663[6893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.938072][ T6893] syz.2.2663[6893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.048934][ T6903] device pim6reg1 entered promiscuous mode [ 141.067626][ T6905] syz.2.2668[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.067676][ T6905] syz.2.2668[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.152589][ T6905] syz.2.2668[6905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.252371][ T6954] device veth0_vlan left promiscuous mode [ 142.269549][ T6954] device veth0_vlan entered promiscuous mode [ 142.276257][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.312496][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.330065][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.354273][ T6962] device syzkaller0 entered promiscuous mode [ 142.386109][ T6960] ªªªªªª: renamed from vlan0 [ 142.556023][ T6984] syz.0.2697[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.556080][ T6984] syz.0.2697[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.580540][ T6984] syz.0.2697[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.603216][ T6984] syz.0.2697[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.629966][ T6984] syz.0.2697[6984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.367062][ T7012] device syzkaller0 entered promiscuous mode [ 144.280470][ T7086] device syzkaller0 entered promiscuous mode [ 144.318567][ T7095] device pim6reg1 entered promiscuous mode [ 144.739879][ T7128] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0605:0000:0023 with DS=0x32 [ 146.760383][ T7236] device pim6reg1 entered promiscuous mode [ 146.839836][ T7238] device syzkaller0 entered promiscuous mode [ 146.968968][ T7244] bpf_get_probe_write_proto: 2 callbacks suppressed [ 146.968977][ T7244] syz.4.2806[7244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.975803][ T7244] syz.4.2806[7244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.053283][ T7252] syz.4.2806[7252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.194100][ T7252] syz.4.2806[7252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.877752][ T24] audit: type=1400 audit(1719775868.950:166): avc: denied { create } for pid=7274 comm="syz.0.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 148.346685][ T7303] device syzkaller0 entered promiscuous mode [ 148.932106][ T7348] device veth0_vlan left promiscuous mode [ 148.978911][ T7348] device veth0_vlan entered promiscuous mode [ 148.998309][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.006449][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 149.014095][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.120449][ T7357] syz.4.2851[7357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.120511][ T7357] syz.4.2851[7357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.377301][ T7374] syz.3.2858[7374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.425888][ T7372] device syzkaller0 entered promiscuous mode [ 149.446405][ T7374] syz.3.2858[7374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.788869][ T7431] device syzkaller0 entered promiscuous mode [ 150.913896][ T7440] syz.1.2884[7440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.913952][ T7440] syz.1.2884[7440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.968945][ T7440] device pim6reg1 entered promiscuous mode [ 151.146949][ T7449] device syzkaller0 entered promiscuous mode [ 151.533259][ T7462] €Â: renamed from pim6reg1 [ 151.957486][ T7487] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 152.798151][ T7539] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.805173][ T7539] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.626568][ T24] audit: type=1400 audit(1719775874.700:167): avc: denied { create } for pid=7565 comm="syz.1.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 154.421699][ T7595] device syzkaller0 entered promiscuous mode [ 154.517138][ T7601] bpf_get_probe_write_proto: 4 callbacks suppressed [ 154.517147][ T7601] syz.4.2944[7601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.544813][ T7601] syz.4.2944[7601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.596589][ T7610] device lo entered promiscuous mode [ 155.188066][ T7645] device syzkaller0 entered promiscuous mode [ 155.394703][ T7665] device sit0 entered promiscuous mode [ 156.348735][ T7707] device syzkaller0 entered promiscuous mode [ 156.936522][ T7735] device pim6reg1 entered promiscuous mode [ 157.947657][ T7771] device pim6reg1 entered promiscuous mode [ 158.035423][ T7786] device syzkaller0 entered promiscuous mode [ 159.442122][ T7853] device bridge_slave_1 left promiscuous mode [ 159.453487][ T7853] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.461138][ T7853] device bridge_slave_0 left promiscuous mode [ 159.468049][ T7853] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.373650][ T7899] syz.0.3058[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.373699][ T7899] syz.0.3058[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.942787][ T8009] device vlan1 entered promiscuous mode [ 163.040434][ T8021] device veth1_macvtap left promiscuous mode [ 163.050000][ T8021] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 163.086224][ T8021] device veth1_macvtap entered promiscuous mode [ 163.239199][ T8044] syz.0.3114[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.239256][ T8044] syz.0.3114[8044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.268783][ T8041] device syzkaller0 entered promiscuous mode [ 164.430889][ T8138] device pim6reg1 entered promiscuous mode [ 164.692326][ T8158] device syzkaller0 entered promiscuous mode [ 164.835487][ T8164] device syzkaller0 entered promiscuous mode [ 165.023118][ T8186] device pim6reg1 entered promiscuous mode [ 165.737063][ T8213] device syzkaller0 entered promiscuous mode [ 165.854233][ T8230] device syzkaller0 entered promiscuous mode [ 166.003509][ T8236] tap0: tun_chr_ioctl cmd 1074025677 [ 166.008694][ T8236] tap0: linktype set to 512 [ 168.752268][ T8388] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 168.783260][ T8390] device veth1_macvtap left promiscuous mode [ 168.842339][ T8390] device macsec0 left promiscuous mode [ 168.904080][ T8394] device veth1_macvtap entered promiscuous mode [ 168.912670][ T8394] device macsec0 entered promiscuous mode [ 169.378686][ T8414] device pim6reg1 entered promiscuous mode [ 169.538258][ T8418] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 169.582472][ T8423] device syzkaller0 entered promiscuous mode [ 169.723855][ T8427] device syzkaller0 entered promiscuous mode [ 170.675123][ T8475] device pim6reg1 entered promiscuous mode [ 171.428648][ T8511] device syzkaller0 entered promiscuous mode [ 172.743481][ T8610] device sit0 entered promiscuous mode [ 173.929984][ T8651] device syzkaller0 entered promiscuous mode [ 173.939217][ T8650] device veth1_macvtap left promiscuous mode [ 174.102317][ T8664] syz.1.3352[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.102370][ T8664] syz.1.3352[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.138594][ T8672] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0605:0000:0023 with DS=0x32 [ 174.170092][ T8664] syz.1.3352[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.170139][ T8664] syz.1.3352[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.208282][ T8678] device pim6reg1 entered promiscuous mode [ 175.640383][ T8786] device sit0 left promiscuous mode [ 175.675549][ T8786] device sit0 entered promiscuous mode [ 176.323452][ T8807] device pim6reg1 entered promiscuous mode [ 176.590719][ T8837] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 176.965617][ T8872] syz.3.3439[8872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.002766][ T8872] syz.3.3439[8872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.019958][ T8873] syz.3.3439[8873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.045363][ T8873] syz.3.3439[8873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.357800][ T8890] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 4120868965 [ 179.673908][ T8996] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 181.496734][ T9090] device syzkaller0 entered promiscuous mode [ 181.730504][ T9107] device pim6reg1 entered promiscuous mode [ 181.993511][ T9132] device syzkaller0 entered promiscuous mode [ 183.290908][ T9206] device pim6reg1 entered promiscuous mode [ 183.479458][ T9223] device syzkaller0 entered promiscuous mode [ 184.537185][ T9267] device syzkaller0 entered promiscuous mode [ 186.189942][ T9445] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 186.275632][ T9452] device syzkaller0 entered promiscuous mode [ 186.355729][ T9458] syz.0.3665[9458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.355782][ T9458] syz.0.3665[9458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.503158][ T9467] device pim6reg1 entered promiscuous mode [ 186.566533][ T9477] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 186.604991][ T9476] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 187.020439][ T9513] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.027689][ T9513] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.035431][ T9513] device bridge_slave_0 entered promiscuous mode [ 187.053940][ T9513] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.060825][ T9513] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.068123][ T9513] device bridge_slave_1 entered promiscuous mode [ 187.132049][ T9513] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.138988][ T9513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.146160][ T9513] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.153009][ T9513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.190505][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.198283][ T2733] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.208294][ T2733] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.231485][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.239891][ T2733] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.246773][ T2733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.254743][ T2733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.262813][ T2733] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.269674][ T2733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.295355][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.305515][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.331409][ T9513] device veth0_vlan entered promiscuous mode [ 187.350185][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.363892][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.380707][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.402293][ T959] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.429732][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.479596][ T9513] device veth1_macvtap entered promiscuous mode [ 187.491067][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.508852][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.644011][ T471] device bridge_slave_1 left promiscuous mode [ 187.679866][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.719960][ T471] device bridge_slave_0 left promiscuous mode [ 187.734801][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.751779][ T471] device veth1_macvtap left promiscuous mode [ 187.764407][ T471] device veth0_vlan left promiscuous mode [ 189.300204][ T9620] syz.1.3725[9620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.301797][ T9620] syz.1.3725[9620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.421013][ T9632] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 190.460742][ T9670] device syzkaller0 entered promiscuous mode [ 192.112602][ T9743] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 192.678077][ T9756] device syzkaller0 entered promiscuous mode [ 192.915377][ T9760] device veth1_macvtap left promiscuous mode [ 192.999992][ T9760] device macsec0 left promiscuous mode [ 193.148539][ T9771] device acsec0 entered promiscuous mode [ 194.454810][ T9838] device syzkaller0 entered promiscuous mode [ 194.612438][ T9846] device pim6reg1 entered promiscuous mode [ 196.379987][ T9932] syz.2.3844[9932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.380040][ T9932] syz.2.3844[9932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.408658][ T9936] syz.1.3846[9936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.430284][ T9939] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 196.492413][ T9936] syz.1.3846[9936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.492937][ T9942] syz.1.3846[9942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.542114][ T9942] syz.1.3846[9942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.820644][ T9956] syz.0.3854[9956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.842674][ T9956] syz.0.3854[9956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.998798][ T9956] syz.0.3854[9956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.026214][ T9956] syz.0.3854[9956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.153434][ T9976] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 197.521439][ T9989] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.529869][ T9989] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.544939][ T9989] device bridge_slave_0 entered promiscuous mode [ 197.591552][ T9989] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.605028][ T9989] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.618629][ T9989] device bridge_slave_1 entered promiscuous mode [ 222.318468][T10066] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.325527][T10066] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.333318][T10066] device bridge_slave_0 entered promiscuous mode [ 222.340121][T10066] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.346989][T10066] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.354290][T10066] device bridge_slave_1 entered promiscuous mode [ 222.437727][T10053] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.444688][T10053] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.451882][T10053] device bridge_slave_0 entered promiscuous mode [ 222.483160][T10067] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.490014][T10067] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.497912][T10067] device bridge_slave_0 entered promiscuous mode [ 222.504725][T10053] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.511574][T10053] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.519340][T10053] device bridge_slave_1 entered promiscuous mode [ 222.533896][T10067] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.540748][T10067] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.548609][T10067] device bridge_slave_1 entered promiscuous mode [ 228.661566][T10052] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.668435][T10052] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.675868][T10052] device bridge_slave_0 entered promiscuous mode [ 228.684947][T10052] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.691881][T10052] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.699145][T10052] device bridge_slave_1 entered promiscuous mode [ 228.821105][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.828363][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.836009][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.844403][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.852358][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.859174][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.866549][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.874654][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.882603][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.889422][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.902405][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.945981][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.954625][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.983038][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.990842][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.998758][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.006689][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.014046][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.022152][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.030025][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.036802][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.044055][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.052158][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.060023][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.066809][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.074082][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.105959][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.115210][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.122902][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.130904][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.138903][ T496] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.145744][ T496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.153231][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.161269][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.169232][ T496] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.176065][ T496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.183400][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.191183][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.198921][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.206793][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.214650][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.221798][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.229405][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.243320][ T9989] device veth0_vlan entered promiscuous mode [ 229.252870][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.260960][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.269801][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.277524][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.285308][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.293433][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.301325][ T496] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.308086][ T496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.315210][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.323307][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.331201][ T496] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.337995][ T496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.345212][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.352932][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.360113][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.382801][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.390539][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.399607][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.408397][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.416564][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.424181][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.443725][T10066] device veth0_vlan entered promiscuous mode [ 229.452336][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.459569][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.467341][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.475233][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.486860][ T9989] device veth1_macvtap entered promiscuous mode [ 229.494644][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.502654][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.510516][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.518930][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.526463][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.543059][T10066] device veth1_macvtap entered promiscuous mode [ 229.563250][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.571498][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.580347][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.588318][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.595151][ T318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.602681][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.610699][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.618672][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.625507][ T318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.632886][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.640571][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.648558][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.668376][T10067] device veth0_vlan entered promiscuous mode [ 229.676478][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.684676][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.691820][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.699420][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.707697][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.715698][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.723794][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.731745][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.739978][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.748040][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.756331][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.772713][ T9] device bridge_slave_1 left promiscuous mode [ 229.778721][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.786693][ T9] device bridge_slave_0 left promiscuous mode [ 229.793135][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.884850][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.892931][ T496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.905620][T10052] device veth0_vlan entered promiscuous mode [ 229.917819][T10053] device veth0_vlan entered promiscuous mode [ 229.924765][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.936464][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.945593][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.953920][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.961621][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.969423][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.977582][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.985004][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.992402][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.999575][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.021072][T10067] device veth1_macvtap entered promiscuous mode [ 230.039802][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.048977][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.058470][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.066148][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.074195][ T318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.089181][T10107] syz.1.3893[10107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.089228][T10107] syz.1.3893[10107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.102213][T10053] device veth1_macvtap entered promiscuous mode [ 230.124510][T10052] device veth1_macvtap entered promiscuous mode [ 230.131186][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.138670][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.147653][T10109] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 230.159847][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.168002][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.176128][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.184278][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.192554][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.200449][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.243063][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.251217][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.259656][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.273543][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.281831][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.291838][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.301584][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.309916][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.335269][T10118] €Â: renamed from veth0_vlan [ 230.993446][ T9] device bridge_slave_1 left promiscuous mode [ 230.999423][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.011160][ T9] device bridge_slave_0 left promiscuous mode [ 231.017174][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.026210][ T9] device bridge_slave_1 left promiscuous mode [ 231.032594][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.039805][ T9] device bridge_slave_0 left promiscuous mode [ 231.046245][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.057268][ T9] device bridge_slave_1 left promiscuous mode [ 231.063337][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.070833][ T9] device bridge_slave_0 left promiscuous mode [ 231.077144][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.093939][ T9] device veth1_macvtap left promiscuous mode [ 231.100498][ T9] device veth0_vlan left promiscuous mode [ 231.133627][T10196] syz.4.3927[10196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.133681][T10196] syz.4.3927[10196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.805465][T10210] syzkaller0: refused to change device tx_queue_len [ 232.140108][T10241] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 232.364639][T10247] device vxcan1 entered promiscuous mode [ 232.703681][T10262] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 232.861035][T10267] syz.1.3949[10267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.861089][T10267] syz.1.3949[10267] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.027469][T10277] syz.1.3949[10277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.279611][T10277] syz.1.3949[10277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.292463][T10287] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 234.519528][T10349] device syzkaller0 entered promiscuous mode [ 235.131006][T10376] device syzkaller0 entered promiscuous mode [ 237.173368][T10524] Q±6ã×\b‹¡Y­4: renamed from lo [ 237.237517][T10532] device dummy0 entered promiscuous mode [ 237.851038][T10577] device syzkaller0 entered promiscuous mode [ 237.903559][T10581] device macsec0 entered promiscuous mode [ 238.337885][T10607] syz.1.4090[10607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.338021][T10607] syz.1.4090[10607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.420703][T10613] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 238.800388][T10651] syz.3.4108[10651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.800436][T10651] syz.3.4108[10651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.248752][T10649] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.266877][T10649] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.274181][T10649] device bridge_slave_0 entered promiscuous mode [ 239.290122][T10649] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.327592][T10649] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.365169][T10649] device bridge_slave_1 entered promiscuous mode [ 239.588636][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.601557][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.644567][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.656166][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.690433][ T2737] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.697408][ T2737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.727878][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.771584][ T2737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.796052][ T2737] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.803068][ T2737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.823260][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.838518][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.858390][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.891441][T10649] device veth0_vlan entered promiscuous mode [ 239.906528][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.915774][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.924207][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.931729][ T652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.947391][ T2734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.957072][T10649] device veth1_macvtap entered promiscuous mode [ 239.970359][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.984113][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.167149][ T24] audit: type=1400 audit(1719775961.240:168): avc: denied { attach_queue } for pid=10699 comm="syz.4.4123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 240.423327][T10722] syz.0.4135[10722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.423383][T10722] syz.0.4135[10722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.488626][ T749] device bridge_slave_1 left promiscuous mode [ 240.506636][ T749] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.514228][ T749] device bridge_slave_0 left promiscuous mode [ 240.520249][ T749] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.542720][ T749] device veth1_macvtap left promiscuous mode [ 240.702384][T10731] device veth1_macvtap left promiscuous mode [ 240.715937][T10744] device sit0 entered promiscuous mode [ 240.838129][T10763] bridge0: port 3(veth0_to_batadv) entered blocking state [ 240.848791][T10763] bridge0: port 3(veth0_to_batadv) entered disabled state [ 240.856289][T10763] device veth0_to_batadv entered promiscuous mode [ 240.864381][T10763] bridge0: port 3(veth0_to_batadv) entered blocking state [ 240.871334][T10763] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 240.889602][T10763] device veth0_to_batadv left promiscuous mode [ 240.895802][T10763] bridge0: port 3(veth0_to_batadv) entered disabled state [ 241.049750][T10780] device syzkaller0 entered promiscuous mode [ 241.656665][T10797] bridge0: port 3(veth0_to_batadv) entered blocking state [ 241.700908][T10797] bridge0: port 3(veth0_to_batadv) entered disabled state [ 241.708637][T10797] device veth0_to_batadv entered promiscuous mode [ 241.716806][T10797] bridge0: port 3(veth0_to_batadv) entered blocking state [ 241.723962][T10797] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 241.770517][T10799] device veth0_to_batadv left promiscuous mode [ 241.818267][T10799] bridge0: port 3(veth0_to_batadv) entered disabled state [ 242.037502][T10819] syz.1.4172[10819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.037558][T10819] syz.1.4172[10819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.062972][T10805] syz.4.4168[10805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.074500][T10805] syz.4.4168[10805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.199610][T10819] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.217826][T10819] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.659411][T10854] device pim6reg1 entered promiscuous mode [ 242.705866][T10858] device veth1_macvtap left promiscuous mode [ 242.713365][T10858] device macsec0 entered promiscuous mode [ 242.869520][T10867] device veth1_macvtap entered promiscuous mode [ 243.225553][T10877] device syzkaller0 entered promiscuous mode [ 243.606246][T10915] device veth1_macvtap left promiscuous mode [ 243.766753][T10919] device veth1_macvtap entered promiscuous mode [ 244.543400][T10967] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 244.713767][T10980] device pim6reg1 entered promiscuous mode [ 244.994138][T11014] device pim6reg1 entered promiscuous mode [ 245.533388][T11060] device veth1_macvtap left promiscuous mode [ 245.572060][T11060] device macsec0 entered promiscuous mode [ 245.962825][T11060] device veth1_macvtap entered promiscuous mode [ 246.232670][T11089] bpf_get_probe_write_proto: 2 callbacks suppressed [ 246.232678][T11089] syz.0.4263[11089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.239184][T11089] syz.0.4263[11089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.255845][T11089] syz.0.4263[11089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.270671][T11089] syz.0.4263[11089] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.462933][T11104] device syzkaller0 entered promiscuous mode [ 246.776028][T11122] device veth1_macvtap left promiscuous mode [ 246.784695][T11122] device macsec0 entered promiscuous mode [ 247.030820][T11126] device veth1_macvtap entered promiscuous mode [ 247.450455][T11172] žÞô1„: renamed from pim6reg1 [ 247.465754][T11186] FAULT_INJECTION: forcing a failure. [ 247.465754][T11186] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 247.577412][T11192] device pim6reg1 entered promiscuous mode [ 247.632146][T11186] CPU: 1 PID: 11186 Comm: syz.2.4291 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 247.643326][T11186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 247.653229][T11186] Call Trace: [ 247.656360][T11186] dump_stack_lvl+0x1e2/0x24b [ 247.660866][T11186] ? bfq_pos_tree_add_move+0x43b/0x43b [ 247.666160][T11186] dump_stack+0x15/0x17 [ 247.670147][T11186] should_fail+0x3c6/0x510 [ 247.674407][T11186] should_fail_alloc_page+0x52/0x60 [ 247.679443][T11186] __alloc_pages_nodemask+0x1b3/0xaf0 [ 247.684654][T11186] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 247.690024][T11186] ? page_cache_prev_miss+0x410/0x410 [ 247.695241][T11186] ? can_reuse_spf_vma+0xe0/0xe0 [ 247.700010][T11186] ? __kasan_check_write+0x14/0x20 [ 247.704953][T11186] ? __brelse+0x5b/0x90 [ 247.708949][T11186] pagecache_get_page+0x669/0x950 [ 247.713813][T11186] grab_cache_page_write_begin+0x5d/0xa0 [ 247.719276][T11186] ext4_da_write_begin+0x587/0xf60 [ 247.724223][T11186] ? vmacache_update+0xb7/0x120 [ 247.728912][T11186] ? exc_page_fault+0x33d/0x5b0 [ 247.733600][T11186] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 247.738719][T11186] ? asm_exc_page_fault+0x1e/0x30 [ 247.743582][T11186] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 247.749309][T11186] ? __get_user_nocheck_1+0x6/0x10 [ 247.754256][T11186] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 247.759990][T11186] ? uuid_parse+0x470/0x470 [ 247.764333][T11186] ? current_time+0x1af/0x2f0 [ 247.768834][T11186] generic_perform_write+0x2cd/0x570 [ 247.773959][T11186] ? file_remove_privs+0x570/0x570 [ 247.778914][T11186] ? grab_cache_page_write_begin+0xa0/0xa0 [ 247.784537][T11186] ? down_write+0xd7/0x150 [ 247.788790][T11186] ? down_read_killable+0x220/0x220 [ 247.793828][T11186] ? do_sys_openat2+0x5e1/0x6f0 [ 247.798515][T11186] ? generic_write_checks+0x3b9/0x470 [ 247.803728][T11186] ext4_buffered_write_iter+0x482/0x610 [ 247.809104][T11186] ext4_file_write_iter+0x193/0x1c80 [ 247.814225][T11186] ? kstrtol_from_user+0x310/0x310 [ 247.819173][T11186] ? memset+0x35/0x40 [ 247.822989][T11186] ? avc_policy_seqno+0x1b/0x70 [ 247.827677][T11186] ? selinux_file_permission+0x2bb/0x560 [ 247.833145][T11186] ? fsnotify_perm+0x67/0x4e0 [ 247.837658][T11186] ? ext4_file_read_iter+0x4d0/0x4d0 [ 247.842780][T11186] ? security_file_permission+0x86/0xb0 [ 247.848160][T11186] ? iov_iter_init+0x3f/0x120 [ 247.852674][T11186] vfs_write+0xb55/0xe70 [ 247.856757][T11186] ? kernel_write+0x3d0/0x3d0 [ 247.861267][T11186] ? mutex_trylock+0xa0/0xa0 [ 247.865695][T11186] ? __fdget_pos+0x2e7/0x3a0 [ 247.870116][T11186] ? ksys_write+0x77/0x2c0 [ 247.874623][T11186] ksys_write+0x199/0x2c0 [ 247.878767][T11186] ? __ia32_sys_read+0x90/0x90 [ 247.883366][T11186] ? debug_smp_processor_id+0x17/0x20 [ 247.888568][T11186] __x64_sys_write+0x7b/0x90 [ 247.892997][T11186] do_syscall_64+0x34/0x70 [ 247.897251][T11186] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 247.902974][T11186] RIP: 0033:0x7f00c653eb99 [ 247.907228][T11186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.926669][T11186] RSP: 002b:00007f00c57c0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 247.934912][T11186] RAX: ffffffffffffffda RBX: 00007f00c66ccfa0 RCX: 00007f00c653eb99 [ 247.942723][T11186] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 247.950536][T11186] RBP: 00007f00c57c00a0 R08: 0000000000000000 R09: 0000000000000000 [ 247.958343][T11186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.966157][T11186] R13: 000000000000000b R14: 00007f00c66ccfa0 R15: 00007ffc90f06778 [ 248.235060][T11217] device syzkaller0 entered promiscuous mode [ 248.487718][T11237] FAULT_INJECTION: forcing a failure. [ 248.487718][T11237] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 248.513457][T11237] CPU: 0 PID: 11237 Comm: syz.0.4313 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 248.524639][T11237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 248.534527][T11237] Call Trace: [ 248.537666][T11237] dump_stack_lvl+0x1e2/0x24b [ 248.542174][T11237] ? bfq_pos_tree_add_move+0x43b/0x43b [ 248.547466][T11237] ? ___cache_free+0x110/0x130 [ 248.552067][T11237] dump_stack+0x15/0x17 [ 248.556071][T11237] should_fail+0x3c6/0x510 [ 248.560322][T11237] should_fail_alloc_page+0x52/0x60 [ 248.565344][T11237] __alloc_pages_nodemask+0x1b3/0xaf0 [ 248.570552][T11237] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 248.575932][T11237] ? page_cache_prev_miss+0x410/0x410 [ 248.581143][T11237] ? can_reuse_spf_vma+0xe0/0xe0 [ 248.585914][T11237] pagecache_get_page+0x669/0x950 [ 248.590775][T11237] grab_cache_page_write_begin+0x5d/0xa0 [ 248.596239][T11237] ext4_da_write_begin+0x587/0xf60 [ 248.601184][T11237] ? vmacache_update+0xb7/0x120 [ 248.605886][T11237] ? exc_page_fault+0x33d/0x5b0 [ 248.610562][T11237] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 248.615698][T11237] ? asm_exc_page_fault+0x1e/0x30 [ 248.620547][T11237] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 248.626271][T11237] ? __get_user_nocheck_1+0x6/0x10 [ 248.631231][T11237] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 248.637123][T11237] ? uuid_parse+0x470/0x470 [ 248.641455][T11237] ? ext4_dirty_inode+0xe0/0x120 [ 248.646228][T11237] ? __ext4_expand_extra_isize+0x3f0/0x3f0 [ 248.651876][T11237] ? __mark_inode_dirty+0x15a/0x9d0 [ 248.656915][T11237] generic_perform_write+0x2cd/0x570 [ 248.662037][T11237] ? __mnt_drop_write_file+0x84/0xa0 [ 248.667154][T11237] ? file_remove_privs+0x570/0x570 [ 248.672098][T11237] ? grab_cache_page_write_begin+0xa0/0xa0 [ 248.677736][T11237] ? down_write+0xd7/0x150 [ 248.681988][T11237] ? down_read_killable+0x220/0x220 [ 248.687020][T11237] ? do_sys_openat2+0x5e1/0x6f0 [ 248.691711][T11237] ? generic_write_checks+0x3b9/0x470 [ 248.696922][T11237] ext4_buffered_write_iter+0x482/0x610 [ 248.702304][T11237] ext4_file_write_iter+0x193/0x1c80 [ 248.707419][T11237] ? kstrtol_from_user+0x310/0x310 [ 248.712370][T11237] ? memset+0x35/0x40 [ 248.716206][T11237] ? avc_policy_seqno+0x1b/0x70 [ 248.720872][T11237] ? selinux_file_permission+0x2bb/0x560 [ 248.726342][T11237] ? fsnotify_perm+0x67/0x4e0 [ 248.730853][T11237] ? ext4_file_read_iter+0x4d0/0x4d0 [ 248.735976][T11237] ? security_file_permission+0x86/0xb0 [ 248.741355][T11237] ? iov_iter_init+0x3f/0x120 [ 248.745958][T11237] vfs_write+0xb55/0xe70 [ 248.750038][T11237] ? kernel_write+0x3d0/0x3d0 [ 248.754550][T11237] ? mutex_trylock+0xa0/0xa0 [ 248.758975][T11237] ? __fdget_pos+0x2e7/0x3a0 [ 248.763400][T11237] ? ksys_write+0x77/0x2c0 [ 248.767669][T11237] ksys_write+0x199/0x2c0 [ 248.771819][T11237] ? __ia32_sys_read+0x90/0x90 [ 248.776421][T11237] ? debug_smp_processor_id+0x17/0x20 [ 248.781629][T11237] __x64_sys_write+0x7b/0x90 [ 248.786052][T11237] do_syscall_64+0x34/0x70 [ 248.790310][T11237] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 248.796035][T11237] RIP: 0033:0x7fc74c266b99 [ 248.800289][T11237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.819734][T11237] RSP: 002b:00007fc74b4e8048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 248.827975][T11237] RAX: ffffffffffffffda RBX: 00007fc74c3f4fa0 RCX: 00007fc74c266b99 [ 248.835796][T11237] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 248.843726][T11237] RBP: 00007fc74b4e80a0 R08: 0000000000000000 R09: 0000000000000000 [ 248.851533][T11237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.859343][T11237] R13: 000000000000000b R14: 00007fc74c3f4fa0 R15: 00007ffc297c53d8 [ 248.944801][T11248] tap0: tun_chr_ioctl cmd 1074025677 [ 248.953983][T11248] tap0: linktype set to 774 [ 248.989860][T11242] device pim6reg1 entered promiscuous mode [ 249.005235][T11244] device wg2 entered promiscuous mode [ 249.098523][T11262] device pim6reg1 entered promiscuous mode [ 249.157322][T11267] FAULT_INJECTION: forcing a failure. [ 249.157322][T11267] name failslab, interval 1, probability 0, space 0, times 1 [ 249.196321][T11267] CPU: 0 PID: 11267 Comm: syz.4.4325 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 249.207519][T11267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 249.217406][T11267] Call Trace: [ 249.220559][T11267] dump_stack_lvl+0x1e2/0x24b [ 249.225044][T11267] ? panic+0x812/0x812 [ 249.228954][T11267] ? bfq_pos_tree_add_move+0x43b/0x43b [ 249.234250][T11267] ? __alloc_pages_nodemask+0x435/0xaf0 [ 249.239625][T11267] ? workingset_activation+0x250/0x250 [ 249.245010][T11267] dump_stack+0x15/0x17 [ 249.248999][T11267] should_fail+0x3c6/0x510 [ 249.253259][T11267] ? jbd2__journal_start+0x150/0x710 [ 249.258375][T11267] __should_failslab+0xa4/0xe0 [ 249.262975][T11267] should_failslab+0x9/0x20 [ 249.267313][T11267] kmem_cache_alloc+0x3d/0x2e0 [ 249.271933][T11267] jbd2__journal_start+0x150/0x710 [ 249.276863][T11267] __ext4_journal_start_sb+0x249/0x4a0 [ 249.282170][T11267] ext4_da_write_begin+0x708/0xf60 [ 249.287117][T11267] ? vmacache_update+0xb7/0x120 [ 249.291795][T11267] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 249.296914][T11267] ? asm_exc_page_fault+0x1e/0x30 [ 249.301775][T11267] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 249.307507][T11267] ? __get_user_nocheck_1+0x6/0x10 [ 249.312457][T11267] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 249.318179][T11267] ? uuid_parse+0x470/0x470 [ 249.322513][T11267] ? ext4_dirty_inode+0xe0/0x120 [ 249.327287][T11267] ? __ext4_expand_extra_isize+0x3f0/0x3f0 [ 249.332930][T11267] ? __mark_inode_dirty+0x15a/0x9d0 [ 249.337965][T11267] generic_perform_write+0x2cd/0x570 [ 249.343084][T11267] ? __mnt_drop_write_file+0x84/0xa0 [ 249.348204][T11267] ? file_remove_privs+0x570/0x570 [ 249.353156][T11267] ? grab_cache_page_write_begin+0xa0/0xa0 [ 249.358790][T11267] ? down_write+0xd7/0x150 [ 249.363044][T11267] ? down_read_killable+0x220/0x220 [ 249.368079][T11267] ? do_sys_openat2+0x5e1/0x6f0 [ 249.372768][T11267] ? generic_write_checks+0x3b9/0x470 [ 249.377977][T11267] ext4_buffered_write_iter+0x482/0x610 [ 249.383446][T11267] ext4_file_write_iter+0x193/0x1c80 [ 249.388566][T11267] ? kstrtol_from_user+0x310/0x310 [ 249.393559][T11267] ? memset+0x35/0x40 [ 249.397328][T11267] ? avc_policy_seqno+0x1b/0x70 [ 249.402020][T11267] ? selinux_file_permission+0x2bb/0x560 [ 249.407485][T11267] ? fsnotify_perm+0x67/0x4e0 [ 249.411998][T11267] ? ext4_file_read_iter+0x4d0/0x4d0 [ 249.417121][T11267] ? security_file_permission+0x86/0xb0 [ 249.422498][T11267] ? iov_iter_init+0x3f/0x120 [ 249.427011][T11267] vfs_write+0xb55/0xe70 [ 249.431092][T11267] ? kernel_write+0x3d0/0x3d0 [ 249.435607][T11267] ? mutex_trylock+0xa0/0xa0 [ 249.440035][T11267] ? __fdget_pos+0x2e7/0x3a0 [ 249.444455][T11267] ? ksys_write+0x77/0x2c0 [ 249.448708][T11267] ksys_write+0x199/0x2c0 [ 249.452880][T11267] ? __ia32_sys_read+0x90/0x90 [ 249.457477][T11267] ? debug_smp_processor_id+0x17/0x20 [ 249.462681][T11267] __x64_sys_write+0x7b/0x90 [ 249.467111][T11267] do_syscall_64+0x34/0x70 [ 249.471365][T11267] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 249.477090][T11267] RIP: 0033:0x7f9e755c9b99 [ 249.481342][T11267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.500781][T11267] RSP: 002b:00007f9e7484b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 249.509027][T11267] RAX: ffffffffffffffda RBX: 00007f9e75757fa0 RCX: 00007f9e755c9b99 [ 249.516835][T11267] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 249.524651][T11267] RBP: 00007f9e7484b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 249.532460][T11267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.540272][T11267] R13: 000000000000000b R14: 00007f9e75757fa0 R15: 00007ffde8b01e48 [ 249.559528][T11271] device pim6reg1 entered promiscuous mode [ 250.502318][T11316] Â: renamed from pim6reg1 [ 251.689672][T11373] device veth1_macvtap left promiscuous mode [ 251.863105][T11379] bridge0: port 3(vlan1) entered blocking state [ 251.873238][T11379] bridge0: port 3(vlan1) entered disabled state [ 251.900394][T11379] device vlan1 entered promiscuous mode [ 252.247036][T11390] FAULT_INJECTION: forcing a failure. [ 252.247036][T11390] name failslab, interval 1, probability 0, space 0, times 0 [ 252.319571][T11390] CPU: 1 PID: 11390 Comm: syz.0.4371 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 252.330762][T11390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 252.340640][T11390] Call Trace: [ 252.343779][T11390] dump_stack_lvl+0x1e2/0x24b [ 252.348292][T11390] ? panic+0x812/0x812 [ 252.352190][T11390] ? bfq_pos_tree_add_move+0x43b/0x43b [ 252.357486][T11390] ? __kasan_check_write+0x14/0x20 [ 252.362455][T11390] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 252.367898][T11390] dump_stack+0x15/0x17 [ 252.371888][T11390] should_fail+0x3c6/0x510 [ 252.376141][T11390] ? __alloc_skb+0x80/0x510 [ 252.380487][T11390] __should_failslab+0xa4/0xe0 [ 252.385081][T11390] should_failslab+0x9/0x20 [ 252.389421][T11390] kmem_cache_alloc+0x3d/0x2e0 [ 252.394021][T11390] __alloc_skb+0x80/0x510 [ 252.398186][T11390] ? if_nlmsg_size+0x59c/0x5f0 [ 252.402785][T11390] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 252.407902][T11390] rtnetlink_event+0xf3/0x1b0 [ 252.412418][T11390] raw_notifier_call_chain+0x8c/0xf0 [ 252.417537][T11390] dev_set_mac_address+0x325/0x470 [ 252.422486][T11390] ? dev_pre_changeaddr_notify+0x220/0x220 [ 252.428126][T11390] dev_set_mac_address_user+0x31/0x50 [ 252.433333][T11390] dev_ifsioc+0x657/0xae0 [ 252.437511][T11390] ? dev_ioctl+0xb40/0xb40 [ 252.441769][T11390] ? dev_get_by_name_rcu+0xc5/0xf0 [ 252.446700][T11390] dev_ioctl+0x526/0xb40 [ 252.450791][T11390] sock_do_ioctl+0x295/0x3a0 [ 252.455209][T11390] ? sock_show_fdinfo+0xa0/0xa0 [ 252.459894][T11390] ? kernel_write+0x3d0/0x3d0 [ 252.464411][T11390] ? selinux_file_ioctl+0x3cc/0x540 [ 252.469438][T11390] sock_ioctl+0x4a6/0x760 [ 252.473610][T11390] ? sock_poll+0x340/0x340 [ 252.477862][T11390] ? security_file_ioctl+0x84/0xb0 [ 252.482808][T11390] ? sock_poll+0x340/0x340 [ 252.487054][T11390] __se_sys_ioctl+0x114/0x190 [ 252.491573][T11390] __x64_sys_ioctl+0x7b/0x90 [ 252.496019][T11390] do_syscall_64+0x34/0x70 [ 252.500250][T11390] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 252.505977][T11390] RIP: 0033:0x7fc74c266b99 [ 252.510251][T11390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.529674][T11390] RSP: 002b:00007fc74b4e8048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.537916][T11390] RAX: ffffffffffffffda RBX: 00007fc74c3f4fa0 RCX: 00007fc74c266b99 [ 252.545743][T11390] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 000000000000000f [ 252.553540][T11390] RBP: 00007fc74b4e80a0 R08: 0000000000000000 R09: 0000000000000000 [ 252.561347][T11390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.569159][T11390] R13: 000000000000000b R14: 00007fc74c3f4fa0 R15: 00007ffc297c53d8 [ 253.056704][T11413] device veth1_macvtap left promiscuous mode [ 253.220814][T11404] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.289690][T11404] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.297085][T11404] device bridge_slave_0 entered promiscuous mode [ 253.304069][T11404] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.310907][T11404] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.318331][T11404] device bridge_slave_1 entered promiscuous mode [ 253.511839][T11404] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.518736][T11404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.525839][T11404] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.532603][T11404] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.566116][ T310] device bridge_slave_1 left promiscuous mode [ 253.579265][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.626995][ T310] device bridge_slave_0 left promiscuous mode [ 253.652104][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.680391][ T310] device veth0_vlan left promiscuous mode [ 253.894826][ T6897] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.904948][ T6897] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.961879][T11447] device syzkaller0 entered promiscuous mode [ 254.102424][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.120108][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.153921][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.179832][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.212955][ T6896] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.219845][ T6896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.288794][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.297435][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.305750][ T6897] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.312610][ T6897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.320877][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.329459][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.337486][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.345661][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.385091][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.402219][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.415593][T11404] device veth0_vlan entered promiscuous mode [ 254.422143][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.429810][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.465304][T11404] device veth1_macvtap entered promiscuous mode [ 254.484457][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.492324][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.499561][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.522466][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.535116][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.622948][T11460] ªªªªªª: renamed from vlan0 [ 254.628598][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.637016][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.645355][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.654223][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.540946][T11500] device veth1_macvtap left promiscuous mode [ 255.551176][T11500] device macsec0 entered promiscuous mode [ 255.644607][T11502] €Â: renamed from pim6reg1 [ 255.729143][T11514] device veth1_macvtap entered promiscuous mode [ 255.792364][T11502] €Â0: renamed from pim6reg1 [ 255.952573][T11527] syz.0.4419[11527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.952641][T11527] syz.0.4419[11527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.166163][T11535] FAULT_INJECTION: forcing a failure. [ 256.166163][T11535] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 256.190618][T11535] CPU: 0 PID: 11535 Comm: syz.3.4421 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 256.201739][T11535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 256.211625][T11535] Call Trace: [ 256.214759][T11535] dump_stack_lvl+0x1e2/0x24b [ 256.219268][T11535] ? bfq_pos_tree_add_move+0x43b/0x43b [ 256.224560][T11535] dump_stack+0x15/0x17 [ 256.228546][T11535] should_fail+0x3c6/0x510 [ 256.232806][T11535] should_fail_usercopy+0x1a/0x20 [ 256.237666][T11535] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 256.243572][T11535] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 256.249317][T11535] ? memzero_page+0x100/0x100 [ 256.253807][T11535] ? uuid_parse+0x470/0x470 [ 256.258326][T11535] generic_perform_write+0x34c/0x570 [ 256.263445][T11535] ? grab_cache_page_write_begin+0xa0/0xa0 [ 256.269079][T11535] ? down_write+0xd7/0x150 [ 256.273325][T11535] ? down_read_killable+0x220/0x220 [ 256.278353][T11535] ? do_sys_openat2+0x5e1/0x6f0 [ 256.283043][T11535] ? generic_write_checks+0x3b9/0x470 [ 256.288250][T11535] ext4_buffered_write_iter+0x482/0x610 [ 256.293634][T11535] ext4_file_write_iter+0x193/0x1c80 [ 256.298748][T11535] ? kstrtol_from_user+0x310/0x310 [ 256.303701][T11535] ? memset+0x35/0x40 [ 256.307517][T11535] ? avc_policy_seqno+0x1b/0x70 [ 256.312311][T11535] ? selinux_file_permission+0x2bb/0x560 [ 256.317773][T11535] ? fsnotify_perm+0x67/0x4e0 [ 256.322291][T11535] ? ext4_file_read_iter+0x4d0/0x4d0 [ 256.327402][T11535] ? security_file_permission+0x86/0xb0 [ 256.332783][T11535] ? iov_iter_init+0x3f/0x120 [ 256.337294][T11535] vfs_write+0xb55/0xe70 [ 256.341375][T11535] ? kernel_write+0x3d0/0x3d0 [ 256.345898][T11535] ? mutex_trylock+0xa0/0xa0 [ 256.350321][T11535] ? __fdget_pos+0x2e7/0x3a0 [ 256.354754][T11535] ? ksys_write+0x77/0x2c0 [ 256.358998][T11535] ksys_write+0x199/0x2c0 [ 256.363166][T11535] ? __ia32_sys_read+0x90/0x90 [ 256.367909][T11535] ? debug_smp_processor_id+0x17/0x20 [ 256.373100][T11535] __x64_sys_write+0x7b/0x90 [ 256.377526][T11535] do_syscall_64+0x34/0x70 [ 256.381783][T11535] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 256.387507][T11535] RIP: 0033:0x7f2b167a6b99 [ 256.391759][T11535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.411202][T11535] RSP: 002b:00007f2b15a28048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 256.419445][T11535] RAX: ffffffffffffffda RBX: 00007f2b16934fa0 RCX: 00007f2b167a6b99 [ 256.427253][T11535] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 256.435064][T11535] RBP: 00007f2b15a280a0 R08: 0000000000000000 R09: 0000000000000000 [ 256.442873][T11535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 256.450692][T11535] R13: 000000000000000b R14: 00007f2b16934fa0 R15: 00007ffd0a7fd238 [ 256.643992][T11554] device veth1_macvtap left promiscuous mode [ 256.649902][T11554] device macsec0 entered promiscuous mode [ 256.661727][T11560] device veth1_macvtap entered promiscuous mode [ 256.683841][T11562] FAULT_INJECTION: forcing a failure. [ 256.683841][T11562] name failslab, interval 1, probability 0, space 0, times 0 [ 256.696271][T11562] CPU: 1 PID: 11562 Comm: syz.3.4433 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 256.707521][T11562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 256.717500][T11562] Call Trace: [ 256.720637][T11562] dump_stack_lvl+0x1e2/0x24b [ 256.725156][T11562] ? bfq_pos_tree_add_move+0x43b/0x43b [ 256.730444][T11562] dump_stack+0x15/0x17 [ 256.734460][T11562] should_fail+0x3c6/0x510 [ 256.738698][T11562] ? fdb_create+0x37/0xcf0 [ 256.742937][T11562] __should_failslab+0xa4/0xe0 [ 256.747538][T11562] should_failslab+0x9/0x20 [ 256.751875][T11562] kmem_cache_alloc+0x3d/0x2e0 [ 256.756478][T11562] fdb_create+0x37/0xcf0 [ 256.760552][T11562] ? br_fdb_find_rcu+0x30/0x30 [ 256.765157][T11562] fdb_insert+0x142/0x270 [ 256.769319][T11562] br_fdb_changeaddr+0x18f/0x1c0 [ 256.774097][T11562] br_device_event+0x3c6/0x7c0 [ 256.778705][T11562] ? br_boolopt_multi_get+0xc0/0xc0 [ 256.783729][T11562] ? packet_notifier+0x8af/0x8c0 [ 256.788503][T11562] ? ipv6_mc_netdev_event+0x91/0x2f0 [ 256.793622][T11562] raw_notifier_call_chain+0x8c/0xf0 [ 256.798773][T11562] dev_set_mac_address+0x325/0x470 [ 256.803704][T11562] ? dev_pre_changeaddr_notify+0x220/0x220 [ 256.809334][T11562] dev_set_mac_address_user+0x31/0x50 [ 256.814538][T11562] dev_ifsioc+0x657/0xae0 [ 256.818705][T11562] ? dev_ioctl+0xb40/0xb40 [ 256.822956][T11562] ? dev_get_by_name_rcu+0xc5/0xf0 [ 256.827917][T11562] dev_ioctl+0x526/0xb40 [ 256.831989][T11562] sock_do_ioctl+0x295/0x3a0 [ 256.836407][T11562] ? sock_show_fdinfo+0xa0/0xa0 [ 256.841097][T11562] ? kernel_write+0x3d0/0x3d0 [ 256.845614][T11562] ? selinux_file_ioctl+0x3cc/0x540 [ 256.850660][T11562] sock_ioctl+0x4a6/0x760 [ 256.854813][T11562] ? sock_poll+0x340/0x340 [ 256.859092][T11562] ? security_file_ioctl+0x84/0xb0 [ 256.864009][T11562] ? sock_poll+0x340/0x340 [ 256.868285][T11562] __se_sys_ioctl+0x114/0x190 [ 256.872775][T11562] __x64_sys_ioctl+0x7b/0x90 [ 256.877198][T11562] do_syscall_64+0x34/0x70 [ 256.881457][T11562] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 256.887178][T11562] RIP: 0033:0x7f2b167a6b99 [ 256.891437][T11562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.910875][T11562] RSP: 002b:00007f2b15a28048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.919125][T11562] RAX: ffffffffffffffda RBX: 00007f2b16934fa0 RCX: 00007f2b167a6b99 [ 256.926926][T11562] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 000000000000000f [ 256.934740][T11562] RBP: 00007f2b15a280a0 R08: 0000000000000000 R09: 0000000000000000 [ 256.942550][T11562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.950365][T11562] R13: 000000000000000b R14: 00007f2b16934fa0 R15: 00007ffd0a7fd238 [ 257.019278][T11571] FAULT_INJECTION: forcing a failure. [ 257.019278][T11571] name failslab, interval 1, probability 0, space 0, times 0 [ 257.042042][T11565] device veth1_macvtap entered promiscuous mode [ 257.051234][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.063840][T11571] CPU: 1 PID: 11571 Comm: syz.2.4437 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 257.075012][T11571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 257.085020][T11571] Call Trace: [ 257.088155][T11571] dump_stack_lvl+0x1e2/0x24b [ 257.092662][T11571] ? panic+0x812/0x812 [ 257.096577][T11571] ? bfq_pos_tree_add_move+0x43b/0x43b [ 257.101864][T11571] ? __kasan_check_write+0x14/0x20 [ 257.106809][T11571] ? xas_set_mark+0x1ee/0x250 [ 257.111323][T11571] dump_stack+0x15/0x17 [ 257.115317][T11571] should_fail+0x3c6/0x510 [ 257.119675][T11571] ? ext4_init_io_end+0x29/0x120 [ 257.124441][T11571] __should_failslab+0xa4/0xe0 [ 257.129040][T11571] should_failslab+0x9/0x20 [ 257.133382][T11571] kmem_cache_alloc+0x3d/0x2e0 [ 257.137983][T11571] ext4_init_io_end+0x29/0x120 [ 257.142581][T11571] ext4_writepages+0xc48/0x3c00 [ 257.147264][T11571] ? kasan_set_track+0x4b/0x70 [ 257.151866][T11571] ? __ext4_journal_stop+0x111/0x1c0 [ 257.156996][T11571] ? ext4_da_write_end+0x80a/0xbb0 [ 257.161954][T11571] ? generic_perform_write+0x3d9/0x570 [ 257.167251][T11571] ? ext4_readpage+0x230/0x230 [ 257.171832][T11571] ? debug_smp_processor_id+0x17/0x20 [ 257.177041][T11571] ? kmem_cache_free+0xa9/0x1e0 [ 257.181730][T11571] ? jbd2_journal_stop+0x8be/0xd40 [ 257.186675][T11571] ? ext4_readpage+0x230/0x230 [ 257.191271][T11571] do_writepages+0x12e/0x270 [ 257.195699][T11571] ? __writepage+0x130/0x130 [ 257.200130][T11571] ? __kasan_check_write+0x14/0x20 [ 257.205073][T11571] ? _raw_spin_lock+0xa4/0x1b0 [ 257.209667][T11571] ? _raw_spin_unlock+0x4d/0x70 [ 257.214382][T11571] __filemap_fdatawrite_range+0x33c/0x3f0 [ 257.219913][T11571] ? filemap_check_errors+0x150/0x150 [ 257.225124][T11571] ? generic_perform_write+0x4ce/0x570 [ 257.230426][T11571] file_write_and_wait_range+0x89/0x120 [ 257.235868][T11571] ext4_sync_file+0x1a2/0xa30 [ 257.240324][T11571] ? down_write+0xd7/0x150 [ 257.244560][T11571] vfs_fsync_range+0x17b/0x190 [ 257.249169][T11571] ext4_buffered_write_iter+0x565/0x610 [ 257.254540][T11571] ext4_file_write_iter+0x193/0x1c80 [ 257.259662][T11571] ? kstrtol_from_user+0x310/0x310 [ 257.264698][T11571] ? memset+0x35/0x40 [ 257.268703][T11571] ? avc_policy_seqno+0x1b/0x70 [ 257.273395][T11571] ? selinux_file_permission+0x2bb/0x560 [ 257.278855][T11571] ? fsnotify_perm+0x67/0x4e0 [ 257.283378][T11571] ? ext4_file_read_iter+0x4d0/0x4d0 [ 257.288492][T11571] ? security_file_permission+0x86/0xb0 [ 257.293877][T11571] ? iov_iter_init+0x3f/0x120 [ 257.298419][T11571] vfs_write+0xb55/0xe70 [ 257.302472][T11571] ? kernel_write+0x3d0/0x3d0 [ 257.306985][T11571] ? mutex_trylock+0xa0/0xa0 [ 257.311414][T11571] ? __fdget_pos+0x2e7/0x3a0 [ 257.315828][T11571] ? ksys_write+0x77/0x2c0 [ 257.320085][T11571] ksys_write+0x199/0x2c0 [ 257.324252][T11571] ? __ia32_sys_read+0x90/0x90 [ 257.328847][T11571] ? debug_smp_processor_id+0x17/0x20 [ 257.334059][T11571] __x64_sys_write+0x7b/0x90 [ 257.338480][T11571] do_syscall_64+0x34/0x70 [ 257.342853][T11571] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 257.348564][T11571] RIP: 0033:0x7f00c653eb99 [ 257.352804][T11571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.372340][T11571] RSP: 002b:00007f00c57c0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 257.380580][T11571] RAX: ffffffffffffffda RBX: 00007f00c66ccfa0 RCX: 00007f00c653eb99 [ 257.388387][T11571] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 257.396194][T11571] RBP: 00007f00c57c00a0 R08: 0000000000000000 R09: 0000000000000000 [ 257.404004][T11571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 257.411816][T11571] R13: 000000000000000b R14: 00007f00c66ccfa0 R15: 00007ffc90f06778 [ 257.749886][T11591] device veth1_macvtap left promiscuous mode [ 257.756058][T11591] device macsec0 left promiscuous mode [ 257.819226][T11591] device veth1_macvtap entered promiscuous mode [ 257.826653][T11591] device macsec0 entered promiscuous mode [ 257.850374][T11598] device veth1_macvtap left promiscuous mode [ 257.928740][T11604] FAULT_INJECTION: forcing a failure. [ 257.928740][T11604] name failslab, interval 1, probability 0, space 0, times 0 [ 257.941731][T11604] CPU: 1 PID: 11604 Comm: syz.3.4450 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 257.952909][T11604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 257.962798][T11604] Call Trace: [ 257.965937][T11604] dump_stack_lvl+0x1e2/0x24b [ 257.970452][T11604] ? panic+0x812/0x812 [ 257.974348][T11604] ? bfq_pos_tree_add_move+0x43b/0x43b [ 257.979638][T11604] ? slab_free_freelist_hook+0xc0/0x190 [ 257.985022][T11604] dump_stack+0x15/0x17 [ 257.989011][T11604] should_fail+0x3c6/0x510 [ 257.993272][T11604] ? ext4_init_io_end+0x29/0x120 [ 257.998039][T11604] __should_failslab+0xa4/0xe0 [ 258.002642][T11604] should_failslab+0x9/0x20 [ 258.006986][T11604] kmem_cache_alloc+0x3d/0x2e0 [ 258.011583][T11604] ext4_init_io_end+0x29/0x120 [ 258.016179][T11604] ext4_writepages+0xd7a/0x3c00 [ 258.020869][T11604] ? kasan_set_track+0x4b/0x70 [ 258.025466][T11604] ? __ext4_journal_stop+0x111/0x1c0 [ 258.030604][T11604] ? ext4_da_write_end+0x80a/0xbb0 [ 258.035535][T11604] ? generic_perform_write+0x3d9/0x570 [ 258.040845][T11604] ? ext4_readpage+0x230/0x230 [ 258.045436][T11604] ? debug_smp_processor_id+0x17/0x20 [ 258.050647][T11604] ? kmem_cache_free+0xa9/0x1e0 [ 258.055334][T11604] ? jbd2_journal_stop+0x8be/0xd40 [ 258.060275][T11604] ? ext4_readpage+0x230/0x230 [ 258.064870][T11604] do_writepages+0x12e/0x270 [ 258.069313][T11604] ? __writepage+0x130/0x130 [ 258.073897][T11604] ? __kasan_check_write+0x14/0x20 [ 258.078843][T11604] ? _raw_spin_lock+0xa4/0x1b0 [ 258.083439][T11604] ? _raw_spin_unlock+0x4d/0x70 [ 258.088130][T11604] __filemap_fdatawrite_range+0x33c/0x3f0 [ 258.093688][T11604] ? filemap_check_errors+0x150/0x150 [ 258.098894][T11604] ? generic_perform_write+0x4ce/0x570 [ 258.104191][T11604] file_write_and_wait_range+0x89/0x120 [ 258.109566][T11604] ext4_sync_file+0x1a2/0xa30 [ 258.114078][T11604] ? down_write+0xd7/0x150 [ 258.118363][T11604] vfs_fsync_range+0x17b/0x190 [ 258.122935][T11604] ext4_buffered_write_iter+0x565/0x610 [ 258.128309][T11604] ext4_file_write_iter+0x193/0x1c80 [ 258.133430][T11604] ? kstrtol_from_user+0x310/0x310 [ 258.138379][T11604] ? memset+0x35/0x40 [ 258.142303][T11604] ? avc_policy_seqno+0x1b/0x70 [ 258.146972][T11604] ? selinux_file_permission+0x2bb/0x560 [ 258.152469][T11604] ? fsnotify_perm+0x67/0x4e0 [ 258.156952][T11604] ? ext4_file_read_iter+0x4d0/0x4d0 [ 258.162071][T11604] ? security_file_permission+0x86/0xb0 [ 258.167454][T11604] ? iov_iter_init+0x3f/0x120 [ 258.171971][T11604] vfs_write+0xb55/0xe70 [ 258.176049][T11604] ? kernel_write+0x3d0/0x3d0 [ 258.180558][T11604] ? mutex_trylock+0xa0/0xa0 [ 258.184990][T11604] ? __fdget_pos+0x2e7/0x3a0 [ 258.189419][T11604] ? ksys_write+0x77/0x2c0 [ 258.193672][T11604] ksys_write+0x199/0x2c0 [ 258.197833][T11604] ? __ia32_sys_read+0x90/0x90 [ 258.202440][T11604] ? debug_smp_processor_id+0x17/0x20 [ 258.207639][T11604] __x64_sys_write+0x7b/0x90 [ 258.212070][T11604] do_syscall_64+0x34/0x70 [ 258.216322][T11604] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 258.222044][T11604] RIP: 0033:0x7f2b167a6b99 [ 258.226307][T11604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.245740][T11604] RSP: 002b:00007f2b15a28048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.253991][T11604] RAX: ffffffffffffffda RBX: 00007f2b16934fa0 RCX: 00007f2b167a6b99 [ 258.261798][T11604] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 258.269604][T11604] RBP: 00007f2b15a280a0 R08: 0000000000000000 R09: 0000000000000000 [ 258.277415][T11604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 258.285225][T11604] R13: 000000000000000b R14: 00007f2b16934fa0 R15: 00007ffd0a7fd238 [ 258.306123][T11608] device veth1_macvtap entered promiscuous mode [ 258.330821][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.752395][T11636] device macsec0 left promiscuous mode [ 258.784981][T11636] device veth1_macvtap entered promiscuous mode [ 258.798432][T11636] device macsec0 entered promiscuous mode [ 258.812323][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.877251][T11651] FAULT_INJECTION: forcing a failure. [ 258.877251][T11651] name failslab, interval 1, probability 0, space 0, times 0 [ 258.889744][T11651] CPU: 0 PID: 11651 Comm: syz.3.4468 Tainted: G W 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 258.900844][T11651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 258.910740][T11651] Call Trace: [ 258.913879][T11651] dump_stack_lvl+0x1e2/0x24b [ 258.918380][T11651] ? panic+0x812/0x812 [ 258.922285][T11651] ? bfq_pos_tree_add_move+0x43b/0x43b [ 258.927588][T11651] ? __kasan_check_write+0x14/0x20 [ 258.932530][T11651] ? xas_set_mark+0x1ee/0x250 [ 258.937039][T11651] dump_stack+0x15/0x17 [ 258.941026][T11651] should_fail+0x3c6/0x510 [ 258.945303][T11651] ? ext4_init_io_end+0x29/0x120 [ 258.950058][T11651] __should_failslab+0xa4/0xe0 [ 258.954663][T11651] should_failslab+0x9/0x20 [ 258.958996][T11651] kmem_cache_alloc+0x3d/0x2e0 [ 258.963600][T11651] ext4_init_io_end+0x29/0x120 [ 258.968200][T11651] ext4_writepages+0xc48/0x3c00 [ 258.972897][T11651] ? exc_page_fault+0x33d/0x5b0 [ 258.977580][T11651] ? queue_stack_map_delete_elem+0x10/0x10 [ 258.983310][T11651] ? ext4_readpage+0x230/0x230 [ 258.987903][T11651] ? jbd2_journal_stop+0x8be/0xd40 [ 258.992854][T11651] ? bpf_trace_run2+0xf4/0x280 [ 258.997455][T11651] ? bpf_trace_run1+0x210/0x210 [ 259.002141][T11651] ? jbd2_journal_stop+0x8be/0xd40 [ 259.007087][T11651] ? kmem_cache_free+0xa9/0x1e0 [ 259.011780][T11651] ? jbd2_journal_stop+0x8be/0xd40 [ 259.016720][T11651] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 259.022366][T11651] ? jbd2_journal_stop+0x8be/0xd40 [ 259.027308][T11651] ? ext4_readpage+0x230/0x230 [ 259.031912][T11651] do_writepages+0x12e/0x270 [ 259.036337][T11651] ? __writepage+0x130/0x130 [ 259.040763][T11651] ? __kasan_check_write+0x14/0x20 [ 259.045709][T11651] ? _raw_spin_lock+0xa4/0x1b0 [ 259.050310][T11651] ? _raw_spin_unlock+0x4d/0x70 [ 259.054998][T11651] __filemap_fdatawrite_range+0x33c/0x3f0 [ 259.060551][T11651] ? filemap_check_errors+0x150/0x150 [ 259.065764][T11651] ? generic_perform_write+0x4ce/0x570 [ 259.071051][T11651] file_write_and_wait_range+0x89/0x120 [ 259.076457][T11651] ext4_sync_file+0x1a2/0xa30 [ 259.080945][T11651] ? down_write+0xd7/0x150 [ 259.085205][T11651] vfs_fsync_range+0x17b/0x190 [ 259.089804][T11651] ext4_buffered_write_iter+0x565/0x610 [ 259.095185][T11651] ext4_file_write_iter+0x193/0x1c80 [ 259.100304][T11651] ? kstrtol_from_user+0x310/0x310 [ 259.105248][T11651] ? putname+0xe7/0x140 [ 259.109243][T11651] ? memset+0x35/0x40 [ 259.113061][T11651] ? avc_policy_seqno+0x1b/0x70 [ 259.117749][T11651] ? selinux_file_permission+0x2bb/0x560 [ 259.123307][T11651] ? fsnotify_perm+0x67/0x4e0 [ 259.127812][T11651] ? ext4_file_read_iter+0x4d0/0x4d0 [ 259.132936][T11651] ? security_file_permission+0x86/0xb0 [ 259.138319][T11651] ? iov_iter_init+0x3f/0x120 [ 259.142844][T11651] vfs_write+0xb55/0xe70 [ 259.146912][T11651] ? kernel_write+0x3d0/0x3d0 [ 259.151426][T11651] ? mutex_trylock+0xa0/0xa0 [ 259.155855][T11651] ? __fdget_pos+0x2e7/0x3a0 [ 259.160278][T11651] ? ksys_write+0x77/0x2c0 [ 259.164536][T11651] ksys_write+0x199/0x2c0 [ 259.168699][T11651] ? __ia32_sys_read+0x90/0x90 [ 259.173311][T11651] ? debug_smp_processor_id+0x17/0x20 [ 259.178502][T11651] __x64_sys_write+0x7b/0x90 [ 259.182931][T11651] do_syscall_64+0x34/0x70 [ 259.187183][T11651] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 259.192910][T11651] RIP: 0033:0x7f2b167a6b99 [ 259.197160][T11651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.216608][T11651] RSP: 002b:00007f2b15a28048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 259.224846][T11651] RAX: ffffffffffffffda RBX: 00007f2b16934fa0 RCX: 00007f2b167a6b99 [ 259.232657][T11651] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000008 [ 259.240466][T11651] RBP: 00007f2b15a280a0 R08: 0000000000000000 R09: 0000000000000000 [ 259.248274][T11651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 259.256087][T11651] R13: 000000000000000b R14: 00007f2b16934fa0 R15: 00007ffd0a7fd238 [ 259.288138][T11658] device veth1_macvtap left promiscuous mode [ 259.299697][T11638] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.306972][T11638] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.316906][T11638] device bridge_slave_0 entered promiscuous mode [ 259.359101][T11638] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.383702][T11638] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.391000][T11638] device bridge_slave_1 entered promiscuous mode [ 259.400162][T11665] device veth1_macvtap entered promiscuous mode [ 259.580061][T11638] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.587144][T11638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.594362][T11638] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.601124][T11638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.684574][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.692446][ T497] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.744763][ T497] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.803428][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.812462][ T6897] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.819326][ T6897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.828254][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.837766][ T6897] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.844640][ T6897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.864193][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.873564][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.893138][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.907809][T11638] device veth0_vlan entered promiscuous mode [ 259.916351][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.929838][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.020185][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.078325][T11638] device veth1_macvtap entered promiscuous mode [ 260.137584][ T497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.170483][ T471] device bridge_slave_1 left promiscuous mode [ 260.177596][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.201131][ T471] device bridge_slave_0 left promiscuous mode [ 260.217325][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.236570][ T471] device veth1_macvtap left promiscuous mode [ 260.248716][ T471] device veth0_vlan left promiscuous mode [ 260.352814][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.361512][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.405277][T11700] macsec0: mtu greater than device maximum [ 260.439353][T11704] device veth1_macvtap left promiscuous mode [ 260.620843][T11713] device veth1_macvtap entered promiscuous mode [ 261.265452][T11737] device syzkaller0 entered promiscuous mode [ 261.325618][T11746] device pim6reg1 entered promiscuous mode [ 261.777053][T11779] device syzkaller0 entered promiscuous mode [ 262.406878][T11828] device pim6reg1 entered promiscuous mode [ 262.525874][T11832] device syzkaller0 entered promiscuous mode [ 262.599248][T11834] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.608188][T11834] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.616177][T11834] device bridge_slave_0 entered promiscuous mode [ 262.636092][T11834] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.643244][T11834] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.650622][T11834] device bridge_slave_1 entered promiscuous mode [ 262.746401][T11851] device syzkaller0 entered promiscuous mode [ 262.775129][T11853] device veth0_vlan left promiscuous mode [ 262.786296][T11853] device veth0_vlan entered promiscuous mode [ 262.846161][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.861412][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.870764][ T6896] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.877664][ T6896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.890899][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.898731][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.906781][T10495] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.913653][T10495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.933104][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.941183][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.971172][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.993268][T11861] device vxcan1 entered promiscuous mode [ 263.007847][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.019264][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.028390][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.037388][T11834] device veth0_vlan entered promiscuous mode [ 263.067953][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.078597][T11834] device veth1_macvtap entered promiscuous mode [ 263.087928][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.101226][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.149977][T11866] device pim6reg1 entered promiscuous mode [ 263.283400][ T471] device bridge_slave_1 left promiscuous mode [ 263.289414][ T471] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.348534][ T471] device bridge_slave_0 left promiscuous mode [ 263.423351][ T471] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.502055][ T471] device veth1_macvtap left promiscuous mode [ 263.510594][ T471] device veth0_vlan left promiscuous mode [ 263.771590][T11893] device pim6reg1 entered promiscuous mode [ 264.066934][T11920] device veth1_macvtap left promiscuous mode [ 264.091977][T11920] device macsec0 entered promiscuous mode [ 264.115591][T11919] device pim6reg1 entered promiscuous mode [ 264.288439][T11928] device veth1_macvtap entered promiscuous mode [ 264.407365][T11930] device pim6reg1 entered promiscuous mode [ 264.739379][T11964] device veth1_macvtap left promiscuous mode [ 264.747998][T11964] device macsec0 entered promiscuous mode [ 264.842723][T11968] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 264.893924][T11972] device wg2 entered promiscuous mode [ 264.946497][T11964] device veth1_macvtap entered promiscuous mode [ 264.966920][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.213571][T12000] device veth1_macvtap left promiscuous mode [ 265.389591][T12006] device veth1_macvtap entered promiscuous mode [ 265.615025][T12017] syz.1.4619[12017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.615082][T12017] syz.1.4619[12017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.646263][T12017] syz.1.4619[12017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.669277][T12017] syz.1.4619[12017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.684356][T12019] device syzkaller0 entered promiscuous mode [ 265.904189][T12031] €Â: renamed from veth0_vlan [ 265.932764][T12033] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 265.973390][T12039] device veth1_macvtap left promiscuous mode [ 266.044860][T12044] device veth1_macvtap entered promiscuous mode [ 266.766148][T12094] device veth0_vlan left promiscuous mode [ 266.817262][T12094] device veth0_vlan entered promiscuous mode [ 267.349732][T12109] geneve1: tun_chr_ioctl cmd 1074025698 [ 267.879603][T12145] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.886855][T12145] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.894437][T12145] device bridge_slave_0 entered promiscuous mode [ 267.901485][T12145] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.908547][T12145] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.916131][T12145] device bridge_slave_1 entered promiscuous mode [ 267.924680][T12156] device veth1_macvtap left promiscuous mode [ 267.986090][T12145] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.992960][T12145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.000062][T12145] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.006877][T12145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.057047][T12145] device veth0_vlan entered promiscuous mode [ 268.116145][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.166184][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.259204][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.337061][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.346920][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.356883][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.370110][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.379525][ T24] audit: type=1400 audit(1719775989.450:169): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.404409][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.413672][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.427069][T12145] device veth1_macvtap entered promiscuous mode [ 268.439470][ T24] audit: type=1400 audit(1719775989.450:170): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.477470][T12160] device veth1_macvtap entered promiscuous mode [ 268.486236][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.498653][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.510215][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.522684][ T24] audit: type=1400 audit(1719775989.450:171): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 268.552459][T10495] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.594230][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.616283][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.662264][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.673743][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.796544][T12182] syz.2.4682[12182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.796598][T12182] syz.2.4682[12182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.230480][T12195] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 269.273012][T12199] device veth1_macvtap left promiscuous mode [ 269.341123][ T310] device bridge_slave_1 left promiscuous mode [ 269.392901][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.472885][ T310] device bridge_slave_0 left promiscuous mode [ 269.520659][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.569495][ T310] device veth1_macvtap left promiscuous mode [ 269.575442][ T310] device veth0_vlan left promiscuous mode [ 270.035366][T12205] device veth1_macvtap entered promiscuous mode [ 270.452357][T12246] device veth1_macvtap left promiscuous mode [ 270.723489][T12246] device veth1_macvtap entered promiscuous mode [ 270.985395][T12257] device syzkaller0 entered promiscuous mode [ 271.003877][T12264] syz.0.4710[12264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.003930][T12264] syz.0.4710[12264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.056294][T12264] syz.0.4710[12264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.073041][T12264] syz.0.4710[12264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.282196][T12287] device veth1_macvtap left promiscuous mode [ 271.308005][T12287] device macsec0 entered promiscuous mode [ 271.495575][T12299] device veth1_macvtap entered promiscuous mode [ 271.512677][ T2738] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.117323][T12321] syz.0.4734[12321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.119867][T12321] syz.0.4734[12321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.154065][T12325] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.172268][T12325] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.204154][T12325] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.211125][T12325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.215379][T12321] syz.0.4734[12321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.218227][T12325] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.219370][T12321] syz.0.4734[12321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.229428][T12325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.248287][T12325] device bridge0 entered promiscuous mode [ 272.410744][T12333] device syzkaller0 entered promiscuous mode [ 272.548871][T12339] device veth1_macvtap left promiscuous mode [ 272.601780][T12341] device veth1_macvtap left promiscuous mode [ 272.758036][T12344] device veth1_macvtap entered promiscuous mode [ 272.854917][T12341] device veth1_macvtap entered promiscuous mode [ 273.288384][T12368] device veth1_macvtap left promiscuous mode [ 273.348089][T12370] device veth1_macvtap left promiscuous mode [ 273.426382][T12375] syz.3.4755[12375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.426433][T12375] syz.3.4755[12375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.486565][T12377] device veth1_macvtap entered promiscuous mode [ 273.632806][ T604] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.732337][T12376] device veth1_macvtap entered promiscuous mode [ 273.761879][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.846804][T12388] device veth1_macvtap left promiscuous mode [ 274.027285][T12397] device veth1_macvtap entered promiscuous mode [ 276.448009][T12534] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 2147483648 (only 8 groups) [ 276.555795][T12549] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 276.924742][T12576] device veth1_macvtap left promiscuous mode [ 276.930654][T12576] device macsec0 left promiscuous mode [ 276.972022][T12579] device veth1_macvtap entered promiscuous mode [ 276.979305][T12579] device macsec0 entered promiscuous mode [ 277.487079][T12616] bpf_get_probe_write_proto: 2 callbacks suppressed [ 277.487091][T12616] syz.4.4859[12616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.504645][T12616] syz.4.4859[12616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.560685][T12624] tap0: tun_chr_ioctl cmd 2147767507 [ 277.756805][T12640] syz.2.4867[12640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.760188][T12640] syz.2.4867[12640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.039712][T12656] syz.1.4872[12656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.108792][T12656] syz.1.4872[12656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.399650][T12676] device syzkaller0 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable)