last executing test programs: 5.130482111s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r1, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffe7c) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x10000, 0x1, 0x2, 0x2650, r0, 0x1000, '\x00', r3, r0, 0x0, 0xfffffffe, 0x4, 0x3}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xcd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r3, @ANYRESHEX=r3], &(0x7f0000000240)='GPL\x00', 0x4000ef, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='pwc_handler_exit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x2, 0x81, 0x8, 0x22, r0, 0x3, '\x00', r3, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000018110000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x12, 0xffffffff, 0x5, 0xfffffff7, 0x2, r1, 0x9, '\x00', 0x0, r0, 0x4, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r10, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r11, 0x0, 0x0}, 0x20) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000080)) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.074789789s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0, r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_ext={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, &(0x7f00000004c0)=[{}, {0x0, 0x0, 0x10002}, {0x0, 0x2, 0x0, 0xc}, {}, {0x5}]}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) 4.678076911s ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 4.22734509s ago: executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2203, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000019010000646c6c2501000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000070002000600000095e07a436611fea8943a2de32e606c395083eb41698e118be48233a83cdf62b232172b45"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={r2, &(0x7f00000005c0)="12a4772afa8cea5f91864dba12561d49c38e6f8881bfbfd03a90cac2781238f0bc256c4901880eccb0eaeb31e3e2cd9c9e179c79278882966f0886346677a6277503d20952c459faa66411484719698c2c109be024dbdd9c7bac1c3b240a11b9f58f092f07cd863d3bfc2f10fafaa065478557177588423b3e9821f89accdd0a46f5d93b27a039d9d42d6a85c72fa7631786071745e97c81fe36e15f4e3394", &(0x7f0000000740)=""/96}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r4, &(0x7f0000000080)=0xffffffffffffffff, 0x12) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000280)={'veth1_macvtap\x00'}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x65e9bc39, 0xffffffe1, 0x8, 0x1018, r4, 0x80, '\x00', 0x0, r6, 0x4, 0x5, 0x2, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1a41, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYRESHEX=r8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x9}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[], 0x6e8a) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.77303942s ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 3.37958705s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x8, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0xe, &(0x7f0000000c80)=ANY=[@ANYRESHEX=r3], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x4, 0x1, 0x80000000, 0x1902, 0x1, 0x9, '\x00', 0x0, r6, 0x3, 0x3, 0x1, 0x6}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe81) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xc, &(0x7f0000002b00)=ANY=[@ANYBLOB="85100000fdffffff18120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001800000007000000000000000800000018110000", @ANYRES32=r2, @ANYBLOB="00000000000000001f00000000000000855f1500860000002700bee028d80d418ac2a3ef324378ea"], &(0x7f00000003c0)='syzkaller\x00', 0x3ff, 0x93, &(0x7f00000004c0)=""/147, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[r1, r7, r1, r4, r0, r2, r1, r8, r0], 0x0, 0x10, 0xfffffff9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18aa52bd4048c916f30000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000308500000005000000bca900000000000035090100000000009500500000000006b702000000000000739af0ff00000000b509020000000000dbaaf0ff000000002f8900000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000036080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000002a80)=ANY=[@ANYBLOB="1800000000000000c15af21063d2259654961f00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff04e1b1fa46a39362a7d509a3d5e6b702000008000000b7030000018000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000009c0)={0x2, 0x80, 0x1, 0x0, 0x3f, 0xfb, 0x0, 0x14e20000, 0x10012, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000900), 0xa}, 0x100, 0x4f30000000000000, 0x0, 0x2, 0x4, 0x1579, 0x6, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000003540)={0x0, 0x0, 0x0, 0x300, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x2008}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@fwd={0x4, 0x0, 0x0, 0x3}, @int]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/223, 0x39, 0xdf, 0x1}, 0x20) 3.298923513s ago: executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x44000, 0x0) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000040)=0x2237) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000080)=@framed={{0x85, 0x0, 0x0, 0x0, 0x7a, 0x27}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22}, 0x80) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xe2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) close(r6) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r5, 0x58, &(0x7f00000001c0)}, 0x10) 2.742100328s ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 2.457826522s ago: executing program 4: r0 = getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x101, 0xfff}, r0, 0xe, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x40}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3d, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000001000000b70800000e0000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='ext4_remove_blocks\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f00000012c0)=0x5, 0x12) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000100)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.net/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000700), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1d, 0x20, 0x0, 0x0, 0x1080, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) close(r8) 1.600692604s ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c81be3110a36a27aeffe0ad5a8a7385a1913a64fb2db630e8fc8017828cea60f327c3a510b441d94d32584e55f7c2320d89b2ba3d44d832b8e7c5f45442de9ef37d057e6d0c6664e8d74e23f18336d41a3e38c2cda49050cb32ca7040a388c75741ac07d3befc714df35dc92ff70ad041cf17b70a971c142bb89ecfe25290750e989c8666560a61b62fdc4fadef7f30b6269a669ef99be7e7ba7ddddf99949fedc0c331796988c6eedb5c66cbe2870a2affce0b550c3411a2aaf302481ee93398c0fbc0c815cfe1e78bf8fed7f19f2c2dae17a4533aa85f6b787f8072adda379118d76dbba3cebfc4c8aacbb1f79a28ec3a0ec99816e3c8721ddcde1ce73b0704063474", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.564840939s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe23}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[], 0x0, 0x56}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000004020000095000000000000000000000000002dbb35b735661fe770c035c0044e6e10282ac94d0d1e19733824c3ce636d6dd546554487215f7c9b08e40bde380578c0e7f7d2e8063d0d80a745397643ca009220e6fe94b33b1579c4"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x17) ioctl$TUNSETLINK(r2, 0x400454cd, 0xfffffffe) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1200, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008e0083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000740)='ext4_allocate_inode\x00', r7}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) 1.468939994s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000780)={&(0x7f00000000c0)=@caif, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x20, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffb}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd4, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESHEX=r3, @ANYBLOB], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000640)="a1cbb3c21fa60c3ff5ef7b9d72467f6590e6fe55e3079c5f49122484aad1dfad1a3f75cfa9f0c51d5328476dcdbd0199973e7047c7dca7b8ca282f40bd7ddd155a89760700000000000000c02ea21df5ae9db5b0dec8220367f7a76234f707e25fd3e3cc523fb9281b55793ef9ad8ad6c9a94b961b8064e44acbf69f037801aec0ad913cc851435622d9bee481020000e7e200000000000000000000e086ab340b5caf57f463c488301e9c4a37169b0391802410a9e2af8505df153e4a03e8a99633295af78f20f465c2e0ef26336766b0", 0xd1}], 0x1, 0x0, 0x0, 0x4004000}, 0x8) 1.409872553s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9d}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r5}, 0x10) write$cgroup_pid(r3, &(0x7f0000000580), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x2009) 1.352795782s ago: executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x4, 0x42, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x401, 0x0, r0, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f00000001c0)="385dea8d1f3cd625a91a368ffa4acd8170b50d2c9b7d107e50767f54a562e6bc58f48d49ed5dc5e6016f8f60a4242960ee3e890f74a132ac8fe03fb4", &(0x7f0000000280)=""/62, &(0x7f00000002c0)="40f668a20a25fab62dc85fd9f3d7e6881d5406950f836a2f162e8bbc4d2e0cd24c08337a53a6ac8770c7dff164d61c434fbbb0cc06e8b18bc8e32c62068cc7c939f075cb8975dcd4505a42785c39b44cab484c212854643c6508ea8734f3a15ed820009f32bab831aa3738a40d67545fe6dc520f72297b20982c11a520e041159ddd63f85b565304af4c6b76264d0744b122b1f8e3b9674a1359fa60acb47101ab9cd3ddc49837a44014faa04878d36a8bf03a09b7a7213c79f684e33f44bcdd97b339459573b06624896d899d08b62fb7a076f6919f5cd25b8334180c3ada0efdec60e1eea3afe8b8667c", &(0x7f00000005c0)="e864055a56310197d959d496d8c8104a447d4e882cab547dd166bb1f50c989a3102c2c62d01016fe41492ffa47ed7833725f5f6c1729639e64c16a8821dc5a1011fc7a83f74b9bfe3a2a8a8d4b6c1ecc7e9dec1ab5cc55072db203cc7b8dfac9e2f41e128c71b90295259e3f63e64a59ed432a3bdf06af28c0debf24d163583d9552f76bfb3356dd443bbd042196474ed8d9d881f2ad91baf4c73c275a7fe87285ab1254712ff919dd190896f77825ce977ef0a6dcdd390a96fd", 0x3211, r1, 0x324f6d906d4d3e67}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000004c0)="f9c1d03cd5b3456551310ae42d063cd8c16aaf", 0x1003, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100), 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRESHEX=r5, @ANYRES32=r5, @ANYRESDEC], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32, @ANYRESHEX], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYRES8=r8], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8930, &(0x7f0000000100)='g\xb5\xcd\xff*\xfe*\xda\xe3\x8e\x11\xdb2:\x87\x00d]\xf0\xb15S\x824\'\xe0NkxI\xc2\xa0\x1e\x121o\xee\x03\f\xf1\x179\xdc~\x9c\xdf\xdd\xdf\xdf\x02\x9au\x97\xe9X)\xe9C6\x8a\xc3.0\x11\x11!(\xf1\x7f\xed\xa6\xe2X\xd2\x8a\x93C\xca\xd5 !-\xd5,|Z4\xb3\xc7P\xbd\xd9\xb5\xa5\xc7\xcd\xe5\xd2t\xbb)\xa1[\xe4;\xe6xOH\xecRv\x87^\x98>\xfeCt2\x9f\xd7H5\x86\xa6\x0f\xe9\xf1\x8b\x0fB\xb8\x88A\x81\xc2R\xc0w\xfeO\xfen)\xcfXr\x88\xcf\xc1\x1cMoD') bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x3, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 1.340761503s ago: executing program 0: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xf2}, 0x0, 0x0, 0xffffffffffffffff, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) gettid() r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8c, 0x6a, 0xa, 0xff00}, [@call={0x55}, @exit, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x0, 0x7f}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[@ANYBLOB='-'], 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) 930.324927ms ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 853.655919ms ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000004000001d8500000007000000440000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x56}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xa) 672.558176ms ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x11, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffff9}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x6, 0x45, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x40000005, 0x1}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="850000007d0000003500000000000000850000000800000095000000000000003d21cb25c326c146300850e426b0fa2312501decea34481f4a1b6d3de731f42d3ba886029b938c9d2cdcf7cbcf2f098b011dd617cbb7e5f06fb8bef14e7dd55a6a9d3d1d8b7e0f74e26e5aa842264320f6f063b38073ca2624c1d6305389026c140de1921083154f13ca21b8bc0a911751"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r11, 0x0, 0xe, 0x0, &(0x7f0000000040)="6100000000000000040000000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r10, @ANYRES32=r10, @ANYRESDEC=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 667.124067ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000001e20000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r4, 0x0, 0x20000000}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x9}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x12, 0x26, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5702}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x2, 0x2, 0x3, 0x8, 0x4, 0xfffffffffffffff8, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @ldst={0x0, 0x2, 0x3, 0x2, 0xa, 0xc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x140, 0x0, 0x0, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x86, 0x7, &(0x7f0000000340)=""/7, 0x41000, 0x1, '\x00', 0x0, 0xacd2c291bd7fd510, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x6, 0x7fffffff, 0x2}, 0x10, 0x0, r3, 0x2, &(0x7f0000000640)=[r6, r7], &(0x7f0000000680)=[{0x5, 0x4, 0x1, 0xa}, {0x5, 0x5, 0x1, 0x7}], 0x10, 0x401}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000080), 0x74, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r10}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 619.934264ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd87) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000800), 0x0, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x74, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f00000009c0)=ANY=[@ANYBLOB="851000000400000095000000000000001800000000000000000000000000000095000000000000008510008bd790746c51e0f0e8ca8c9d00fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)=""/126, 0x7e}, {&(0x7f0000000800)=""/7, 0x7}, {&(0x7f0000000a40)=""/97, 0x61}, {&(0x7f0000001340)=""/4096, 0x1000}, {0x0}], 0x5, &(0x7f0000000480)}, 0x40010021) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={0x0, 0x0, 0xfffffffffffffd21, 0x0, 0x0, 0xffff}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000140)=ANY=[], 0xffdd) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) 575.643271ms ago: executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00'}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="f402c1a5fdd46bb29d0e3111e3e577a0e8f5852a826b33f06a67ee7b3da5903bfe86ff10e8e0ea060e451afb8efb8686a8aa47dd5ba24d7711a80ef8f5ce14af30bb8603f78b40b9505f59dd88269981376aa2d85c749259a258760b8b86354ba6eb084c867a5ade61e3aa0af16f76e47f4e78c079aaa816fa5d58355759ad395fcd8640b07d6e4c249263a9efb43d437092c2f9ba566a88e5d953f0efaa81c9f4c57120a6049ca2643ca3674f03dff0e76a2acc70a1e40835efffe78ff52ea9578930ec45e0b0f20c6225c4816a2da059787af20151499d1366ef14", @ANYRES16=r2, @ANYBLOB="de15fec3c9855a3c225e855b5809adc1525952371a2263fff6e49f0c9b334d39a134db980b0ed59cd60a23c9f52067dda3e45c4232a9456c3b1fa3d52c87db0c0bd45ed45105c0532dee", @ANYRES32=r7, @ANYRES64=r2, @ANYRES32=r1], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='jbd2_checkpoint_stats\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 571.075342ms ago: executing program 2: r0 = perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x42400) 497.903054ms ago: executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x9, 0x0, 0x7, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000540), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b1a, &(0x7f0000000000)={'wg0\x00', @random="0200402000ff"}) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000002000000000000000000000203000000000000000100000d000000000000000001000000000000000000000200000000000068df71d9a8fb06d24ed09c96e1be5e48ac9219336da6a1f0a193979797bca694"], &(0x7f0000000140)=""/227, 0x46, 0xe3, 0x1}, 0x20) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000480)='thermal_power_devfreq_limit\x00', r3}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r5, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000004c0)={0x4}, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000500)="3fba0925a7a29eb003322d48270a64f7d5a0eb56927a7c627e14ca0a196d467a735c5412076ba5245571eba6d1244908094034a0609aff052fe8ccdb5ed809ab8c3c329ad6ddc5cf96d3b63fbebe5f741a643be71e87fecf90b27836af791dd53310184f11a1f6b951052ae9a2b6238432b8b12ba58001587141b3cee86e496081ebce4eab3b863f0fc4786cfe6729b111f6ab5ecc3b07a72bf3cb1323bdb7ad03642115ae797853ca1edf213dda5b761295f814d3dc3e58d5d6bcbc3f9ce751b293f67fbe564d926b2cc1f1d36dc150655e28a912b3ed74f154d8429e0bc20166dbc13f1c4f8844", &(0x7f00000002c0)=""/128}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x306) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x84, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x8, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r7, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000010000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='task_rename\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000c000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x2010, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffc}, 0x48) 168.525774ms ago: executing program 0: r0 = gettid() r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4018, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x0, 0x20, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x1, 0x0}, 0x8) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x10}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0x11, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x3, 0x5, 0x0, 0xb}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], &(0x7f0000000180)='GPL\x00', 0x81, 0x0, 0x0, 0x41000, 0x10, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x5, 0x1, 0xa0000000}, 0x10, r5, r6, 0x7, 0x0, &(0x7f0000000600)=[{0x5, 0x4, 0xb, 0x2}, {0x3, 0x3, 0x2, 0x8}, {0x3, 0x5, 0x6, 0x2}, {0x3, 0x1, 0xb}, {0x5, 0x1, 0x9, 0x7}, {0x4, 0x5, 0xf, 0x2}, {0x4, 0x4, 0x6, 0x9}]}, 0x90) r8 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000740)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000780)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f00000007c0), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000800)={[{0x2d, 'cpuacct'}, {0x2d, 'memory'}, {0x2d, 'net_prio'}, {0x2d, 'rdma'}, {0x2b, 'net'}, {0x2b, 'rlimit'}, {0x2b, 'devices'}]}, 0x37) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000840), 0x8) write$cgroup_subtree(r10, &(0x7f0000000880)={[{0x2b, 'freezer'}, {0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x2b, 'net_prio'}, {0x2b, 'cpuacct'}, {0x2d, 'memory'}, {0x2b, 'devices'}]}, 0x39) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000900)=""/223, 0xdf}, {&(0x7f0000000a00)=""/107, 0x6b}, {&(0x7f0000000a80)=""/90, 0x5a}, {&(0x7f0000000b00)=""/193, 0xc1}, {&(0x7f0000000c00)=""/5, 0x5}, {&(0x7f0000000c40)=""/18, 0x12}, {&(0x7f0000000c80)=""/7, 0x7}, {&(0x7f0000000cc0)=""/44, 0x2c}], 0x8, &(0x7f0000000d80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x22) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e40)={@map=r2, r15, 0x12, 0x20, r7, @prog_fd=r14}, 0x20) r19 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ec0)=@generic={&(0x7f0000000e80)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000f80)={{r2, 0xffffffffffffffff}, &(0x7f0000000f00), &(0x7f0000000f40)=r16}, 0x20) r21 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001240)={0xffffffffffffffff, 0x800, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x18, 0x2e, &(0x7f0000000fc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xbd90, 0x0, 0x0, 0x0, 0x1ff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r16}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0x4, 0xf, 0x1, 0x7fff, 0x10001}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r19}}, @ldst={0x3, 0x2, 0x2, 0x8, 0x4, 0x2, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r20}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1f3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000001140)='syzkaller\x00', 0x8000, 0x3a, &(0x7f0000001180)=""/58, 0x40f00, 0xa, '\x00', r3, 0x2d, r13, 0x8, &(0x7f00000011c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001200)={0x1, 0x2, 0xffffffe0, 0x401}, 0x10, r4, r12, 0x2, &(0x7f0000001280)=[r17, r21], &(0x7f00000012c0)=[{0x1, 0x3, 0x1}, {0x0, 0x4, 0x8, 0xa}]}, 0x90) r22 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000013c0)={0x3, 0x4, 0x4, 0xa, 0x0, r19, 0x7fff, '\x00', r3, r18, 0x5, 0x5, 0x3}, 0x48) write$cgroup_subtree(r14, &(0x7f0000001440)={[{0x0, 'freezer'}, {0x0, 'perf_event'}, {0x2d, 'net_cls'}, {0x2b, 'hugetlb'}, {0x2d, 'cpu'}, {0x2b, 'net_prio'}, {0x2b, 'perf_event'}, {0x2b, 'devices'}]}, 0x4b) bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@bloom_filter={0x1e, 0x2, 0x4, 0x2, 0x2032, 0x1, 0x1000, '\x00', 0x0, r14, 0x4, 0x5, 0x5a, 0x3}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x6400, 0x0) ioctl$TUNSETIFF(r16, 0x400454ca, &(0x7f0000001580)={'\x00', 0x1000}) ioctl$PERF_EVENT_IOC_PERIOD(r15, 0x40082404, &(0x7f00000015c0)=0x4) openat$cgroup_freezer_state(r17, &(0x7f0000001600), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000016c0)={{r14, 0xffffffffffffffff}, &(0x7f0000001640), &(0x7f0000001680)=r12}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x5, 0x25, &(0x7f0000001700)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @jmp={0x5, 0x1, 0xc, 0x9, 0x8, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r23}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}, @jmp={0x5, 0x0, 0x2, 0x9, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x75}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x0, 0xd, 0x1, 0xa, 0x50, 0x8}], &(0x7f0000001840)='GPL\x00', 0x800, 0xcf, &(0x7f0000001880)=""/207, 0x41000, 0x8, '\x00', r3, 0x1b, r15, 0x8, &(0x7f0000001980)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r16, 0x2, &(0x7f00000019c0)=[r19, r22, r18, r22, r15, 0x1, r19], &(0x7f0000001a00)=[{0x0, 0x2, 0xe, 0x6}, {0x4, 0x5, 0xb, 0x1}], 0x10, 0x3}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000001b00)='ns/mnt\x00') 155.851646ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(r0, &(0x7f0000000500)='pids.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r0, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f00000005c0)='%pB \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x463}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x55262728, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @exit, @alu={0x4, 0x0, 0x7, 0x2, 0x6, 0xfffffffffffffff0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc49, 0x0, 0x0, 0x0, 0x9}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x4e, &(0x7f0000000380)=""/78, 0x40f00, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0xe, 0xf8ff, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r2, r3], &(0x7f0000000680)=[{0x3, 0x3, 0x10, 0x1}], 0x10, 0x7}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r7}, &(0x7f0000000280), &(0x7f00000002c0)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x12) 137.784929ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x200000000000004b, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') 88.841506ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe1fc}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0xfff, 0xcaa0, 0x3, 0x2208, 0xffffffffffffffff, 0x5, '\x00', 0x0, r2, 0x2, 0x5, 0x3, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/uts\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000640)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_macvtap\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) 69.620399ms ago: executing program 2: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xf2}, 0x0, 0x0, 0xffffffffffffffff, 0xf) socketpair$unix(0x1, 0x1, 0x0, 0x0) gettid() r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x8, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8c, 0x6a, 0xa, 0xff00}, [@call={0x55}, @exit, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffb}, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x0, 0x7f}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[@ANYBLOB='-'], 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) 66.6211ms ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000000)='ext4_unlink_enter\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 0s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x0, 0x0, 0x5}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x7ffffffe}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) kernel console output (not intermixed with test programs): veth1_macvtap entered promiscuous mode [ 867.121807][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 867.130073][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.139527][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 867.147919][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 867.157565][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 867.174487][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 867.183328][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 867.192091][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 867.202383][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 867.249844][T23206] syz-executor.0[23206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.249894][T23206] syz-executor.0[23206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.340518][ T9174] device macsec0 left promiscuous mode [ 867.367951][ T9174] bridge0: port 3(macsec0) entered disabled state [ 867.387641][ T9174] device bridge_slave_1 left promiscuous mode [ 867.395328][ T9174] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.405402][ T9174] device bridge_slave_0 left promiscuous mode [ 867.412464][ T9174] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.422572][ T9174] device veth0_vlan left promiscuous mode [ 867.690458][T23228] syz-executor.0[23228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.690495][T23228] syz-executor.0[23228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.703348][T23228] syz-executor.0[23228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.716384][T23228] syz-executor.0[23228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 867.931214][T23259] bridge0: port 3(dummy0) entered blocking state [ 867.948939][T23259] bridge0: port 3(dummy0) entered disabled state [ 867.955533][T23259] device dummy0 entered promiscuous mode [ 867.961349][T23259] bridge0: port 3(dummy0) entered blocking state [ 867.967515][T23259] bridge0: port 3(dummy0) entered forwarding state [ 868.052526][T23270] syz-executor.1[23270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 868.052614][T23270] syz-executor.1[23270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 868.879051][T23316] device pim6reg1 entered promiscuous mode [ 868.964290][T23328] device veth0_to_bridge entered promiscuous mode [ 868.987450][T23328] device syzkaller0 entered promiscuous mode [ 869.160511][T23336] device syzkaller0 entered promiscuous mode [ 869.426293][ T24] audit: type=1400 audit(1719208605.530:185): avc: denied { create } for pid=23362 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 871.058344][T23443] EXT4-fs warning (device sda1): verify_group_input:168: Reserved blocks too high (1219) [ 871.358165][T23472] device syzkaller0 entered promiscuous mode [ 871.955324][T23487] device syzkaller0 entered promiscuous mode [ 872.111150][T23495] device pim6reg1 entered promiscuous mode [ 872.435151][T23507] bridge0: port 3(dummy0) entered disabled state [ 872.441372][T23507] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.448338][T23507] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.471744][T23507] device dummy0 left promiscuous mode [ 872.477038][T23507] bridge0: port 3(dummy0) entered disabled state [ 872.483773][T23507] device bridge_slave_1 left promiscuous mode [ 872.489799][T23507] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.497109][T23507] device bridge_slave_0 left promiscuous mode [ 872.503273][T23507] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.616179][T23511] device syzkaller0 entered promiscuous mode [ 872.649579][T23513] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 872.750690][T23521] syz-executor.2[23521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.750740][T23521] syz-executor.2[23521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.799166][T23521] syz-executor.2[23521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.818439][T23521] syz-executor.2[23521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.948560][T23529] syz-executor.2[23529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 872.988041][T23529] syz-executor.2[23529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.100660][T23552] device pim6reg1 entered promiscuous mode [ 873.353318][T23579] device pim6reg1 entered promiscuous mode [ 873.686575][T23599] device syzkaller0 entered promiscuous mode [ 873.695459][T23599] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 873.804563][T23607] syz-executor.4[23607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.804613][T23607] syz-executor.4[23607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.914820][T23619] syz-executor.4[23619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.926871][T23619] syz-executor.4[23619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.942582][T23619] device pim6reg1 entered promiscuous mode [ 874.040869][T23627] : renamed from ipvlan1 [ 874.090544][T23631] device syzkaller0 entered promiscuous mode [ 874.101664][T23631] Â: renamed from pim6reg1 [ 874.250371][T23633] device syzkaller0 entered promiscuous mode [ 874.407922][T23656] device pim6reg1 entered promiscuous mode [ 874.920792][T23704] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 875.133791][T23732] device syzkaller0 entered promiscuous mode [ 875.602171][T23771] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 875.747227][T23783] device wlan0 entered promiscuous mode [ 875.810684][T23780] device syzkaller0 entered promiscuous mode [ 876.740181][T23822] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 877.525217][T23876] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 877.534143][T23876] pim6reg0: linktype set to 773 [ 877.759403][T23893] bpf_get_probe_write_proto: 15 callbacks suppressed [ 877.759414][T23893] syz-executor.0[23893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 877.942318][T23916] Â: renamed from pim6reg1 [ 878.226671][T23935] device syzkaller0 entered promiscuous mode [ 879.244978][T23988] device syzkaller0 entered promiscuous mode [ 879.588109][T24014] syz-executor.1[24014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 879.588147][T24014] syz-executor.1[24014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.493622][T24060] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 880.657635][T24068] syz-executor.4[24068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.657691][T24068] syz-executor.4[24068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.681908][T24068] syz-executor.4[24068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.695079][T24068] syz-executor.4[24068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.114288][T24093] device pim6reg1 entered promiscuous mode [ 882.528034][T24159] syz-executor.1[24159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.528086][T24159] syz-executor.1[24159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.540512][T24159] syz-executor.1[24159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.556698][T24159] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 882.781120][T24174] bpf_get_probe_write_proto: 2 callbacks suppressed [ 882.781129][T24174] syz-executor.0[24174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 882.797719][T24174] syz-executor.0[24174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.360493][T24196] syz-executor.4[24196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.372909][T24196] syz-executor.4[24196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 884.020745][T24235] device syzkaller0 entered promiscuous mode [ 884.604564][T24287] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 884.734269][T24295] syz-executor.0[24295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 884.734317][T24295] syz-executor.0[24295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 884.746487][T24295] syz-executor.0[24295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 884.758178][T24295] syz-executor.0[24295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.415260][T24325] device syzkaller0 entered promiscuous mode [ 885.477374][T24328] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.484972][T24328] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.492401][T24328] device bridge_slave_0 entered promiscuous mode [ 885.502720][T24328] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.509595][T24328] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.516863][T24328] device bridge_slave_1 entered promiscuous mode [ 885.566184][T24328] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.573043][T24328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.580102][T24328] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.586903][T24328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.611012][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 885.618801][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.625964][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.626499][T24343] syz-executor.4[24343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.632997][T24343] syz-executor.4[24343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.648590][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 885.668139][ T6936] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.674984][ T6936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.683311][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 885.691524][ T6936] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.698390][ T6936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.725111][T24328] device veth0_vlan entered promiscuous mode [ 885.736350][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 885.744653][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 885.752662][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 885.760492][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 885.767725][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 885.776582][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 885.793449][T24328] device veth1_macvtap entered promiscuous mode [ 885.801083][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 885.820182][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 885.828257][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 885.838912][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 885.846926][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 885.860749][T24348] device pim6reg1 entered promiscuous mode [ 885.899683][ T9] device veth1_macvtap left promiscuous mode [ 885.905524][ T9] device veth0_vlan left promiscuous mode [ 887.183350][T24431] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.191098][T24431] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.198309][T24431] device bridge_slave_0 entered promiscuous mode [ 887.205075][T24431] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.212663][T24431] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.220043][T24431] device bridge_slave_1 entered promiscuous mode [ 887.297153][T24431] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.304028][T24431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.311107][T24431] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.317906][T24431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.371059][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 887.378913][ T6936] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.386000][ T6936] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.419362][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 887.427383][ T6936] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.434230][ T6936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.445164][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 887.453700][ T6936] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.460561][ T6936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.481324][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 887.489234][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 887.500344][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 887.511640][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 887.520609][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 887.527866][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 887.536220][T24431] device veth0_vlan entered promiscuous mode [ 887.553164][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 887.562778][T24431] device veth1_macvtap entered promiscuous mode [ 887.579806][ T8322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 887.593939][ T6936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 887.966654][ T110] device bridge_slave_1 left promiscuous mode [ 887.981634][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.989405][ T110] device O3ãc¤± left promiscuous mode [ 887.994648][ T110] bridge0: port 1(O3ãc¤±) entered disabled state [ 888.253800][T24514] bpf_get_probe_write_proto: 6 callbacks suppressed [ 888.253810][T24514] syz-executor.2[24514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.261796][T24514] syz-executor.2[24514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.474871][T24513] device pim6reg1 entered promiscuous mode [ 888.611012][T24528] device pim6reg1 entered promiscuous mode [ 888.756489][T24541] syz-executor.2[24541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.756552][T24541] syz-executor.2[24541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.797123][T24541] syz-executor.2[24541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.813661][T24541] syz-executor.2[24541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.902517][T24553] syz-executor.2[24553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.924429][T24553] syz-executor.2[24553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 889.095475][T24565] device pim6reg1 entered promiscuous mode [ 889.385086][T24595] tap0: tun_chr_ioctl cmd 1074025677 [ 889.427629][T24595] tap0: linktype set to 804 [ 889.650122][T24605] device syzkaller0 entered promiscuous mode [ 890.326263][T24638] geneve1: tun_chr_ioctl cmd 1074025681 [ 890.384429][T24649] syz-executor.4[24649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.384488][T24649] syz-executor.4[24649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.517665][T24665] ÿÿÿÿÿÿ: renamed from pim6reg1 [ 890.711719][T24676] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 890.781378][T24679] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 891.005796][T24705] device syzkaller0 entered promiscuous mode [ 891.178164][T24723] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.185167][T24723] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.192854][T24723] device bridge_slave_0 entered promiscuous mode [ 891.199868][T24723] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.206714][T24723] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.214129][T24723] device bridge_slave_1 entered promiscuous mode [ 891.313568][T24723] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.320450][T24723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.327531][T24723] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.334323][T24723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.389727][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 891.398618][T22652] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.408964][T22652] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.461103][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 891.470569][T22657] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.477417][T22657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.487477][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 891.495608][T22657] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.502464][T22657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.536271][T22648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 891.547590][T22648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 891.561325][T22648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 891.574767][T24723] device veth0_vlan entered promiscuous mode [ 891.584719][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 891.593300][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 891.600621][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 891.620094][T24723] device veth1_macvtap entered promiscuous mode [ 891.629125][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 891.642277][ T8316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 891.681057][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 891.740474][T24769] device pim6reg1 entered promiscuous mode [ 892.407207][T24848] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 892.427221][T24854] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 49 (only 8 groups) [ 892.573297][T24872] device syzkaller0 entered promiscuous mode [ 893.011052][T24894] device vxcan1 entered promiscuous mode [ 893.468739][T24928] bpf_get_probe_write_proto: 20 callbacks suppressed [ 893.468749][T24928] syz-executor.1[24928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.475501][T24928] syz-executor.1[24928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.512270][T24933] syz-executor.2[24933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.524155][T24933] syz-executor.2[24933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.541873][T24933] syz-executor.2[24933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.553767][T24933] syz-executor.2[24933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.711830][T24945] device sit0 entered promiscuous mode [ 894.055971][T24985] device syzkaller0 entered promiscuous mode [ 894.753370][T25027] device syzkaller0 entered promiscuous mode [ 894.759967][T22657] syzkaller0: tun_net_xmit 48 [ 894.767306][T25027] syzkaller0: create flow: hash 1434936040 index 2 [ 894.829215][T25027] syzkaller0: delete flow: hash 1434936040 index 2 [ 894.856412][T25033] device veth1_macvtap left promiscuous mode [ 895.022556][T25039] : renamed from ipvlan1 [ 895.115483][T25047] device syzkaller0 entered promiscuous mode [ 895.300368][T25061] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 897.705562][T25216] syz-executor.3[25216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 897.705617][T25216] syz-executor.3[25216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 897.812397][T25218] syz-executor.3[25218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 897.836169][T25218] syz-executor.3[25218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 897.980247][T25229] device vxcan1 entered promiscuous mode [ 898.145964][T25247] device pim6reg1 entered promiscuous mode [ 898.271808][T25257] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 899.244277][T25307] device pim6reg1 entered promiscuous mode [ 900.193658][T25352] device pim6reg1 entered promiscuous mode [ 900.787069][T25362] device syzkaller0 entered promiscuous mode [ 900.837349][T25372] device pim6reg1 entered promiscuous mode [ 901.866946][T25470] bpf_get_probe_write_proto: 3 callbacks suppressed [ 901.866956][T25470] syz-executor.2[25470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 901.939710][T25475] syz-executor.3[25475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 901.967655][T25475] syz-executor.3[25475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.019526][T25476] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 902.051027][T25470] syz-executor.2[25470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.052539][T25470] device sit0 left promiscuous mode [ 902.250911][T25498] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 902.347195][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.347243][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.388728][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.400876][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.445534][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.457462][T25506] syz-executor.0[25506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.941935][T25540] device syzkaller0 entered promiscuous mode [ 903.549780][T25566] device veth1_macvtap left promiscuous mode [ 904.358382][T25608] device syzkaller0 entered promiscuous mode [ 905.531796][T25648] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.539575][T25648] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.564847][T25648] device bridge_slave_1 left promiscuous mode [ 905.571590][T25648] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.581508][T25648] device bridge_slave_0 left promiscuous mode [ 905.587781][T25648] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.650728][T25665] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 905.664526][T25661] device pim6reg1 entered promiscuous mode [ 905.684652][T25663] device syzkaller0 entered promiscuous mode [ 905.774006][T25677] device pim6reg1 entered promiscuous mode [ 906.022028][T25711] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 906.051502][T25711] device pim6reg1 entered promiscuous mode [ 906.156009][T25727] device pim6reg1 entered promiscuous mode [ 906.213518][T25733] device syzkaller0 entered promiscuous mode [ 906.672711][T25783] device pim6reg1 entered promiscuous mode [ 907.371864][T25822] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 908.645924][T25947] device syzkaller0 entered promiscuous mode [ 909.032119][T25943] device syzkaller0 entered promiscuous mode [ 909.487987][T26004] device pim6reg1 entered promiscuous mode [ 909.500092][T26008] device pim6reg1 entered promiscuous mode [ 910.110752][T26073] bpf_get_probe_write_proto: 10 callbacks suppressed [ 910.110762][T26073] syz-executor.1[26073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.250489][T26073] syz-executor.1[26073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.263995][T26073] syz-executor.1[26073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.275630][T26073] syz-executor.1[26073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.292631][T26067] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 911.100130][T26147] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 911.136209][T26147] device syzkaller0 entered promiscuous mode [ 911.390835][T26186] syz-executor.4[26186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.391323][T26186] syz-executor.4[26186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.476610][T26205] syz-executor.0[26205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.494845][T26205] syz-executor.0[26205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.549288][T26205] syz-executor.0[26205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 911.562156][T26205] syz-executor.0[26205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 912.045993][T26248] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 912.252520][T26250] device syzkaller0 entered promiscuous mode [ 912.415710][T26259] device syzkaller0 entered promiscuous mode [ 913.593139][T26309] device syzkaller0 entered promiscuous mode [ 913.889795][T26351] device syzkaller0 entered promiscuous mode [ 914.082632][T26369] device pim6reg1 entered promiscuous mode [ 914.343715][T26402] device pim6reg1 entered promiscuous mode [ 914.762584][T26448] device sit0 left promiscuous mode [ 914.825137][T26448] device sit0 entered promiscuous mode [ 915.238809][T26467] device pim6reg1 entered promiscuous mode [ 916.586393][T26506] device veth1_macvtap entered promiscuous mode [ 916.592762][T26506] device macsec0 entered promiscuous mode [ 916.599410][T26333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 917.000619][T26555] device pim6reg1 entered promiscuous mode [ 917.078864][T26564] device syzkaller0 entered promiscuous mode [ 917.219924][T26574] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4095 (only 8 groups) [ 917.401750][T26580] device syzkaller0 entered promiscuous mode [ 917.714640][T26594] device wlan0 entered promiscuous mode [ 917.932396][T26612] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 917.994084][T26616] device syzkaller0 entered promiscuous mode [ 918.058714][T26618] device syzkaller0 entered promiscuous mode [ 918.123970][T26629] bpf_get_probe_write_proto: 6 callbacks suppressed [ 918.123980][T26629] syz-executor.0[26629] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 918.160341][T26632] device syzkaller0 entered promiscuous mode [ 918.332912][T26652] device syzkaller0 entered promiscuous mode [ 918.415306][T26657] device syzkaller0 entered promiscuous mode [ 918.698583][T26684] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 918.766406][T26693] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 919.439172][T26756] syz-executor.0[26756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.439275][T26756] syz-executor.0[26756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.526399][T26760] syz-executor.0[26760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.538099][T26760] syz-executor.0[26760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.560069][T26760] syz-executor.0[26760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.571898][T26760] syz-executor.0[26760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.631742][T26764] syz-executor.0[26764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 919.673717][T26764] syz-executor.0[26764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.132568][T26795] syz-executor.0[26795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.330904][T26799] device syzkaller0 entered promiscuous mode [ 921.333698][T26885] device syzkaller0 entered promiscuous mode [ 921.340577][T26885] syzkaller0: mtu greater than device maximum [ 921.401451][T26891] device pim6reg1 entered promiscuous mode [ 921.508005][T26913] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 923.364612][T27024] device syzkaller0 entered promiscuous mode [ 924.387349][T27100] bpf_get_probe_write_proto: 3 callbacks suppressed [ 924.387356][T27100] syz-executor.1[27100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.394560][T27100] syz-executor.1[27100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.713524][T27123] syz-executor.1[27123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.725755][T27123] syz-executor.1[27123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.791462][T27126] syz-executor.1[27126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 924.803960][T27126] syz-executor.1[27126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 925.579725][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 926.457487][T27206] syz-executor.4[27206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.005405][T27231] device syzkaller0 entered promiscuous mode [ 927.106750][T27246] device sit0 left promiscuous mode [ 927.127903][ T24] audit: type=1400 audit(1719208663.230:186): avc: denied { create } for pid=27245 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 927.739871][T27312] syz-executor.0[27312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.791813][T27321] syz-executor.0[27321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.803972][T27321] syz-executor.0[27321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.870769][T27330] device sit0 left promiscuous mode [ 929.735938][T27453] device pim6reg1 entered promiscuous mode [ 930.483303][T27490] syz-executor.4[27490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.483355][T27490] syz-executor.4[27490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.496329][T27488] erspan0: refused to change device tx_queue_len [ 930.518048][T27490] device veth0_vlan left promiscuous mode [ 930.524047][T27490] device veth0_vlan entered promiscuous mode [ 930.530754][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 930.531870][T27490] syz-executor.4[27490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.538342][T27490] syz-executor.4[27490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 930.538905][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 930.569078][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 930.588510][T27491] device syzkaller0 entered promiscuous mode [ 930.681147][T27503] tun0: tun_chr_ioctl cmd 1074812118 [ 931.478225][T27543] device syzkaller0 entered promiscuous mode [ 932.131340][T27579] geneve1: tun_chr_ioctl cmd 1074025672 [ 932.137403][T27579] geneve1: ignored: set checksum enabled [ 933.587907][T27637] device pim6reg1 entered promiscuous mode [ 933.834692][T27665] device pim6reg1 entered promiscuous mode [ 933.932572][T27675] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 933.938037][T27675] pim6reg0: linktype set to 773 [ 934.378116][T27707] device syzkaller0 entered promiscuous mode [ 934.804236][T27741] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 935.027097][T27763] device syzkaller0 entered promiscuous mode [ 935.561770][T27784] device syzkaller0 entered promiscuous mode [ 935.838087][T27796] syz-executor.1[27796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.838153][T27796] syz-executor.1[27796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 935.912800][T27800] device veth0_macvtap entered promiscuous mode [ 937.614465][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.614513][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.629104][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.640736][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.652747][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.664346][T27927] syz-executor.1[27927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.917808][T27935] syz-executor.1[27935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 937.952037][T27940] ªªªªªª: renamed from vlan0 [ 938.136271][T27947] device syzkaller0 entered promiscuous mode [ 938.474886][T27966] device syzkaller0 entered promiscuous mode [ 938.481353][T22650] syzkaller0: tun_net_xmit 48 [ 938.495490][T27966] syzkaller0: tun_net_xmit 1280 [ 938.585591][T27977] device pim6reg1 entered promiscuous mode [ 938.631348][T27980] device pim6reg1 entered promiscuous mode [ 939.255020][T28001] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 939.897562][T28045] syz-executor.0[28045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 940.343301][T28083] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 940.479036][T28095] device syzkaller0 entered promiscuous mode [ 940.674141][T28120] device sit0 entered promiscuous mode [ 940.930340][T28153] device syzkaller0 entered promiscuous mode [ 941.811748][T28186] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.818713][T28186] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.825892][T28186] device bridge_slave_0 entered promiscuous mode [ 941.832777][T28186] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.839775][T28186] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.847045][T28186] device bridge_slave_1 entered promiscuous mode [ 941.974817][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 941.983372][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 942.008826][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 942.019445][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 942.027479][T26330] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.034321][T26330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 942.041762][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 942.049806][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 942.057696][T26330] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.064441][T26330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 942.071616][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 942.079335][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 942.096362][T28186] device veth0_vlan entered promiscuous mode [ 942.108671][T28186] device veth1_macvtap entered promiscuous mode [ 942.117899][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 942.129859][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 942.137144][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 942.146607][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 942.157072][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 942.165010][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 942.184895][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 942.193496][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 942.509198][T28251] bpf_get_probe_write_proto: 2 callbacks suppressed [ 942.509208][T28251] syz-executor.4[28251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 942.516901][T28251] syz-executor.4[28251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 942.696886][T28262] device syzkaller0 entered promiscuous mode [ 942.917784][T28280] device pim6reg1 entered promiscuous mode [ 942.992644][T28286] syz-executor.3[28286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 942.992692][T28286] syz-executor.3[28286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 943.202779][T28295] tun0: tun_chr_ioctl cmd 1074812118 [ 943.355080][T28312] device pim6reg1 entered promiscuous mode [ 943.584151][T28333] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 3886 (only 8 groups) [ 944.075609][T28376] device pim6reg1 entered promiscuous mode [ 944.314870][T28386] device syzkaller0 entered promiscuous mode [ 945.240582][T28433] device pim6reg1 entered promiscuous mode [ 945.308184][T28436] geneve1: tun_chr_ioctl cmd 21731 [ 946.030094][T28514] device syzkaller0 entered promiscuous mode [ 946.273870][T28542] syz-executor.3[28542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.273918][T28542] syz-executor.3[28542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.427715][T28557] device syzkaller0 entered promiscuous mode [ 946.451616][T28557] syz-executor.2[28557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.451666][T28557] syz-executor.2[28557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.664408][T28570] device syzkaller0 entered promiscuous mode [ 947.047262][T28591] device syzkaller0 entered promiscuous mode [ 947.101562][T28585] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.108476][T28585] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.115720][T28585] device bridge_slave_0 entered promiscuous mode [ 947.122743][T28585] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.129888][T28585] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.137154][T28585] device bridge_slave_1 entered promiscuous mode [ 947.267858][T28585] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.274838][T28585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 947.281913][T28585] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.288703][T28585] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.356915][T26329] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.364446][T26329] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.373536][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 947.380979][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 947.407527][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 947.415798][T26331] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.422649][T26331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.429998][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 947.438015][T26331] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.444869][T26331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 947.452067][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 947.460460][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 947.473522][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 947.492319][T28585] device veth0_vlan entered promiscuous mode [ 947.504373][T26332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 947.528226][T28585] device veth1_macvtap entered promiscuous mode [ 947.535172][T26332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 947.545147][T26332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 947.553581][T26332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 947.606266][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 947.614930][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 947.795017][T28645] syz-executor.0[28645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 947.823672][ T9174] device bridge_slave_1 left promiscuous mode [ 947.847416][ T9174] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.857430][ T9174] device bridge_slave_0 left promiscuous mode [ 947.868884][ T9174] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.877386][ T9174] device veth1_macvtap left promiscuous mode [ 947.884381][ T9174] device veth0_vlan left promiscuous mode [ 949.847247][T28771] device syzkaller0 entered promiscuous mode [ 950.022002][T28788] syz-executor.4[28788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.022051][T28788] syz-executor.4[28788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.280574][T28810] device syzkaller0 entered promiscuous mode [ 950.397196][T28821] syz-executor.3[28821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 950.397248][T28821] syz-executor.3[28821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.168677][T28869] device pim6reg1 entered promiscuous mode [ 951.391365][T28890] device syzkaller0 entered promiscuous mode [ 951.565395][T28904] syz-executor.4[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.565450][T28904] syz-executor.4[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.579809][T28906] device syzkaller0 entered promiscuous mode [ 951.619272][T28904] syz-executor.4[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 951.619442][T28904] syz-executor.4[28904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 952.066081][T28949] syz-executor.3[28949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 952.810425][T28975] device pim6reg1 entered promiscuous mode [ 952.871283][T28980] device veth1_macvtap left promiscuous mode [ 952.877238][T28980] device macsec0 left promiscuous mode [ 953.678635][T29025] bpf_get_probe_write_proto: 1 callbacks suppressed [ 953.678645][T29025] syz-executor.4[29025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.688772][T29025] syz-executor.4[29025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 953.755243][T29031] device syzkaller0 entered promiscuous mode [ 954.322722][T29059] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 954.580172][T29095] bridge0: port 3(vlan1) entered blocking state [ 954.586235][T29095] bridge0: port 3(vlan1) entered disabled state [ 954.593552][T29095] device vlan1 entered promiscuous mode [ 954.600059][T29095] bridge0: port 3(vlan1) entered blocking state [ 954.606215][T29095] bridge0: port 3(vlan1) entered forwarding state [ 954.868259][T29124] geneve1: tun_chr_ioctl cmd 1074025681 [ 954.949778][T29137] device pim6reg1 entered promiscuous mode [ 955.211423][T29169] bridge0: port 3(vlan1) entered disabled state [ 955.218011][T29169] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.226052][T29169] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.322013][T29180] device vlan1 left promiscuous mode [ 955.328467][T29180] bridge0: port 3(vlan1) entered disabled state [ 955.337684][T29180] device bridge_slave_1 left promiscuous mode [ 955.344168][T29180] bridge0: port 2(bridge_slave_1) entered disabled state [ 955.352604][T29180] device bridge_slave_0 left promiscuous mode [ 955.359433][T29180] bridge0: port 1(bridge_slave_0) entered disabled state [ 955.566124][T29186] device syzkaller0 entered promiscuous mode [ 955.786517][T29218] syz-executor.1[29218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 955.786570][T29218] syz-executor.1[29218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 955.869981][T29230] tap0: tun_chr_ioctl cmd 1074025677 [ 955.887035][T29230] tap0: linktype set to 774 [ 956.099909][T29264] syz-executor.4[29264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.099960][T29264] syz-executor.4[29264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.115552][T29263] device pim6reg1 entered promiscuous mode [ 956.133896][T29264] syz-executor.4[29264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.133943][T29264] syz-executor.4[29264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 956.146595][T29264] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 956.722946][T29305] device syzkaller0 entered promiscuous mode [ 957.088832][T29318] device veth1_macvtap left promiscuous mode [ 958.459668][T29407] Q±6ã×\b‹¡Y­4: renamed from lo [ 958.757656][T29434] device syzkaller0 entered promiscuous mode [ 958.881676][T29445] syz-executor.2[29445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 958.881723][T29445] syz-executor.2[29445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.354701][T29505] device pim6reg1 entered promiscuous mode [ 960.625883][T29523] syz-executor.1[29523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.625983][T29523] syz-executor.1[29523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 960.917312][T29551] device syzkaller0 entered promiscuous mode [ 961.212008][T29575] Â: renamed from pim6reg1 [ 962.511153][T29625] O3ãc¤±: renamed from bridge_slave_0 [ 962.783472][T29635] device syzkaller0 entered promiscuous mode [ 963.276193][T29676] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 964.215552][T29772] bridge0: port 3(dummy0) entered blocking state [ 964.221853][T29772] bridge0: port 3(dummy0) entered disabled state [ 964.228413][T29772] device dummy0 entered promiscuous mode [ 964.234019][T29772] bridge0: port 3(dummy0) entered blocking state [ 964.240176][T29772] bridge0: port 3(dummy0) entered forwarding state [ 964.278170][T29786] syz-executor.0[29786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.524132][T29819] device syzkaller0 entered promiscuous mode [ 964.727488][T29841] device syzkaller0 entered promiscuous mode [ 965.005675][T29878] device syzkaller0 entered promiscuous mode [ 965.111188][T29887] syz-executor.0[29887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.111236][T29887] syz-executor.0[29887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.604585][T29935] syz-executor.0[29935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.617240][T29935] syz-executor.0[29935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 966.872970][T29970] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1025 (only 8 groups) [ 967.456834][T30032] device pim6reg1 entered promiscuous mode [ 968.077067][T30069] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 968.581449][T30102] device pim6reg1 entered promiscuous mode [ 969.925200][T30231] device pim6reg1 entered promiscuous mode [ 969.962351][T30241] device syzkaller0 entered promiscuous mode [ 969.984893][T30237] device syzkaller0 entered promiscuous mode [ 970.061893][T30252] syz-executor.0[30252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.061949][T30252] syz-executor.0[30252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.103953][T30252] syz-executor.0[30252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.119491][T30252] syz-executor.0[30252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.294271][T30277] syz-executor.0[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.305934][T30277] syz-executor.0[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.318653][T30277] syz-executor.0[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.330333][T30277] syz-executor.0[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.497948][T30294] device pim6reg1 entered promiscuous mode [ 972.582375][T30441] device pim6reg1 entered promiscuous mode [ 973.214661][T30485] syz-executor.0[30485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 973.214706][T30485] syz-executor.0[30485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 974.547138][T30591] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 975.346170][T30595] bpf_get_probe_write_proto: 2 callbacks suppressed [ 975.346180][T30595] syz-executor.0[30595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 975.354370][T30595] syz-executor.0[30595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 976.032594][T30630] device syzkaller0 entered promiscuous mode [ 976.082061][T30635] device syzkaller0 entered promiscuous mode [ 976.088688][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 976.331318][T30668] device pim6reg1 entered promiscuous mode [ 976.630917][T30689] tun0: tun_chr_ioctl cmd 1074025675 [ 976.636072][T30689] tun0: persist disabled [ 976.888017][T30704] device veth0_vlan left promiscuous mode [ 976.898643][T30704] device veth0_vlan entered promiscuous mode [ 976.925551][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 976.938491][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 976.947472][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 977.693667][T30763] device wg2 entered promiscuous mode [ 977.760984][T30774] syz-executor.2[30774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 977.761031][T30774] syz-executor.2[30774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 978.023029][T30800] device pim6reg1 entered promiscuous mode [ 978.043549][T30796] device veth0_vlan left promiscuous mode [ 978.054554][T30796] device veth0_vlan entered promiscuous mode [ 978.064248][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 978.074199][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 978.088620][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 978.106467][T30804] device syzkaller0 entered promiscuous mode [ 978.118752][T30804] device veth0_vlan left promiscuous mode [ 978.124792][T30804] device veth0_vlan entered promiscuous mode [ 978.914943][T30845] device syzkaller0 entered promiscuous mode [ 979.109255][T30856] device syzkaller0 entered promiscuous mode [ 980.012519][T30900] device pim6reg1 entered promiscuous mode [ 980.223777][T30918] syz-executor.4[30918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.223827][T30918] syz-executor.4[30918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.244037][T30918] syz-executor.4[30918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.256396][T30918] syz-executor.4[30918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.309441][T30918] device pim6reg1 entered promiscuous mode [ 980.331170][T30920] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 980.394231][T30928] syz-executor.2[30928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 980.394292][T30928] syz-executor.2[30928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 981.056573][T30954] device syzkaller0 entered promiscuous mode [ 981.603242][T30987] device lo entered promiscuous mode [ 982.278863][T31017] syz-executor.4[31017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 982.278909][T31017] syz-executor.4[31017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 983.506827][T31058] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.533126][T31058] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.543066][T31058] device bridge_slave_0 entered promiscuous mode [ 983.584081][T31058] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.599304][T31058] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.606567][T31058] device bridge_slave_1 entered promiscuous mode [ 983.679857][T31071] €Â: renamed from pim6reg1 [ 983.703358][T31068] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.711723][T31068] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.719059][T31068] device bridge_slave_0 entered promiscuous mode [ 983.725977][T31071] €Â0: renamed from pim6reg1 [ 983.737847][T31068] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.744722][T31068] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.751938][T31068] device bridge_slave_1 entered promiscuous mode [ 983.763775][T31058] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.770746][T31058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 983.777823][T31058] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.784633][T31058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 983.884222][T31068] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.891092][T31068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 983.898165][T31068] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.904979][T31068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 983.913210][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 983.922031][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 983.930105][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 983.938686][T26329] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.945631][T26329] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.952932][T31087] syz-executor.4[31087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 983.952989][T31087] syz-executor.4[31087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 983.989178][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 984.009256][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 984.029195][T31086] device pim6reg1 entered promiscuous mode [ 984.036152][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 984.058665][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 984.070220][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 984.078356][T26329] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.085186][T26329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 984.096175][T31058] device veth0_vlan entered promiscuous mode [ 984.103110][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 984.111434][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 984.119204][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 984.143389][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 984.153042][T22659] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.159915][T22659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 984.167945][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 984.190755][T31058] device veth1_macvtap entered promiscuous mode [ 984.199100][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 984.207221][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 984.215495][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 984.230919][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 984.241978][T31068] device veth0_vlan entered promiscuous mode [ 984.248290][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 984.256153][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 984.268804][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 984.277848][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 984.297268][T31068] device veth1_macvtap entered promiscuous mode [ 984.307783][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 984.316906][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 984.325948][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 984.334800][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 984.342918][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 984.366350][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 984.375037][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 984.383516][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 984.392030][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 984.600499][T31128] syz-executor.2[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 984.600545][T31128] syz-executor.2[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 984.631629][T31128] syz-executor.2[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 984.644579][T31128] syz-executor.2[31128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 985.120290][T31167] device pim6reg1 entered promiscuous mode [ 985.172957][T31167] device vxcan1 entered promiscuous mode [ 985.361007][T31183] device pim6reg1 entered promiscuous mode [ 985.619706][T31201] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 985.878763][T31226] device syzkaller0 entered promiscuous mode [ 986.253923][T31264] device syzkaller0 entered promiscuous mode [ 986.902187][T31340] geneve1: tun_chr_ioctl cmd 1074025681 [ 987.250484][T31372] syz-executor.2[31372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 987.250537][T31372] syz-executor.2[31372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 987.519528][T31400] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.538132][T31400] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.099535][T31449] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 989.165289][T31534] syz-executor.2[31534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.165394][T31534] syz-executor.2[31534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.577292][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.604498][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.629545][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.661008][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.677661][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.691365][T31553] syz-executor.4[31553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 989.859983][T31567] device syzkaller0 entered promiscuous mode [ 990.010745][T31574] €Â: renamed from pim6reg1 [ 990.383391][T31597] device pim6reg1 entered promiscuous mode [ 990.570677][T31609] device syzkaller0 entered promiscuous mode [ 992.074087][T31692] device vxcan1 entered promiscuous mode [ 992.387109][T31720] bpf_get_probe_write_proto: 15 callbacks suppressed [ 992.387118][T31720] syz-executor.2[31720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 992.397388][T31720] syz-executor.2[31720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.409087][T31827] syz-executor.4[31827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.424456][T31827] syz-executor.4[31827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 994.921155][T31907] device veth1_macvtap left promiscuous mode [ 994.960834][T31907] device macsec0 left promiscuous mode [ 997.357571][T32029] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 997.564885][T32039] device syzkaller0 entered promiscuous mode [ 998.521146][T32106] syz-executor.0[32106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.521193][T32106] syz-executor.0[32106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.621254][T32114] device syzkaller0 entered promiscuous mode [ 1001.610706][T32371] device syzkaller0 entered promiscuous mode [ 1002.005081][T32409] syz-executor.1[32409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.005181][T32409] syz-executor.1[32409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1002.118146][T32412] device syzkaller0 entered promiscuous mode [ 1002.367982][T32425] device pim6reg1 entered promiscuous mode [ 1002.607447][T32435] device syzkaller0 entered promiscuous mode [ 1002.838389][T32446] device veth1_macvtap entered promiscuous mode [ 1002.846959][T32446] device macsec0 entered promiscuous mode [ 1002.853627][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1002.921173][T32455] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1002.963269][T32455] device pim6reg1 entered promiscuous mode [ 1002.982940][T32459] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1003.696511][T32505] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 1003.828985][T32508] syz-executor.4[32508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.829037][T32508] syz-executor.4[32508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.886613][T32512] device syzkaller0 entered promiscuous mode [ 1004.351752][T32540] device pim6reg1 entered promiscuous mode [ 1004.414889][T32545] syz-executor.0[32545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.414939][T32545] syz-executor.0[32545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.457076][T32549] device wg2 left promiscuous mode [ 1004.485014][T32549] device wg2 entered promiscuous mode [ 1004.494983][T32547] device pim6reg1 entered promiscuous mode [ 1004.703924][T32576] device syzkaller0 entered promiscuous mode [ 1004.929776][T32597] syz-executor.0[32597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.929828][T32597] syz-executor.0[32597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.947812][T32597] syz-executor.0[32597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.959805][T32597] syz-executor.0[32597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1005.067027][T32602] ªªªªªª: renamed from vlan0 [ 1005.143129][T32606] device syzkaller0 entered promiscuous mode [ 1005.534925][T32630] syz-executor.0[32630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1005.534976][T32630] syz-executor.0[32630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1005.911196][T32668] device pim6reg1 entered promiscuous mode [ 1006.857058][T32737] device syzkaller0 entered promiscuous mode [ 1006.865707][T26329] syzkaller0: tun_net_xmit 48 [ 1006.873762][T32737] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 1006.879556][T32737] syzkaller0: Linktype set failed because interface is up [ 1007.351464][T32758] device pim6reg1 entered promiscuous mode [ 1008.008411][ T358] gretap0: refused to change device tx_queue_len [ 1008.880810][ T395] device pim6reg1 entered promiscuous mode [ 1009.020324][ T408] device pim6reg1 entered promiscuous mode [ 1009.266050][ T445] device syzkaller0 entered promiscuous mode [ 1009.776029][ T489] bpf_get_probe_write_proto: 4 callbacks suppressed [ 1009.776039][ T489] syz-executor.2[489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.782760][ T489] syz-executor.2[489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1010.051447][ T501] device syzkaller0 entered promiscuous mode [ 1010.269346][ T530] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4095 (only 8 groups) [ 1010.381986][ T539] device pim6reg1 entered promiscuous mode [ 1010.457428][ T547] device veth1_macvtap left promiscuous mode [ 1010.466567][ T547] device veth1_macvtap entered promiscuous mode [ 1010.472816][ T547] device macsec0 entered promiscuous mode [ 1010.506202][ T551] device pim6reg1 entered promiscuous mode [ 1010.550792][ T555] device pim6reg1 entered promiscuous mode [ 1010.693058][ T576] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1011.258084][ T621] device syzkaller0 entered promiscuous mode [ 1011.516493][ T633] device syzkaller0 entered promiscuous mode [ 1011.928778][ T673] syz-executor.4[673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1011.928825][ T673] syz-executor.4[673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.042272][ T680] syz-executor.2[680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.057935][ T680] syz-executor.2[680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1012.709017][ T693] device pim6reg1 entered promiscuous mode [ 1014.694750][ T864] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.708326][ T864] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.715693][ T864] device bridge_slave_0 entered promiscuous mode [ 1014.722589][ T864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.729846][ T864] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.737089][ T864] device bridge_slave_1 entered promiscuous mode [ 1014.788129][ T864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.795002][ T864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1014.802076][ T864] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.808875][ T864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1014.832147][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1014.840868][T22647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.847987][T22647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.869570][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1014.877558][T22647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.884393][T22647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1014.902739][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1014.912127][T22647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.918997][T22647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1014.930202][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1014.937944][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1014.957766][ T864] device veth0_vlan entered promiscuous mode [ 1014.966637][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1014.980436][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1014.995237][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1015.011189][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1015.029248][ T864] device veth1_macvtap entered promiscuous mode [ 1015.041276][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1015.050111][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1015.059519][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1015.075747][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1015.083898][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1015.095177][ T898] device pim6reg1 entered promiscuous mode [ 1015.101545][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1015.109944][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1015.193325][ T913] device veth1_macvtap entered promiscuous mode [ 1015.412910][ T942] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1015.497882][ T950] device pim6reg1 entered promiscuous mode [ 1015.574186][ T950] tap0: tun_chr_ioctl cmd 2147767511 [ 1015.750042][ T973] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1015.971092][ T997] syz-executor.0[997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1015.971148][ T997] syz-executor.0[997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1016.017837][ T1002] device wg2 left promiscuous mode [ 1016.074376][ T1000] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.081420][ T1000] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.088758][ T1000] device bridge_slave_0 entered promiscuous mode [ 1016.095706][ T1000] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.128494][ T1000] bridge0: port 2(bridge_slave_1) entered disabled state [ 1016.147672][ T1000] device bridge_slave_1 entered promiscuous mode [ 1016.200688][ T1021] device syzkaller0 entered promiscuous mode [ 1016.274974][ T1000] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.281968][ T1000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1016.289055][ T1000] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.295805][ T1000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1016.325941][T26334] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.333226][T26334] bridge0: port 2(bridge_slave_1) entered disabled state [ 1016.340408][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1016.347618][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1016.360058][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1016.368122][T26334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.374970][T26334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1016.383435][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1016.391663][T26334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.398510][T26334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1016.421154][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1016.429802][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1016.447458][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1016.473562][ T1048] syz-executor.0[1048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1016.473621][ T1048] syz-executor.0[1048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1016.475486][ T1000] device veth0_vlan entered promiscuous mode [ 1016.505308][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1016.531737][ T1000] device veth1_macvtap entered promiscuous mode [ 1016.539062][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1016.547147][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1016.555530][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1016.573822][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1016.582379][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1016.758382][ T1061] device pim6reg1 entered promiscuous mode [ 1017.274315][ T1088] syz-executor.0[1088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1017.274374][ T1088] syz-executor.0[1088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1017.508009][ T1097] cgroup: fork rejected by pids controller in /syz3 [ 1018.575088][ T1365] device syzkaller0 entered promiscuous mode [ 1019.199446][ T1385] device syzkaller0 entered promiscuous mode [ 1020.065849][ T1455] device pim6reg1 entered promiscuous mode [ 1020.456143][ T1478] device vxcan1 entered promiscuous mode [ 1020.594554][ T1492] syz-executor.0[1492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1020.594604][ T1492] syz-executor.0[1492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.003819][ T1503] syz-executor.0[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.027637][ T1503] syz-executor.0[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.049662][ T1503] syz-executor.0[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.077431][ T1503] syz-executor.0[1503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.380941][ T1517] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 1021.492958][ T1520] device syzkaller0 entered promiscuous mode [ 1021.501171][T26334] syzkaller0: tun_net_xmit 48 [ 1021.508788][ T1520] syzkaller0: create flow: hash 1434936040 index 2 [ 1021.521031][ T1520] syzkaller0: delete flow: hash 1434936040 index 2 [ 1021.527781][ T1526] syz-executor.2[1526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.527827][ T1526] syz-executor.2[1526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.759391][ T1536] syz-executor.4[1536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1021.770927][ T1536] syz-executor.4[1536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1022.944917][ T1620] device pim6reg1 entered promiscuous mode [ 1023.699174][ T1675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1023.711833][ T1675] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.723676][ T1675] device bridge_slave_0 entered promiscuous mode [ 1023.740506][ T1675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.750686][ T1675] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.763653][ T1675] device bridge_slave_1 entered promiscuous mode [ 1023.831053][ T1675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.837919][ T1675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1023.845011][ T1675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1023.851790][ T1675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1023.889155][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1023.896880][T22659] bridge0: port 1(bridge_slave_0) entered disabled state [ 1023.905266][T22659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1023.921167][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1023.929825][T22653] bridge0: port 1(bridge_slave_0) entered blocking state [ 1023.936688][T22653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1023.946206][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1023.954460][T22653] bridge0: port 2(bridge_slave_1) entered blocking state [ 1023.961305][T22653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1023.980478][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1023.988470][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1024.006458][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1024.021383][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1024.030366][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1024.038745][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1024.046545][ T1675] device veth0_vlan entered promiscuous mode [ 1024.062214][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1024.073056][ T1675] device veth1_macvtap entered promiscuous mode [ 1024.086927][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1024.099660][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1024.326587][ T9174] device bridge_slave_1 left promiscuous mode [ 1024.334825][ T9174] bridge0: port 2(bridge_slave_1) entered disabled state [ 1024.350275][ T9174] device bridge_slave_0 left promiscuous mode [ 1024.360689][ T9174] bridge0: port 1(bridge_slave_0) entered disabled state [ 1024.369480][ T9174] device veth1_macvtap left promiscuous mode [ 1024.579591][ T1708] device syzkaller0 entered promiscuous mode [ 1024.762229][ T1718] syz-executor.2[1718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1024.762284][ T1718] syz-executor.2[1718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1025.187095][ T1755] device syzkaller0 left promiscuous mode [ 1025.426303][ T1771] device syzkaller0 entered promiscuous mode [ 1026.040622][ T1797] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1026.040653][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.096403][ T1793] device pim6reg1 entered promiscuous mode [ 1026.108286][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.348101][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.448634][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.504896][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.516997][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.545521][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.559322][ T1797] syz-executor.2[1797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1026.741578][ T1825] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.760008][ T1825] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.860274][ T1833] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1026.900954][ T1839] bridge_slave_0: mtu greater than device maximum [ 1027.308076][ T1864] device syzkaller0 entered promiscuous mode [ 1027.623372][ T1896] device pim6reg1 entered promiscuous mode [ 1027.703865][ T1908] device syzkaller0 entered promiscuous mode [ 1028.781538][ T1961] syz-executor.1[1961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1028.781634][ T1961] syz-executor.1[1961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1029.270183][ T1997] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1029.868651][ T2017] device syzkaller0 entered promiscuous mode [ 1030.415657][ T2039] device syzkaller0 entered promiscuous mode [ 1031.304388][ T2099] device syzkaller0 entered promiscuous mode [ 1031.659076][ T2133] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.666231][ T2133] bridge0: port 1(bridge_slave_0) entered disabled state [ 1031.673671][ T2133] device bridge_slave_0 entered promiscuous mode [ 1031.680499][ T2133] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.687356][ T2133] bridge0: port 2(bridge_slave_1) entered disabled state [ 1031.694747][ T2133] device bridge_slave_1 entered promiscuous mode [ 1031.862083][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1031.869575][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1031.888906][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1031.897109][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1031.906002][T22653] bridge0: port 1(bridge_slave_0) entered blocking state [ 1031.912843][T22653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1031.920331][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1031.928902][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1031.937131][T22653] bridge0: port 2(bridge_slave_1) entered blocking state [ 1031.943973][T22653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1031.951263][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1031.959848][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1031.967249][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1031.993990][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1032.010008][ T2133] device veth0_vlan entered promiscuous mode [ 1032.021639][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1032.031216][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1032.038500][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1032.051974][ T2133] device veth1_macvtap entered promiscuous mode [ 1032.059449][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1032.077425][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1032.086044][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1032.095170][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1032.103657][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1032.499566][ T9] device bridge_slave_1 left promiscuous mode [ 1032.507837][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1032.528857][ T9] device bridge_slave_0 left promiscuous mode [ 1032.534807][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1032.542986][ T9] device veth1_macvtap left promiscuous mode [ 1032.548894][ T9] device veth0_vlan left promiscuous mode [ 1032.945617][ T2218] bridge_slave_0: mtu greater than device maximum [ 1033.698940][ T2267] device syzkaller0 entered promiscuous mode [ 1034.344114][ T2316] device syzkaller0 entered promiscuous mode [ 1034.602264][ T2339] bpf_get_probe_write_proto: 6 callbacks suppressed [ 1034.602273][ T2339] syz-executor.0[2339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1034.608827][ T2339] syz-executor.0[2339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1034.796224][ T2357] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 2147483648 (only 8 groups) [ 1035.108912][ T2368] device veth0_vlan left promiscuous mode [ 1035.129856][ T2368] device veth0_vlan entered promiscuous mode [ 1035.775998][ T2396] device syzkaller0 entered promiscuous mode [ 1035.980700][ T2411] device syzkaller0 entered promiscuous mode [ 1035.995606][ T2411] device pim6reg1 entered promiscuous mode [ 1036.626691][ T2446] syz-executor.4[2446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1036.626745][ T2446] syz-executor.4[2446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1038.224002][ T2525] device pim6reg1 entered promiscuous mode [ 1038.316915][ T2529] device vxcan1 entered promiscuous mode [ 1038.345803][ T2528] device veth0_vlan left promiscuous mode [ 1038.355058][ T2528] device veth0_vlan entered promiscuous mode [ 1039.061631][ T2591] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1039.612598][ T2616] syz-executor.1[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1039.612957][ T2616] syz-executor.1[2616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1039.770014][ T2622] ¯Ê®¸}p: renamed from pim6reg1 [ 1040.065588][ T2648] device syzkaller0 entered promiscuous mode [ 1041.158515][ T2717] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1041.450654][ T2746] syz-executor.2[2746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1041.450699][ T2746] syz-executor.2[2746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1041.525002][ T2750] device pim6reg1 entered promiscuous mode [ 1041.594192][ T2757] syz-executor.0[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1041.594263][ T2757] syz-executor.0[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1042.570956][ T2812] device syzkaller0 entered promiscuous mode [ 1045.239191][ T2924] device pim6reg1 entered promiscuous mode [ 1045.454718][ T2947] syz-executor.2[2947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.454768][ T2947] syz-executor.2[2947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1045.477542][ T2946] device syzkaller0 entered promiscuous mode [ 1045.495706][ T2947] device pim6reg1 entered promiscuous mode [ 1045.586192][ T2957] device pim6reg1 entered promiscuous mode [ 1045.800103][ T2971] device syzkaller0 entered promiscuous mode [ 1046.824945][ T3013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.835277][ T3013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.847823][ T3013] device bridge_slave_0 entered promiscuous mode [ 1046.854822][ T3013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.861826][ T3013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.869460][ T3013] device bridge_slave_1 entered promiscuous mode [ 1046.933705][ T3013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.940587][ T3013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.947641][ T3013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.954446][ T3013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.982445][T26333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.990896][T26333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.997961][T26333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.015708][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1047.023991][T26329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.030834][T26329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1047.038603][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1047.046538][T26329] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.053375][T26329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1047.068842][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1047.076605][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1047.112519][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1047.121448][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1047.129774][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1047.137061][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1047.146299][ T3013] device veth0_vlan entered promiscuous mode [ 1047.165114][ T3013] device veth1_macvtap entered promiscuous mode [ 1047.172530][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1047.188499][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1047.196963][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1047.431976][ T3022] device syzkaller0 entered promiscuous mode [ 1047.449617][ T9] device bridge_slave_1 left promiscuous mode [ 1047.455580][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.463163][ T9] device bridge_slave_0 left promiscuous mode [ 1047.472723][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.480758][ T9] device veth1_macvtap left promiscuous mode [ 1047.991337][ T3058] device syzkaller0 entered promiscuous mode [ 1048.775407][ T3060] device syzkaller0 entered promiscuous mode [ 1049.118183][ T3071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.125378][ T3071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.132839][ T3071] device bridge_slave_0 entered promiscuous mode [ 1049.140014][ T3071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.146846][ T3071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.154379][ T3071] device bridge_slave_1 entered promiscuous mode [ 1049.172626][ T3082] syz-executor.0[3082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.172678][ T3082] syz-executor.0[3082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1049.237650][ T3071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.255947][ T3071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1049.263158][ T3071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.269944][ T3071] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1049.297040][T26333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1049.306052][T26333] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.313240][T26333] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.344535][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1049.352753][T26330] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.359687][T26330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1049.388334][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1049.396300][T26330] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.403137][T26330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1049.410337][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1049.426428][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1049.446294][ T3071] device veth0_vlan entered promiscuous mode [ 1049.453847][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1049.462499][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1049.471615][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1049.479316][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1049.494337][ T3071] device veth1_macvtap entered promiscuous mode [ 1049.507022][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1049.520267][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1049.544774][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1049.839664][ T3114] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1049.855064][ T3114] device syzkaller0 entered promiscuous mode [ 1049.871972][ T3109] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.885175][ T3109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.894093][ T3109] device bridge_slave_0 entered promiscuous mode [ 1049.902742][ T3109] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.909808][ T3109] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.917123][ T3109] device bridge_slave_1 entered promiscuous mode [ 1050.006756][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1050.014471][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1050.044090][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1050.053249][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1050.061302][T26327] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.068147][T26327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.081787][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1050.093913][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1050.103253][T26327] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.110121][T26327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.119575][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1050.127836][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1050.151798][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1050.196424][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1050.210327][ T3109] device veth0_vlan entered promiscuous mode [ 1050.216673][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1050.227102][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1050.234789][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1050.250999][ T3109] device veth1_macvtap entered promiscuous mode [ 1050.257917][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1050.272205][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1050.293771][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1050.322057][ T9] device bridge_slave_1 left promiscuous mode [ 1050.328036][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.335962][ T9] device bridge_slave_0 left promiscuous mode [ 1050.343936][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.354429][ T9] device veth1_macvtap left promiscuous mode [ 1050.361039][ T9] device veth0_vlan left promiscuous mode [ 1050.569674][ T3165] syz-executor.1[3165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1050.577973][ T3161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.597637][ T3161] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.605241][ T3161] device bridge_slave_0 entered promiscuous mode [ 1050.612776][ T3161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.619720][ T3161] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.628359][ T3161] device bridge_slave_1 entered promiscuous mode [ 1050.685605][ T3161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.692560][ T3161] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.699633][ T3161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.706418][ T3161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.757581][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1050.766748][T26331] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.776693][T26331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1050.801972][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1050.811118][T26334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.817985][T26334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1050.830015][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1050.838592][T26334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1050.845436][T26334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1050.854875][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1050.864972][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1050.894475][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1050.906264][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1050.930834][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1050.945282][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1050.959388][ T3161] device veth0_vlan entered promiscuous mode [ 1050.980513][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1051.004262][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1051.024126][ T3161] device veth1_macvtap entered promiscuous mode [ 1051.049325][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1051.059308][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1051.075563][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1051.108191][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1051.125870][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1051.460636][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.471376][ T3190] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.479829][ T3190] device bridge_slave_0 entered promiscuous mode [ 1051.495900][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.504576][ T3190] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.512377][ T3190] device bridge_slave_1 entered promiscuous mode [ 1051.542289][ T3194] device syzkaller0 entered promiscuous mode [ 1051.575708][ T9] device bridge_slave_1 left promiscuous mode [ 1051.581773][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.589244][ T9] device bridge_slave_0 left promiscuous mode [ 1051.595172][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.603048][ T9] device veth1_macvtap left promiscuous mode [ 1051.608944][ T9] device veth0_vlan left promiscuous mode [ 1051.711995][ T3206] device pim6reg1 entered promiscuous mode [ 1051.738770][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.745618][ T3190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.752733][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.759510][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.786433][ T3210] device pim6reg1 entered promiscuous mode [ 1051.798452][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1051.806593][T22647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1051.813840][T22647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.841105][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1051.849407][T22647] bridge0: port 1(bridge_slave_0) entered blocking state [ 1051.856245][T22647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1051.863837][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1051.872241][T22647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.879090][T22647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1051.895384][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1051.903398][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1051.921352][T26330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1051.935868][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1051.944313][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1051.952868][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1051.963388][ T3190] device veth0_vlan entered promiscuous mode [ 1052.029383][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1052.037348][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1052.050612][ T3190] device veth1_macvtap entered promiscuous mode [ 1052.084633][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1052.094038][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1052.104651][ T3221] syz-executor.4[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.104701][ T3221] syz-executor.4[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.125932][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1052.169698][ T3221] syz-executor.4[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.169750][ T3221] syz-executor.4[3221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1052.198172][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1052.228793][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1052.623623][ T3245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1052.631033][ T3245] bridge0: port 1(bridge_slave_0) entered disabled state [ 1052.640120][ T3245] device bridge_slave_0 entered promiscuous mode [ 1052.647059][ T3245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1052.653994][ T3245] bridge0: port 2(bridge_slave_1) entered disabled state [ 1052.661226][ T3245] device bridge_slave_1 entered promiscuous mode [ 1052.775392][ T3245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1052.782252][ T3245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1052.789365][ T3245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1052.796121][ T3245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1052.841450][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1052.849895][T22647] bridge0: port 1(bridge_slave_0) entered disabled state [ 1052.857089][T22647] bridge0: port 2(bridge_slave_1) entered disabled state [ 1052.871954][ T9] device bridge_slave_1 left promiscuous mode [ 1052.884441][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1052.893521][ T9] device bridge_slave_0 left promiscuous mode [ 1052.899650][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1052.907599][ T9] device veth1_macvtap left promiscuous mode [ 1052.915743][ T9] device veth0_vlan left promiscuous mode [ 1053.025117][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1053.034653][T22659] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.041536][T22659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1053.050709][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1053.060426][T22659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.067268][T22659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1053.074601][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1053.082385][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1053.102638][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1053.112607][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1053.127775][ T3245] device veth0_vlan entered promiscuous mode [ 1053.136952][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1053.144775][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1053.153454][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1053.160784][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1053.176499][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1053.185265][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1053.194815][ T3245] device veth1_macvtap entered promiscuous mode [ 1053.212202][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1053.220788][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1053.229233][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1053.251199][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1053.267446][T22647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1053.597684][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.606315][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.613840][ T3314] device bridge_slave_0 entered promiscuous mode [ 1053.619441][ T3315] syz-executor.2[3315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.620015][ T3315] syz-executor.2[3315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1053.621296][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.650097][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.657431][ T3314] device bridge_slave_1 entered promiscuous mode [ 1053.749615][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.756474][ T3314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1053.763580][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.770388][ T3314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1053.825409][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1053.843842][T26328] bridge0: port 1(bridge_slave_0) entered disabled state [ 1053.857160][T26328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1053.876611][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1053.892806][T26331] bridge0: port 1(bridge_slave_0) entered blocking state [ 1053.899662][T26331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1053.907931][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1053.917053][T26331] bridge0: port 2(bridge_slave_1) entered blocking state [ 1053.923908][T26331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1053.949115][ T3333] device veth1_macvtap left promiscuous mode [ 1053.969178][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1053.997855][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1054.186766][ T3344] device syzkaller0 entered promiscuous mode [ 1054.207913][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1054.226820][ T3354] device syzkaller0 entered promiscuous mode [ 1054.238653][ T3314] device veth0_vlan entered promiscuous mode [ 1054.261026][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1054.268879][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1054.285899][ T3314] device veth1_macvtap entered promiscuous mode [ 1054.292507][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1054.300009][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1054.307391][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1054.315319][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1054.323425][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1054.343407][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1054.352397][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1054.373857][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1054.384853][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1054.407732][ T3358] device pim6reg1 entered promiscuous mode [ 1054.511422][ T9] device bridge_slave_1 left promiscuous mode [ 1054.517449][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.548722][ T9] device bridge_slave_0 left promiscuous mode [ 1054.554658][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.562872][ T9] device bridge_slave_1 left promiscuous mode [ 1054.568868][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.576197][ T9] device bridge_slave_0 left promiscuous mode [ 1054.582213][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.591166][ T9] device veth1_macvtap left promiscuous mode [ 1054.631093][ T9] device veth0_vlan left promiscuous mode [ 1054.636883][ T9] device veth1_macvtap left promiscuous mode [ 1054.642777][ T9] device veth0_vlan left promiscuous mode [ 1054.915371][ T3378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1054.922691][ T3378] bridge0: port 1(bridge_slave_0) entered disabled state [ 1054.930419][ T3378] device bridge_slave_0 entered promiscuous mode [ 1054.938747][ T3378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1054.945633][ T3378] bridge0: port 2(bridge_slave_1) entered disabled state [ 1054.953098][ T3378] device bridge_slave_1 entered promiscuous mode [ 1055.005026][ T3378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.011893][ T3378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.018982][ T3378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.025750][ T3378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.052979][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1055.061560][T22650] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.068948][T22650] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.087342][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1055.095785][T22643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.102652][T22643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.110134][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1055.118177][T22643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.125055][T22643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.149481][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1055.157309][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1055.173894][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1055.186422][ T3378] device veth0_vlan entered promiscuous mode [ 1055.193837][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1055.205284][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1055.215643][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1055.233693][ T3378] device veth1_macvtap entered promiscuous mode [ 1055.242085][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1055.250650][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1055.258701][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1055.276314][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1055.284706][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1055.293245][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1055.301586][T22650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1055.651688][ T3412] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.658671][ T3412] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.665736][ T3412] device bridge_slave_0 entered promiscuous mode [ 1055.672592][ T3412] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.679473][ T3412] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.686572][ T3412] device bridge_slave_1 entered promiscuous mode [ 1055.746075][ T3412] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.752955][ T3412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.760199][ T3412] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.766982][ T3412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.824122][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1055.831838][T22654] bridge0: port 1(bridge_slave_0) entered disabled state [ 1055.838951][T22654] bridge0: port 2(bridge_slave_1) entered disabled state [ 1055.859677][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1055.870464][T26334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1055.877321][T26334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1055.884546][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1055.893191][T26334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1055.900060][T26334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1055.960472][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1055.987062][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1056.035215][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1056.068098][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1056.082665][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1056.112114][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1056.142281][ T3412] device veth0_vlan entered promiscuous mode [ 1056.182666][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1056.200579][ T3412] device veth1_macvtap entered promiscuous mode [ 1056.251676][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1056.268085][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1056.317746][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1056.331410][T26327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1056.355509][ T9] device bridge_slave_1 left promiscuous mode [ 1056.362208][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.371898][ T9] device bridge_slave_0 left promiscuous mode [ 1056.381111][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.389099][ T9] device bridge_slave_1 left promiscuous mode [ 1056.396150][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.404696][ T9] device bridge_slave_0 left promiscuous mode [ 1056.413361][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.422820][ T9] device veth1_macvtap left promiscuous mode [ 1056.429939][ T9] device veth0_vlan left promiscuous mode [ 1056.436660][ T9] device veth1_macvtap left promiscuous mode [ 1056.442887][ T9] device veth0_vlan left promiscuous mode [ 1056.780736][ T3457] device pim6reg1 entered promiscuous mode [ 1056.891109][ T3449] device syzkaller0 entered promiscuous mode [ 1056.959948][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.966777][ T3460] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.974182][ T3460] device bridge_slave_0 entered promiscuous mode [ 1056.981070][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.987947][ T3460] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.995224][ T3460] device bridge_slave_1 entered promiscuous mode [ 1057.057807][ T3460] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.064680][ T3460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.071784][ T3460] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.078557][ T3460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.110553][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1057.118187][T26334] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.125372][T26334] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.139136][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1057.147294][T22654] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.154334][T22654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.162114][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1057.170271][T22654] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.177124][T22654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.195086][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1057.203016][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1057.221184][T22653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1057.238185][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1057.246798][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1057.260391][ T3460] device veth0_vlan entered promiscuous mode [ 1057.269216][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1057.276855][T22652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1057.293549][ T3460] device veth1_macvtap entered promiscuous mode [ 1057.306726][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1057.315526][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1057.376030][T22654] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1057.395789][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1057.405389][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1057.415027][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1057.423454][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1057.508083][ T3502] device syzkaller0 entered promiscuous mode [ 1057.536369][ T3507] tap0: tun_chr_ioctl cmd 1074025677 [ 1057.541583][ T3507] tap0: linktype set to 65534 [ 1057.785643][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.792759][ T3524] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.800342][ T3524] device bridge_slave_0 entered promiscuous mode [ 1057.811156][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.818003][ T3524] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.825385][ T3524] device bridge_slave_1 entered promiscuous mode [ 1057.880472][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 1057.887330][ T3524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1057.894439][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.901207][ T3524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.934196][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1057.942510][T22657] bridge0: port 1(bridge_slave_0) entered disabled state [ 1057.950426][T22657] bridge0: port 2(bridge_slave_1) entered disabled state [ 1057.969949][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1057.979144][T22659] bridge0: port 1(bridge_slave_0) entered blocking state [ 1057.985987][T22659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1057.994280][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1058.003482][T22659] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.010329][T22659] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.018917][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1058.038709][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1058.050027][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1058.063169][ T3524] device veth0_vlan entered promiscuous mode [ 1058.071820][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1058.080058][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1058.089189][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1058.104775][ T3524] device veth1_macvtap entered promiscuous mode [ 1058.113567][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1058.129398][T22659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1058.144038][T22643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1058.250266][ T9] device bridge_slave_1 left promiscuous mode [ 1058.256213][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.263602][ T9] device bridge_slave_0 left promiscuous mode [ 1058.269788][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.279377][ T9] device veth1_macvtap left promiscuous mode [ 1058.285196][ T9] device veth0_vlan left promiscuous mode [ 1058.469723][ T3541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.476642][ T3541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.484886][ T3541] device bridge_slave_0 entered promiscuous mode [ 1058.494307][ T3541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.503313][ T3541] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.511853][ T3541] device bridge_slave_1 entered promiscuous mode [ 1058.667079][ T3550] device syzkaller0 entered promiscuous mode [ 1058.725538][ T3541] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.732406][ T3541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.739494][ T3541] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.746282][ T3541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1058.783355][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1058.791228][T26331] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.801099][T26331] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.819755][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1058.827697][T26331] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.834535][T26331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1058.858330][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1058.866289][T26331] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.873122][T26331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.880575][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1058.888391][T26331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1058.907661][ T3541] device veth0_vlan entered promiscuous mode [ 1058.923205][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1058.936192][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1058.944910][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1058.955312][T26328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1058.969232][ T3541] device veth1_macvtap entered promiscuous mode [ 1058.978857][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1058.988824][T26334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1059.005911][T22657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 05:59:55 SYZFATAL: executor 3 failed 11 times: executor 3: exit status 67 err exit status 67 SYZFAIL: clone failed (errno 11: Resource temporarily unavailable) loop exited with status 67 exit status 67 SYZFAIL: clone failed (errno 11: Resource temporarily unavailable) loop exited with status 67 exit status 67