last executing test programs: 7.202116208s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850008000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffc0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0xffff0000, 0xb00, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) 6.366843465s ago: executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x4}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d, 0x0, 0x33}, {}]}) 5.262450062s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.current\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="1e031c003c5ca6012887636086000008"], 0xffdd) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4008}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000088a0fcac5385675c0000000085000000750000009500000000000000"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r7, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa8, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x4f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={r6, 0xffffffffffffffff}, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000980), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000020000000000000000000000852000000500000018120000", @ANYRES32=r1, @ANYBLOB="0500000000000000b703000000000000850000000c000000b7000000000000001843000003000000000000000000000018310000010000000000000000000000186700000600400000000000ff7f0000850000004c0000000399fefffcffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x63, &(0x7f00000003c0)=""/99, 0x41000, 0x0, '\x00', r8, 0x12, r1, 0x8, &(0x7f0000000840)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x5, 0x8, 0x3}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000900)=[r6, r1, r9], &(0x7f0000000940)=[{0x4, 0x4, 0xd}, {0x5, 0x5, 0x3}, {0x4, 0x1, 0xe, 0xb}], 0x10, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r7}, 0x10) write$cgroup_type(r2, &(0x7f0000000140), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x81, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.034542337s ago: executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="050000000400000000113100000000009500a50500000000690d54cbfd0271ec659c28329402b122f5c214ebe79bd044922390242927f14750ef219b043236430bfabe66"], &(0x7f0000000080)='GPL\x00', 0x10005, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x401, 0x18}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x15, 0x8, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000780)={r3, &(0x7f0000000740), 0x20000000, 0x3}, 0x20) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000002aec00000000000000009500000000000000efb6f2682b2a0235eb3b68923243b8712026815525314c422329e0fef2350efdf9989268f4fdc0d4a5d42c9d4002ad07b3345f602819afe9d3f027e0fdd0e896f83efe7916a167d21cb3812888c2e0962998536d632f4b5c929525f5c0b9318b42b194c68944102b20ed2dd8517de33777c61abc7e2b98eacbb60c2d071787953642a5f1d516547e258e954b0d73483a13e29f80c89765f6792d8fdd"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r6}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r7, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)=r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0x10000, 0x4, 0x8, 0x2050, 0xffffffffffffffff, 0x56, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x8, &(0x7f0000000cc0)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00000000000000001d84f0ff0400000085200000010000002951fefff0ffffff9500000000000000184a00000300"/56], 0x0, 0x5, 0x0, &(0x7f0000000d80), 0x41100, 0x40, '\x00', r8, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x4, 0x1, 0x5, 0x1c9e}, 0x10, 0x0, r1, 0x0, &(0x7f0000000e80)=[r4, r9, r4], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r12, 0x5460, 0x9086ebae7b0000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r12, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, &(0x7f0000000980)=[0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7a, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000a40), &(0x7f0000000a80), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x1e, 0x9, 0x7, 0x4e, 0x1000, r3, 0x5, '\x00', r13, r12, 0x4, 0x4, 0x1}, 0x48) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r14, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r14, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d00)={r4, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r16, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x4, 0x4, &(0x7f0000000180)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r14}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x1}], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x22, &(0x7f0000000240)=""/34, 0x41100, 0x44, '\x00', r15, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0xf, 0xdcd}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f00000003c0)=[r14, r14, r14, r16], &(0x7f0000000400)=[{0x0, 0x5, 0x5, 0x8}, {0x1, 0x1, 0xd, 0x6}, {0x4, 0x2, 0xe, 0x2}, {0x1, 0x3, 0x3, 0x9}], 0x10, 0x9}, 0x90) r17 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000700)={0x1b, 0x0, 0x0, 0x6, 0x0, r10, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0x8, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2d06, 0x0, 0x0, 0x0, 0x567}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xffffffe1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xb}, @ldst={0x1, 0x1, 0xa, 0xa, 0x5, 0xffffffffffffffe0}]}, &(0x7f0000000680)='syzkaller\x00', 0x21fdce87, 0x0, &(0x7f00000006c0), 0x41000, 0x4, '\x00', r15, 0x0, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000007c0)=[r17, 0xffffffffffffffff], &(0x7f0000000800)=[{0x5, 0x4, 0xb, 0x5}, {0x3, 0x3, 0x7, 0x2}, {0x3, 0x4, 0xf, 0x2}, {0x0, 0x0, 0xe, 0x7}, {0x0, 0x4, 0xf, 0x7}, {0x0, 0x0, 0xe, 0x9}, {0x0, 0x2, 0x2, 0x9}, {0x5, 0x2, 0x0, 0xa}], 0x10, 0xfffffc00}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x13, &(0x7f0000000f80)=ANY=[@ANYBLOB="18000000ff030000000000000902000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018230000", @ANYRES32=r3, @ANYBLOB="00000000f7ff000095000000000000008510000000000000bf91000000000000b7020000000000008500000084400000b700ecff00000000950000e34644a5004f6fd596c5aa4a2fd0bc23be841adfad522fee5725ba2d2929aa45bde80e667a6a7e788e7ac23bcc294f083ed547f99228e2c54670bcdb1fae2dc28e0c68d3241380428a6bdcbd70ea4c835f84aa7e416011bd910a33411fd9f754307d61c76d3a47d092b6695fe17aa503cc56cbf77b1cd8d3017bfc809c4ec23d8accdf6b27d5a624c8"], &(0x7f0000000880)='syzkaller\x00', 0x74, 0x1b, &(0x7f0000000240)=""/27, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xfffffffc, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x10, 0x5}, 0x90) 4.186203025s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1c, 0x5, 0x400, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x8000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r4}, &(0x7f0000000880)=0x800000, &(0x7f00000008c0)='%ps \x00'}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x5, [@ptr={0xf, 0x0, 0x0, 0x2, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @const={0x10, 0x0, 0x0, 0xa, 0x5}, @fwd={0xa}, @volatile={0x5, 0x0, 0x0, 0x9, 0x5}, @union={0x10, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x9, 0x1, 0xffff2328}, {0x6, 0x1, 0xffffffe0}, {0xe, 0x5, 0x223e6709}, {0x1, 0x4, 0x8}]}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000080)=""/49, 0x95, 0x31}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004662b, 0x20001412) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x100, 0x2, 0x2, 0x2404, r4, 0x0, '\x00', 0x0, r5, 0x5, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x17, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @map_fd={0x18, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @exit]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x32, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x8, 0xa4, 0x74}, 0x10, 0x0, r2, 0x2, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)=[{0x3, 0x4, 0x8, 0x7}, {0x0, 0x1, 0x1, 0xa}], 0x10, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x0, 0x6}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r3}, 0x38) 3.615898112s ago: executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="05000000040000007111cd783100000400009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x10005, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x401, 0x18}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x15, 0x8, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000780)={r3, &(0x7f0000000740), 0x20000000, 0x3}, 0x20) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000002aec00000000000000009500000000000000efb6f2682b2a0235eb3b68923243b8712026815525314c422329e0fef2350efdf9989268f4fdc0d4a5d42c9d4002ad07b3345f602819afe9d3f027e0fdd0e896f83efe7916a167d21cb3812888c2e0962998536d632f4b5c929525f5c0b9318b42b194c68944102b20ed2dd8517de33777c61abc7e2b98eacbb60c2d071787953642a5f1d516547e258e954b0d73483a13e29f80c89765f6792d8fdd"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r9}, 0x10) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000200)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x800000000003f, 0x12) write$cgroup_subtree(r13, &(0x7f0000000040)=ANY=[@ANYBLOB='1-0:'], 0x31) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)=r14) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0x10000, 0x4, 0x8, 0x2050, 0xffffffffffffffff, 0x56, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x8, &(0x7f0000000cc0)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00000000000000001d84f0ff0400000085200000010000002951fefff0ffffff9500000000000000184a00000300"/56], 0x0, 0x5, 0x0, &(0x7f0000000d80), 0x41100, 0x40, '\x00', r14, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x4, 0x1, 0x5, 0x1c9e}, 0x10, 0x0, r1, 0x0, &(0x7f0000000e80)=[r4, r15, r4], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) 2.820409093s ago: executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="05000000040000007111cd783100000400009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x10005, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x401, 0x18}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x15, 0x8, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000780)={r3, &(0x7f0000000740), 0x20000000, 0x3}, 0x20) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r0}, 0x18) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000002aec00000000000000009500000000000000efb6f2682b2a0235eb3b68923243b8712026815525314c422329e0fef2350efdf9989268f4fdc0d4a5d42c9d4002ad07b3345f602819afe9d3f027e0fdd0e896f83efe7916a167d21cb3812888c2e0962998536d632f4b5c929525f5c0b9318b42b194c68944102b20ed2dd8517de33777c61abc7e2b98eacbb60c2d071787953642a5f1d516547e258e954b0d73483a13e29f80c89765f6792d8fdd"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r9}, 0x10) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r5, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r13 = openat$cgroup_int(r12, &(0x7f0000000200)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x800000000003f, 0x12) write$cgroup_subtree(r13, &(0x7f0000000040)=ANY=[@ANYBLOB='1-0:'], 0x31) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r11, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000001c0)=r14) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0x10000, 0x4, 0x8, 0x2050, 0xffffffffffffffff, 0x56, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x8, &(0x7f0000000cc0)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="00000000000000001d84f0ff0400000085200000010000002951fefff0ffffff9500000000000000184a00000300"/56], 0x0, 0x5, 0x0, &(0x7f0000000d80), 0x41100, 0x40, '\x00', r14, 0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000dc0)={0x4, 0x1, 0x5, 0x1c9e}, 0x10, 0x0, r1, 0x0, &(0x7f0000000e80)=[r4, r15, r4], 0x0, 0x10, 0x5}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) 2.694557682s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffcd7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000080b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) 2.679459144s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x1a, r2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000000), 0x400000) 2.644319249s ago: executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x30, &(0x7f00000001c0)={0x2}, 0x10}, 0x80) 2.637548031s ago: executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x75, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r1, r2, 0x25, 0x8, 0x0, @link_fd=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000001200000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.632831831s ago: executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x75, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r1, r2, 0x25, 0x8, 0x0, @link_fd=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000001200000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.542955924s ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf0810000000000000"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x2, 0x1, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000001095"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r3, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 1.720343229s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1c, 0x5, 0x400, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x8000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r4}, &(0x7f0000000880)=0x800000, &(0x7f00000008c0)='%ps \x00'}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x5, [@ptr={0xf, 0x0, 0x0, 0x2, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @const={0x10, 0x0, 0x0, 0xa, 0x5}, @fwd={0xa}, @volatile={0x5, 0x0, 0x0, 0x9, 0x5}, @union={0x10, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x9, 0x1, 0xffff2328}, {0x6, 0x1, 0xffffffe0}, {0xe, 0x5, 0x223e6709}, {0x1, 0x4, 0x8}]}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000080)=""/49, 0x95, 0x31}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004662b, 0x20001412) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x100, 0x2, 0x2, 0x2404, r4, 0x0, '\x00', 0x0, r5, 0x5, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x17, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @map_fd={0x18, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @exit]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x32, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x8, 0xa4, 0x74}, 0x10, 0x0, r2, 0x2, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)=[{0x3, 0x4, 0x8, 0x7}, {0x0, 0x1, 0x1, 0xa}], 0x10, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x0, 0x6}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r3}, 0x38) 1.041754682s ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.current\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="1e031c003c5ca6012887636086000008"], 0xffdd) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4008}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000088a0fcac5385675c0000000085000000750000009500000000000000"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r7, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa8, &(0x7f0000000600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x4f, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={r6, 0xffffffffffffffff}, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000980), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000020000000000000000000000852000000500000018120000", @ANYRES32=r1, @ANYBLOB="0500000000000000b703000000000000850000000c000000b7000000000000001843000003000000000000000000000018310000010000000000000000000000186700000600400000000000ff7f0000850000004c0000000399fefffcffffff9500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0x5, 0x63, &(0x7f00000003c0)=""/99, 0x41000, 0x0, '\x00', r8, 0x12, r1, 0x8, &(0x7f0000000840)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x5, 0x8, 0x3}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000900)=[r6, r1, r9], &(0x7f0000000940)=[{0x4, 0x4, 0xd}, {0x5, 0x5, 0x3}, {0x4, 0x1, 0xe, 0xb}], 0x10, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r7}, 0x10) write$cgroup_type(r2, &(0x7f0000000140), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000b00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x81, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.025051455s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b7040000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='block_split\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='block_split\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) 982.313891ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) r5 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x1}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu~\"\"\nt\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='cq_alloc_error\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x57) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x10004, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0xfffffffd}, 0x0, 0xe, 0xffffffffffffffff, 0xa) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454e2, &(0x7f0000000280)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a1, &(0x7f0000000080)) 913.610242ms ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x0, 0x9, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r3}, &(0x7f00000007c0), &(0x7f0000000800)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642520a07b71000000002020207b1ab4782c750000bfa100000000000007010000f8ffffffb702000005000000b70300000000000085000e00b00000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='contention_end\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 850.394971ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffcd7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.time\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESHEX=r2, @ANYRESOCT=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000080b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) 734.153739ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r2}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x88, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xcb, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(&(0x7f0000000080)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000018007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) 713.203942ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18fe0000000000000000000000001b0a751427ef", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3}, &(0x7f0000000300), &(0x7f0000000340)='%pI4 \x00'}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r5}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) 691.829735ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000001600000000000000ae330018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='cpu.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4004662b, &(0x7f00000005c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x9, 0x0, 0x4, 0xff, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/262, 0x106}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, 0x0, 0x7ffffffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r8}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r12}, 0x10) write$cgroup_type(r6, &(0x7f0000000000), 0x9) 484.167597ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x1a, r2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000000), 0x400000) 422.885966ms ago: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf0810000000000000"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x2, 0x1, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000001095"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={@cgroup=r3, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) 418.231876ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 391.095401ms ago: executing program 2: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x0, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x75, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={@cgroup=r1, r2, 0x25, 0x8, 0x0, @link_fd=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000600), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000001200000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 344.509418ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002200b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYRES64=r4, @ANYRES8=r1], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC=r3, @ANYRES32=0xffffffffffffffff, @ANYRES8=r3], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYRES8=r7], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r9}, 0x10) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r11, r10, 0x0, 0x10, &(0x7f0000000140)='rcu_utilization\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x200}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x54c1f3b8, 0x3c36ad8, 0x1, 0x10, r8, 0x7, '\x00', 0x0, r6, 0x5, 0x3, 0x3, 0x6}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) socketpair(0x5, 0x5, 0x2, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89a1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 311.816633ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1c, 0x5, 0x400, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x8000}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r4}, &(0x7f0000000880)=0x800000, &(0x7f00000008c0)='%ps \x00'}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x5, [@ptr={0xf, 0x0, 0x0, 0x2, 0x2}, @restrict={0x8, 0x0, 0x0, 0xb, 0x2}, @const={0x10, 0x0, 0x0, 0xa, 0x5}, @fwd={0xa}, @volatile={0x5, 0x0, 0x0, 0x9, 0x5}, @union={0x10, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x9, 0x1, 0xffff2328}, {0x6, 0x1, 0xffffffe0}, {0xe, 0x5, 0x223e6709}, {0x1, 0x4, 0x8}]}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000080)=""/49, 0x95, 0x31}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00'}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004662b, 0x20001412) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x100, 0x2, 0x2, 0x2404, r4, 0x0, '\x00', 0x0, r5, 0x5, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x17, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @map_fd={0x18, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @exit]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x32, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0x8, 0xa4, 0x74}, 0x10, 0x0, r2, 0x2, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)=[{0x3, 0x4, 0x8, 0x7}, {0x0, 0x1, 0x1, 0xa}], 0x10, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x0, 0x6}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r3}, 0x38) 21.965787ms ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800001f0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x1d, 0x0, 0x33}, {}]}) 0s ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0xf, &(0x7f00000001c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x7e}, {0x7, 0x0}}, {}, [], {{}, {}, {0x85, 0x2c}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) kernel console output (not intermixed with test programs): v6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.043947][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.051309][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.058596][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.066700][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.074752][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.081601][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.088892][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.096759][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.104609][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.112744][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.125225][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.133409][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.141561][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.149305][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.161827][ T313] device veth0_vlan entered promiscuous mode [ 22.169426][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.176926][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.184856][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.193201][ T307] device veth0_vlan entered promiscuous mode [ 22.203072][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.210467][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.229098][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.237391][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.245668][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.253871][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.262385][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.270584][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.278510][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.286349][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.295552][ T311] device veth1_macvtap entered promiscuous mode [ 22.310571][ T308] device veth0_vlan entered promiscuous mode [ 22.320430][ T307] device veth1_macvtap entered promiscuous mode [ 22.339339][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.346890][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.355198][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.364697][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.374602][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.382803][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.391225][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.399646][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.408022][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.416129][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.444380][ T308] device veth1_macvtap entered promiscuous mode [ 22.453600][ T340] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 22.464314][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.472429][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.479803][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.487941][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.496187][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.504437][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.512634][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.520729][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.528860][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.549354][ T313] device veth1_macvtap entered promiscuous mode [ 22.559981][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.568232][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.576463][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.585949][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.608926][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.617017][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.636668][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.649058][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.691615][ C0] hrtimer: interrupt took 44801 ns [ 25.052425][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 25.052458][ T28] audit: type=1400 audit(1718163494.483:105): avc: denied { cpu } for pid=385 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.793043][ T449] syz-executor.0 (449) used greatest stack depth: 21840 bytes left [ 28.761364][ T464] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 29.974959][ T508] device syzkaller0 entered promiscuous mode [ 31.589366][ T535] device syzkaller0 entered promiscuous mode [ 31.859932][ T541] device syzkaller0 entered promiscuous mode [ 32.602571][ T28] audit: type=1400 audit(1718163502.033:106): avc: denied { relabelfrom } for pid=568 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 32.688458][ T28] audit: type=1400 audit(1718163502.033:107): avc: denied { relabelto } for pid=568 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.412728][ T592] device syzkaller0 entered promiscuous mode [ 33.571118][ T608] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 33.619871][ T596] device syzkaller0 entered promiscuous mode [ 33.762361][ T604] device syzkaller0 entered promiscuous mode [ 34.095599][ T625] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 35.135766][ T648] device syzkaller0 entered promiscuous mode [ 35.382799][ T654] device syzkaller0 entered promiscuous mode [ 35.682161][ T28] audit: type=1400 audit(1718163505.113:108): avc: denied { write } for pid=679 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 36.091853][ T707] device syzkaller0 entered promiscuous mode [ 37.011258][ T721] device syzkaller0 entered promiscuous mode [ 37.271170][ T729] device syzkaller0 entered promiscuous mode [ 37.987192][ T749] device syzkaller0 entered promiscuous mode [ 38.248496][ T766] device syzkaller0 entered promiscuous mode [ 39.244343][ T28] audit: type=1400 audit(1718163508.673:109): avc: denied { read } for pid=796 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.270861][ T28] audit: type=1400 audit(1718163508.673:110): avc: denied { open } for pid=796 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.404198][ T805] device syzkaller0 entered promiscuous mode [ 42.374192][ T846] device syzkaller0 entered promiscuous mode [ 42.454488][ T857] device syzkaller0 entered promiscuous mode [ 43.668491][ T873] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 45.000226][ T887] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 45.430126][ T913] device syzkaller0 entered promiscuous mode [ 46.133130][ T926] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 47.867483][ T965] device syzkaller0 entered promiscuous mode [ 50.479719][ T1020] device syzkaller0 entered promiscuous mode [ 50.594666][ T1026] device syzkaller0 entered promiscuous mode [ 52.601803][ T1046] syz-executor.3 (1046) used greatest stack depth: 21016 bytes left [ 52.746832][ T1077] device syzkaller0 entered promiscuous mode [ 52.825488][ T28] audit: type=1400 audit(1718163522.253:111): avc: denied { ioctl } for pid=1083 comm="syz-executor.3" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 53.237682][ T1110] bridge0: port 3(veth1_macvtap) entered blocking state [ 53.244506][ T1110] bridge0: port 3(veth1_macvtap) entered disabled state [ 53.322441][ T1120] device syzkaller0 entered promiscuous mode [ 53.994975][ T1166] device syzkaller0 entered promiscuous mode [ 54.252470][ T1179] device syzkaller0 entered promiscuous mode [ 54.491890][ T1196] tap0: tun_chr_ioctl cmd 2147767521 [ 56.439956][ T28] audit: type=1400 audit(1718163525.873:112): avc: denied { setopt } for pid=1259 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.489843][ T1280] tap0: tun_chr_ioctl cmd 2147767521 [ 56.910431][ T1326] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 57.456517][ T1354] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 58.302948][ T1373] tap0: tun_chr_ioctl cmd 2147767521 [ 58.573052][ T1389] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 58.935766][ T1420] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 59.799588][ T1448] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 59.847410][ T1441] device syzkaller0 entered promiscuous mode [ 60.948923][ T1479] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 60.974017][ T1477] device veth0_vlan left promiscuous mode [ 60.986148][ T1477] device veth0_vlan entered promiscuous mode [ 61.276257][ T1500] device syzkaller0 entered promiscuous mode [ 61.282773][ T1504] syz-executor.3[1504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.282858][ T1504] syz-executor.3[1504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.320671][ T1504] syz-executor.3[1504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.332288][ T1504] syz-executor.3[1504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.610336][ T1512] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 61.696408][ T1518] syz-executor.2[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.696479][ T1518] syz-executor.2[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.711554][ T1518] syz-executor.2[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.728420][ T1518] syz-executor.2[1518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.779002][ T1516] device veth0_vlan left promiscuous mode [ 61.820794][ T1516] device veth0_vlan entered promiscuous mode [ 62.095541][ T1540] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 62.380531][ T1564] device veth0_vlan left promiscuous mode [ 62.393486][ T1564] device veth0_vlan entered promiscuous mode [ 62.438191][ T1575] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 63.801201][ T1605] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 63.809982][ T1608] device syzkaller0 entered promiscuous mode [ 63.852527][ T1609] device syzkaller0 entered promiscuous mode [ 65.201132][ T1653] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 65.310274][ T1664] device syzkaller0 entered promiscuous mode [ 65.334712][ T1669] device pim6reg1 entered promiscuous mode [ 66.255776][ T1691] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 66.482416][ T1723] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 66.513839][ T1720] device syzkaller0 entered promiscuous mode [ 66.630169][ T1730] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 66.968072][ T1753] device syzkaller0 entered promiscuous mode [ 66.975454][ T1756] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 67.048565][ T1762] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 67.922480][ T1786] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.009158][ T1790] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.048197][ T1794] device syzkaller0 entered promiscuous mode [ 68.201414][ T1816] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.563167][ T1828] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.614399][ T1830] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.942593][ T1846] device syzkaller0 entered promiscuous mode [ 69.032692][ T1854] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 69.062483][ T1852] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 69.396426][ T1880] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 69.480181][ T1887] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 69.502245][ T1886] device syzkaller0 entered promiscuous mode [ 69.673774][ T1901] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 70.580050][ T1924] device syzkaller0 entered promiscuous mode [ 70.998156][ T1964] device syzkaller0 entered promiscuous mode [ 71.066276][ T1966] device syzkaller0 entered promiscuous mode [ 71.132969][ T1970] device syzkaller0 entered promiscuous mode [ 72.796812][ T2002] device syzkaller0 entered promiscuous mode [ 73.105174][ T2034] EXT4-fs warning: 10 callbacks suppressed [ 73.105195][ T2034] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 73.316425][ T2051] device syzkaller0 entered promiscuous mode [ 73.353012][ T2053] device syzkaller0 entered promiscuous mode [ 73.446562][ T2072] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 74.303457][ T2099] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 74.812556][ T2101] device syzkaller0 entered promiscuous mode [ 74.844859][ T2106] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.125753][ T2133] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.472991][ T2144] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 75.564588][ T2150] device syzkaller0 entered promiscuous mode [ 75.712298][ T2160] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 76.026697][ T2188] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 77.056855][ T2225] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 77.754102][ T2254] device syzkaller0 entered promiscuous mode [ 77.913989][ T2264] device syzkaller0 entered promiscuous mode [ 78.282887][ T2292] device syzkaller0 entered promiscuous mode [ 78.365766][ T2302] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 78.628129][ T2312] device syzkaller0 entered promiscuous mode [ 78.742420][ T2319] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 79.152037][ T2340] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 79.218042][ T2348] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 79.413613][ T2362] device syzkaller0 entered promiscuous mode [ 79.656409][ T2382] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 80.021807][ T28] audit: type=1400 audit(1718163549.453:113): avc: denied { create } for pid=2397 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 80.346121][ T2413] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 80.731039][ T2449] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 81.165107][ T2483] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 81.702321][ T2515] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 82.034331][ T2550] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 82.735128][ T2607] device syzkaller0 entered promiscuous mode [ 83.787226][ T2631] device syzkaller0 entered promiscuous mode [ 83.880566][ T2643] EXT4-fs warning: 3 callbacks suppressed [ 83.880586][ T2643] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 84.620609][ T2664] device syzkaller0 entered promiscuous mode [ 84.818126][ T2663] syz-executor.3 (2663) used greatest stack depth: 19864 bytes left [ 86.765783][ T2729] device syzkaller0 entered promiscuous mode [ 87.924192][ T2755] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 88.323464][ T2783] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 88.387140][ T2779] device syzkaller0 entered promiscuous mode [ 88.778112][ T2810] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 89.250602][ T2830] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 89.501904][ T2835] device syzkaller0 entered promiscuous mode [ 90.373874][ T2861] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 90.427583][ T2866] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 90.452375][ T2867] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 90.510245][ T2876] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 90.536415][ T28] audit: type=1400 audit(1718163559.963:114): avc: denied { create } for pid=2877 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 90.630816][ T2890] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 90.682141][ T308] cgroup: fork rejected by pids controller in /syz3 [ 91.027048][ T2920] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 91.626590][ T2918] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.667517][ T2918] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.696647][ T2918] device bridge_slave_0 entered promiscuous mode [ 91.730566][ T2918] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.767896][ T2918] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.790697][ T2918] device bridge_slave_1 entered promiscuous mode [ 91.812620][ T2934] bridge0: port 3(team_slave_1) entered blocking state [ 91.832154][ T2934] bridge0: port 3(team_slave_1) entered disabled state [ 91.839580][ T2934] device team_slave_1 entered promiscuous mode [ 91.931813][ T2954] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 91.994667][ T583] device bridge_slave_1 left promiscuous mode [ 92.005030][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.032016][ T583] device bridge_slave_0 left promiscuous mode [ 92.049452][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.079122][ T583] device veth1_macvtap left promiscuous mode [ 92.087589][ T583] device veth0_vlan left promiscuous mode [ 94.007482][ C1] sched: RT throttling activated [ 95.624444][ T28] audit: type=1400 audit(1718163565.053:115): avc: denied { write } for pid=2982 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 96.130933][ T2990] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 96.203543][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.211391][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.258357][ T3000] Driver unsupported XDP return value 0 on prog (id 1340) dev N/A, expect packet loss! [ 97.088202][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.096483][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.130214][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.137092][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.013500][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.022345][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.035661][ T330] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.042634][ T330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.680720][ T2918] device veth0_vlan entered promiscuous mode [ 100.028486][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.042047][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.050126][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.058214][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.066192][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.074243][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.082611][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.097307][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.105527][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.144600][ T2918] device veth1_macvtap entered promiscuous mode [ 100.172676][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.180338][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.188210][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.196747][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.205543][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.294328][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.318059][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.326288][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.399997][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.997165][ T3053] device lo entered promiscuous mode [ 104.089660][ T3087] device syzkaller0 entered promiscuous mode [ 104.255078][ T3106] device syzkaller0 entered promiscuous mode [ 104.822446][ T3136] device syzkaller0 entered promiscuous mode [ 105.078662][ T3144] device syzkaller0 entered promiscuous mode [ 105.243145][ T3152] device syzkaller0 entered promiscuous mode [ 105.306083][ T3158] device pim6reg1 entered promiscuous mode [ 106.049916][ T3185] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 107.466602][ T3202] device syzkaller0 entered promiscuous mode [ 107.516287][ T3211] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 107.641943][ T3223] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 107.734533][ T3234] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 108.325795][ T3255] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 108.396533][ T3265] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 109.809810][ T3288] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 109.870398][ T3298] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 109.911370][ T3297] device syzkaller0 entered promiscuous mode [ 110.833724][ T3323] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 110.965596][ T3337] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 112.059720][ T3354] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 112.229373][ T3372] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 113.565647][ T3389] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 113.578266][ T3383] device syzkaller0 entered promiscuous mode [ 113.858914][ T3405] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 113.926461][ T3408] device syzkaller0 entered promiscuous mode [ 115.189113][ T28] audit: type=1400 audit(1718163584.623:116): avc: denied { create } for pid=3429 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 115.229474][ T3435] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 115.992116][ T3463] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 116.804042][ T3494] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 119.842700][ T3566] device syzkaller0 entered promiscuous mode [ 120.721721][ T3602] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 123.828027][ T3690] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 124.689526][ T3717] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 126.952254][ T3778] syz-executor.1[3778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.952339][ T3778] syz-executor.1[3778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.462555][ T3778] syz-executor.1[3778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.477699][ T3778] syz-executor.1[3778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.830999][ T3806] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 131.766294][ T28] audit: type=1400 audit(1718163601.193:117): avc: denied { create } for pid=3861 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 133.377264][ T3895] device syzkaller0 entered promiscuous mode [ 136.605342][ T3975] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 137.987063][ T4011] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 138.092532][ T4018] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 138.183234][ T4029] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.191915][ T4029] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.241204][ T4033] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.250010][ T4033] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.992602][ T4036] device bridge_slave_1 left promiscuous mode [ 139.003308][ T4036] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.010883][ T4036] device bridge_slave_0 left promiscuous mode [ 139.016872][ T4036] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.077067][ T4040] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.084957][ T4040] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.107967][ T4047] device bridge_slave_1 left promiscuous mode [ 139.113947][ T4047] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.121439][ T4047] device bridge_slave_0 left promiscuous mode [ 139.127416][ T4047] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.181598][ T4059] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 139.927077][ T4075] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.936053][ T4075] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.961760][ T4078] device team_slave_1 left promiscuous mode [ 139.967693][ T4078] bridge0: port 3(team_slave_1) entered disabled state [ 139.974893][ T4078] device bridge_slave_1 left promiscuous mode [ 139.988696][ T4078] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.003887][ T4078] device bridge_slave_0 left promiscuous mode [ 140.028910][ T4078] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.665176][ T4088] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.674276][ T4088] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.678272][ T4100] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 140.708482][ T4091] device bridge_slave_1 left promiscuous mode [ 140.714545][ T4091] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.722186][ T4091] device bridge_slave_0 left promiscuous mode [ 140.728331][ T4091] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.560813][ T4125] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 142.400402][ T4147] device syzkaller0 entered promiscuous mode [ 142.623017][ T4145] device bridge_slave_1 left promiscuous mode [ 142.639506][ T4145] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.318813][ T4145] device bridge_slave_0 left promiscuous mode [ 143.325463][ T4145] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.368215][ T4164] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 143.491165][ T4174] device syzkaller0 entered promiscuous mode [ 143.647017][ T4193] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 144.276896][ T4213] device syzkaller0 entered promiscuous mode [ 145.702127][ T4277] device syzkaller0 entered promiscuous mode [ 146.392061][ T4325] device syzkaller0 entered promiscuous mode [ 149.683675][ T4393] device syzkaller0 entered promiscuous mode [ 150.419364][ T4407] device syzkaller0 entered promiscuous mode [ 153.205128][ T4465] device syzkaller0 entered promiscuous mode [ 153.235071][ T4472] device syzkaller0 entered promiscuous mode [ 153.437694][ T28] audit: type=1400 audit(1718163622.833:118): avc: denied { create } for pid=4478 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 155.014064][ T4526] device syzkaller0 entered promiscuous mode [ 155.118534][ T4531] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 155.322213][ T4538] device syzkaller0 entered promiscuous mode [ 155.948278][ T4556] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 156.032086][ T4566] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 156.741594][ T4578] €Â: renamed from pim6reg1 [ 157.474101][ T4596] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 157.482168][ T4590] device syzkaller0 entered promiscuous mode [ 159.653321][ T4633] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 159.776292][ T4646] device syzkaller0 entered promiscuous mode [ 160.614853][ T4677] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 160.828406][ T4698] device syzkaller0 entered promiscuous mode [ 161.319962][ T4751] device syzkaller0 entered promiscuous mode [ 161.515025][ T4776] device pim6reg1 entered promiscuous mode [ 162.306978][ T4800] device syzkaller0 entered promiscuous mode [ 166.508598][ T4888] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 166.876278][ T4907] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 167.764026][ T4927] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 167.890383][ T4937] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 168.312712][ T4954] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 168.633359][ T4968] device syzkaller0 entered promiscuous mode [ 168.763211][ T4979] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 168.868706][ T4989] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 169.920653][ T5022] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 175.862334][ T28] audit: type=1400 audit(1718163645.293:119): avc: denied { create } for pid=5101 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 176.523835][ T5123] device syzkaller0 entered promiscuous mode [ 177.550268][ T307] syz-executor.4 (307) used greatest stack depth: 19784 bytes left [ 177.856574][ T5163] device syzkaller0 entered promiscuous mode [ 178.535370][ T5155] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.543155][ T5155] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.550774][ T5155] device bridge_slave_0 entered promiscuous mode [ 178.558110][ T5155] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.565016][ T5155] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.572904][ T5155] device bridge_slave_1 entered promiscuous mode [ 178.907530][ T646] device veth1_macvtap left promiscuous mode [ 178.913500][ T646] device veth0_vlan left promiscuous mode [ 180.336738][ T5210] device syzkaller0 entered promiscuous mode [ 181.042662][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.051963][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.099669][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.114594][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.123226][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.130106][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.138516][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.159619][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.172955][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.179852][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.207754][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.215349][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.246220][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.266424][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.286326][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.314741][ T5155] device veth0_vlan entered promiscuous mode [ 181.355362][ T4495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.377412][ T4495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.432537][ T4495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 181.478385][ T4495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.524827][ T5155] device veth1_macvtap entered promiscuous mode [ 181.560409][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.577875][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.585379][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.657804][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.714073][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.940567][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.969817][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.979240][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.008266][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.100151][ T5261] device syzkaller0 entered promiscuous mode [ 185.358003][ T28] audit: type=1400 audit(1718163654.793:120): avc: denied { create } for pid=5333 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 185.974551][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.974629][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.011651][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.058035][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.094989][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.131586][ T5380] syz-executor.1[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.169840][ T5384] syz-executor.1[5384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.212471][ T5384] syz-executor.1[5384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.677301][ T5422] syz-executor.4[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.691249][ T5422] syz-executor.4[5422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.002153][ T5449] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 188.081742][ T5484] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 188.559182][ T5515] device syzkaller0 entered promiscuous mode [ 188.673002][ T5520] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 188.882843][ T5524] device syzkaller0 entered promiscuous mode [ 189.474473][ T5537] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 189.931821][ T5569] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.131988][ T5579] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.168401][ T5577] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.181697][ T5584] device syzkaller0 entered promiscuous mode [ 190.722665][ T5605] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.832433][ T5613] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.891354][ T5616] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 190.924819][ T5622] device syzkaller0 entered promiscuous mode [ 192.670018][ T5736] device syzkaller0 entered promiscuous mode [ 193.618202][ T5777] EXT4-fs warning: 3 callbacks suppressed [ 193.618232][ T5777] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 195.807289][ T5817] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 196.578863][ T5827] device syzkaller0 entered promiscuous mode [ 197.360340][ T5856] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 198.574835][ T5885] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 199.095446][ T5923] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 201.750305][ T5994] device syzkaller0 entered promiscuous mode [ 202.761490][ T6013] device syzkaller0 entered promiscuous mode [ 205.601970][ T6069] device syzkaller0 entered promiscuous mode [ 212.731886][ T6237] device syzkaller0 entered promiscuous mode [ 212.763151][ T6240] device syzkaller0 entered promiscuous mode [ 212.773707][ T6240] pimreg: tun_chr_ioctl cmd 1074025672 [ 212.779345][ T6240] pimreg: ignored: set checksum enabled [ 223.433893][ T6505] device syzkaller0 entered promiscuous mode [ 231.074709][ T28] audit: type=1400 audit(1718163700.503:121): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 231.666379][ T28] audit: type=1400 audit(1718163700.503:122): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 233.090847][ T6737] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 239.026743][ T28] audit: type=1400 audit(1718163708.453:123): avc: denied { create } for pid=6880 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 239.111559][ T28] audit: type=1400 audit(1718163708.503:124): avc: denied { create } for pid=6880 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 239.384899][ T6895] device syzkaller0 entered promiscuous mode [ 239.786007][ T28] audit: type=1400 audit(1718163709.213:125): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 250.679502][ T7192] device syzkaller0 entered promiscuous mode [ 251.912368][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.922785][ T7235] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.930315][ T7235] device bridge_slave_0 entered promiscuous mode [ 251.937185][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.944556][ T7235] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.952074][ T7235] device bridge_slave_1 entered promiscuous mode [ 252.071438][ T7253] bpf_get_probe_write_proto: 14 callbacks suppressed [ 252.071457][ T7253] syz-executor.2[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.094592][ T7253] syz-executor.2[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.107639][ T10] device veth1_macvtap left promiscuous mode [ 252.136239][ T28] audit: type=1400 audit(1718163721.563:126): avc: denied { create } for pid=7252 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 252.160770][ T10] device veth0_vlan left promiscuous mode [ 252.380357][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.387239][ T7235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.394355][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.401115][ T7235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.482368][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.491019][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.508777][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.575492][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.585101][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.591986][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.599396][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.607560][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.614437][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.663607][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.694913][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.768488][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.797635][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.832658][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 252.854471][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.890935][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.909655][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.960356][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.976717][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.003160][ T7235] device veth0_vlan entered promiscuous mode [ 253.033519][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.048225][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.089529][ T7235] device veth1_macvtap entered promiscuous mode [ 253.118112][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.128366][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.152976][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.197266][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.205756][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.237318][ T28] audit: type=1400 audit(1718163722.663:127): avc: denied { mounton } for pid=7235 comm="syz-executor.3" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 256.359496][ T7412] device syzkaller0 entered promiscuous mode [ 257.023341][ T7456] device syzkaller0 entered promiscuous mode [ 258.453334][ T7506] device syzkaller0 entered promiscuous mode [ 259.363605][ T7562] device syzkaller0 entered promiscuous mode [ 272.160137][ T7969] device syzkaller0 entered promiscuous mode [ 272.715061][ T28] audit: type=1400 audit(1718163742.143:128): avc: denied { create } for pid=7981 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 274.771811][ T8021] device syzkaller0 entered promiscuous mode [ 277.695874][ T8113] device syzkaller0 entered promiscuous mode [ 288.345907][ T8549] device syzkaller0 entered promiscuous mode [ 289.179907][ T28] audit: type=1400 audit(1718163758.613:129): avc: denied { create } for pid=8593 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 298.652183][ T8863] syz-executor.0[8863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.615312][ T8933] syz-executor.0[8933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.141555][ T9146] device sit0 entered promiscuous mode [ 320.728214][ T9480] device syzkaller0 entered promiscuous mode [ 326.918565][ T28] audit: type=1400 audit(1718163796.353:130): avc: denied { create } for pid=9596 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 333.178512][ T28] audit: type=1400 audit(1718163802.613:131): avc: denied { tracepoint } for pid=9734 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 335.972141][ T9795] device syzkaller0 entered promiscuous mode [ 350.953317][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.988488][T10126] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.006609][T10126] device bridge_slave_0 entered promiscuous mode [ 351.613351][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.632849][T10126] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.668011][T10126] device bridge_slave_1 entered promiscuous mode [ 351.826315][T10126] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.833287][T10126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.840511][T10126] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.847357][T10126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.912267][ T10] device veth1_macvtap left promiscuous mode [ 351.932308][ T10] device veth0_vlan left promiscuous mode [ 353.217202][ T3030] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.225839][ T3030] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.330633][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.339805][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.358864][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.367144][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.375455][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.382339][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.389984][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.399236][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.407350][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.414234][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.429790][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.841028][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.864639][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.897333][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.921970][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.968268][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.104996][T10126] device veth0_vlan entered promiscuous mode [ 354.132357][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 354.146473][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.182591][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.199619][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.210122][T10126] device veth1_macvtap entered promiscuous mode [ 354.218444][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.226460][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.234571][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.246768][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.255002][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.266593][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.274700][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.790493][T10261] device veth1_macvtap left promiscuous mode [ 355.835552][T10262] device veth1_macvtap entered promiscuous mode [ 355.848941][T10262] device macsec0 entered promiscuous mode [ 355.887472][T10267] device veth1_macvtap left promiscuous mode [ 355.960223][T10267] device veth1_macvtap entered promiscuous mode [ 355.977981][T10267] device macsec0 entered promiscuous mode [ 360.216520][T10409] device macsec0 entered promiscuous mode [ 360.263432][T10413] device syzkaller0 entered promiscuous mode [ 380.696111][T10949] tun0: tun_chr_ioctl cmd 1074025692 [ 391.117259][ T28] audit: type=1400 audit(1718163860.543:132): avc: denied { create } for pid=11270 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 426.446678][T12096] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.494480][T12096] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.328798][T12096] device bridge_slave_0 entered promiscuous mode [ 427.353117][T12096] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.371944][T12096] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.482492][T12096] device bridge_slave_1 entered promiscuous mode [ 429.011266][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 429.058271][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 429.130936][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 429.206048][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 429.265106][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.271994][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.361217][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 429.405980][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 429.444519][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.451402][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.503155][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 429.526407][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 429.534662][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 429.542755][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 429.585093][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 429.605140][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 429.662810][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 430.829530][T12096] device veth0_vlan entered promiscuous mode [ 430.847417][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 430.879285][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 430.921150][ T642] device veth1_macvtap left promiscuous mode [ 434.283570][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.307720][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.356312][T12096] device veth1_macvtap entered promiscuous mode [ 434.417001][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 434.427007][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.478762][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 434.559349][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 434.613902][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.665517][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 434.704998][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 434.902869][T12253] tap0: tun_chr_ioctl cmd 1074812117 [ 447.668679][T12643] device syzkaller0 entered promiscuous mode [ 448.465249][T12688] device veth0_vlan left promiscuous mode [ 448.471586][T12688] device veth0_vlan entered promiscuous mode [ 449.232679][T12711] device syzkaller0 entered promiscuous mode [ 449.446731][T12721] device veth0_vlan left promiscuous mode [ 449.489682][T12721] device veth0_vlan entered promiscuous mode [ 450.388418][T12737] device syzkaller0 entered promiscuous mode [ 450.592025][T12761] device veth0_vlan left promiscuous mode [ 450.659185][T12761] device veth0_vlan entered promiscuous mode [ 450.703417][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.740710][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.524680][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.840568][T12816] device veth0_vlan left promiscuous mode [ 452.846489][T12816] device veth0_vlan entered promiscuous mode [ 452.853814][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.861815][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.869131][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.690468][T12836] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.768431][T12836] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.840251][T12836] device bridge_slave_0 entered promiscuous mode [ 454.445053][T12836] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.452071][T12836] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.459629][T12836] device bridge_slave_1 entered promiscuous mode [ 454.813749][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.823392][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.841495][T12858] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.848487][T12858] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.860806][T12858] device bridge_slave_1 left promiscuous mode [ 454.875071][T12858] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.882557][T12858] device bridge_slave_0 left promiscuous mode [ 454.888785][T12858] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.953718][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.962487][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.971682][ T3030] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.978550][ T3030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.009117][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.022982][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.031307][ T3030] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.038334][ T3030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.045946][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.117246][T12876] tun0: tun_chr_ioctl cmd 1074025692 [ 456.130888][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.168574][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 456.176907][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.184849][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 456.193112][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 456.206452][T12836] device veth0_vlan entered promiscuous mode [ 456.233959][ T583] device bridge_slave_1 left promiscuous mode [ 456.240220][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.251545][ T583] device bridge_slave_0 left promiscuous mode [ 456.257598][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.265286][ T583] device veth1_macvtap left promiscuous mode [ 456.271396][ T583] device veth0_vlan left promiscuous mode [ 456.619805][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 456.641010][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.231167][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.248891][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.261557][T12836] device veth1_macvtap entered promiscuous mode [ 457.287612][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 457.296192][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.307286][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 457.967186][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 457.977819][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 457.986101][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 457.995207][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 458.096831][T12923] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 484.054858][T13748] device syzkaller0 entered promiscuous mode [ 485.379240][T13778] device syzkaller0 entered promiscuous mode [ 485.579293][T13796] syz-executor.4[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.579364][T13796] syz-executor.4[13796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.868233][T14023] device syzkaller0 entered promiscuous mode [ 521.379196][ T28] audit: type=1400 audit(1718163990.813:133): avc: denied { create } for pid=14816 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 521.845948][T14830] device veth0_vlan left promiscuous mode [ 521.855394][T14830] device veth0_vlan entered promiscuous mode [ 523.419876][T14872] device pim6reg1 entered promiscuous mode [ 526.593812][T14987] device veth0_vlan left promiscuous mode [ 526.601553][T14987] device veth0_vlan entered promiscuous mode [ 526.680154][T14987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 526.725042][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 526.743146][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 526.771498][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.978767][T15099] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 532.279081][T15167] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 533.958499][T15210] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 541.334897][T15387] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.392951][T15387] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.461364][T15387] device bridge_slave_0 entered promiscuous mode [ 541.495225][T15387] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.551052][T15387] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.592665][T15387] device bridge_slave_1 entered promiscuous mode [ 542.572978][ T9948] device veth1_macvtap left promiscuous mode [ 544.061612][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 544.071348][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.118536][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 544.156832][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.196990][T11861] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.203971][T11861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.245808][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 544.270252][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 544.307243][T11861] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.314149][T11861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.361392][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 544.394290][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 544.419686][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 544.441016][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 544.533585][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 544.570183][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 544.592676][T15387] device veth0_vlan entered promiscuous mode [ 544.613216][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.631199][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.658056][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.708294][T15387] device veth1_macvtap entered promiscuous mode [ 544.834636][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 544.949663][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 544.980733][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 545.025759][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 545.054445][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 550.215211][T15554] syz-executor.4[15554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.215288][T15554] syz-executor.4[15554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.495513][T16144] device syzkaller0 entered promiscuous mode [ 580.420600][T16247] syz-executor.4[16247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.420676][T16247] syz-executor.4[16247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.511322][T16247] syz-executor.4[16247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.547429][T16247] syz-executor.4[16247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.677572][ T28] audit: type=1400 audit(1718164051.103:134): avc: denied { create } for pid=16281 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 582.002418][ T28] audit: type=1400 audit(1718164051.433:135): avc: denied { create } for pid=16288 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 582.063479][T16300] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 582.098192][ T28] audit: type=1400 audit(1718164051.523:136): avc: denied { write } for pid=16297 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 582.150482][ T28] audit: type=1400 audit(1718164051.553:137): avc: denied { create } for pid=16297 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 583.254818][T16347] syz-executor.0[16347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.294953][T16347] syz-executor.0[16347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.312368][T16349] syz-executor.2[16349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.325860][T16349] syz-executor.2[16349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.453948][T16393] device syzkaller0 entered promiscuous mode [ 586.897705][ T28] audit: type=1400 audit(1718164056.323:138): avc: denied { read } for pid=16430 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 592.179100][ T28] audit: type=1400 audit(1718164061.613:139): avc: denied { ioctl } for pid=16663 comm="syz-executor.1" path="net:[4026532731]" dev="nsfs" ino=4026532731 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 592.553169][T16681] syz-executor.0[16681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.553252][T16681] syz-executor.0[16681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.933875][T16707] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 593.615596][T16732] device macsec0 entered promiscuous mode [ 595.149722][T16790] device macsec0 entered promiscuous mode [ 595.571155][T16814] ------------[ cut here ]------------ [ 595.576188][ T28] audit: type=1400 audit(1718164065.003:140): avc: denied { create } for pid=16807 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 595.576439][T16814] WARNING: CPU: 0 PID: 16814 at kernel/bpf/btf.c:1957 btf_type_id_size+0x8c4/0x950 [ 595.605206][T16814] Modules linked in: [ 595.609022][T16814] CPU: 0 PID: 16814 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00002-g65aed0e2f758 #0 [ 595.619003][T16814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 595.628927][T16814] RIP: 0010:btf_type_id_size+0x8c4/0x950 [ 595.634413][T16814] Code: 89 f2 e9 21 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 4a fa ff ff 4c 89 ff e8 76 58 29 00 e9 3d fa ff ff e8 9c 5a e2 ff <0f> 0b 31 db e9 39 fa ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c [ 595.653969][T16814] RSP: 0018:ffffc90004cc7bb0 EFLAGS: 00010202 [ 595.659885][T16814] RAX: ffffffff81931964 RBX: 0000000011000000 RCX: ffff88810fac1440 [ 595.667689][T16814] RDX: 0000000000000003 RSI: 0000000011000000 RDI: 000000000e000000 [ 595.675499][T16814] RBP: ffffc90004cc7c10 R08: ffffffff819314af R09: 0000000000200000 [ 595.683413][T16814] R10: 00000000000000b7 R11: ffff88810fac1440 R12: 0000000000000009 [ 595.691254][T16814] R13: dffffc0000000000 R14: ffff888110142200 R15: 0000000000000001 [ 595.699031][T16814] FS: 00007f0c08a9a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 595.707890][T16814] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 595.714288][T16814] CR2: 0000001b2c136000 CR3: 000000011e087000 CR4: 00000000003506b0 [ 595.722163][T16814] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 595.729944][T16814] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 595.737929][T16814] Call Trace: [ 595.741104][T16814] [ 595.743894][T16814] ? show_regs+0x58/0x60 [ 595.748040][T16814] ? __warn+0x160/0x3d0 [ 595.751978][T16814] ? btf_type_id_size+0x8c4/0x950 [ 595.756964][T16814] ? report_bug+0x4d5/0x7d0 [ 595.761358][T16814] ? btf_type_id_size+0x8c4/0x950 [ 595.766196][T16814] ? handle_bug+0x41/0x70 [ 595.770385][T16814] ? exc_invalid_op+0x1b/0x50 [ 595.775057][T16814] ? asm_exc_invalid_op+0x1b/0x20 [ 595.780003][T16814] ? btf_type_id_size+0x40f/0x950 [ 595.784806][T16814] ? btf_type_id_size+0x8c4/0x950 [ 595.789705][T16814] ? btf_type_id_size+0x8c4/0x950 [ 595.794529][T16814] map_check_btf+0x134/0xb90 [ 595.798979][T16814] ? __fget_files+0x2cb/0x330 [ 595.803469][T16814] ? bpf_prog_bind_map+0x970/0x970 [ 595.808523][T16814] ? btf_get_by_fd+0x13e/0x180 [ 595.813127][T16814] map_create+0x78c/0xcf0 [ 595.817317][T16814] __sys_bpf+0x2e6/0x7f0 [ 595.821370][T16814] ? __this_cpu_preempt_check+0x13/0x20 [ 595.826753][T16814] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 595.832007][T16814] ? __kasan_check_write+0x14/0x20 [ 595.836909][T16814] ? fpregs_restore_userregs+0x130/0x290 [ 595.842416][T16814] __x64_sys_bpf+0x7c/0x90 [ 595.846626][T16814] do_syscall_64+0x3d/0xb0 [ 595.850908][T16814] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 595.856606][T16814] RIP: 0033:0x7f0c07c7cea9 [ 595.860890][T16814] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 595.880328][T16814] RSP: 002b:00007f0c08a9a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 595.888598][T16814] RAX: ffffffffffffffda RBX: 00007f0c07db4050 RCX: 00007f0c07c7cea9 [ 595.896452][T16814] RDX: 0000000000000048 RSI: 0000000020000500 RDI: 0000000000000000 [ 595.904395][T16814] RBP: 00007f0c07cebff4 R08: 0000000000000000 R09: 0000000000000000 [ 595.912191][T16814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 595.919995][T16814] R13: 000000000000006e R14: 00007f0c07db4050 R15: 00007fffc73df468 [ 595.927807][T16814] [ 595.930640][T16814] ---[ end trace 0000000000000000 ]--- [ 599.406665][T16917] device pim6reg1 entered promiscuous mode [ 602.776686][T16992] syz-executor.2[16992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 602.776793][T16992] syz-executor.2[16992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.308193][T17236] syz-executor.1[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.320277][T17236] syz-executor.1[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.334235][T17236] syz-executor.1[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.347431][T17236] syz-executor.1[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.360001][T17236] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 613.893182][T17316] ªªªªªª: renamed from vlan0 [ 615.319944][T17375] Â: renamed from pim6reg1 [ 615.583645][T17393] device pim6reg1 entered promiscuous mode [ 616.404697][T17420] device pim6reg1 entered promiscuous mode [ 617.701785][T17477] device pim6reg1 entered promiscuous mode [ 619.647857][T17580] device pim6reg1 entered promiscuous mode [ 623.766505][ T28] audit: type=1400 audit(1718164093.193:141): avc: denied { setopt } for pid=17700 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 625.980913][T17800] device pim6reg1 entered promiscuous mode [ 627.075763][T17834] syz-executor.3[17834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.075834][T17834] syz-executor.3[17834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.329905][T17868] device pim6reg1 entered promiscuous mode [ 629.422582][T17904] device pim6reg1 entered promiscuous mode [ 629.474538][T17901] device pim6reg1 entered promiscuous mode [ 630.055128][T17922] device pim6reg1 entered promiscuous mode [ 630.132235][T17930] syz-executor.1[17930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.132312][T17930] syz-executor.1[17930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.222633][T17932] device pim6reg1 entered promiscuous mode [ 630.294393][T17936] device pim6reg1 entered promiscuous mode [ 630.343741][T17928] bridge0: port 1(bridge_slave_0) entered blocking state [ 630.350817][T17928] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.359485][T17928] device bridge_slave_0 entered promiscuous mode [ 630.373151][T17928] bridge0: port 2(bridge_slave_1) entered blocking state [ 630.380511][T17928] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.388106][T17928] device bridge_slave_1 entered promiscuous mode [ 630.415570][T17941] device pim6reg1 entered promiscuous mode [ 630.539423][ T43] device veth1_macvtap left promiscuous mode [ 630.545379][ T43] device veth0_vlan left promiscuous mode [ 630.751262][T17965] syz-executor.1[17965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.751316][T17965] syz-executor.1[17965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.669270][T17968] device pim6reg1 entered promiscuous mode [ 632.452036][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 632.484699][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 632.506857][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 632.515244][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 632.535837][ T3035] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.542736][ T3035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.550543][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 632.559183][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 632.567723][ T3035] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.574568][ T3035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 632.585102][T17989] device pim6reg1 entered promiscuous mode [ 632.623618][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 632.631225][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 632.643828][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 632.651905][T17992] device pim6reg1 entered promiscuous mode [ 632.681948][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 632.690744][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 632.706165][T17928] device veth0_vlan entered promiscuous mode [ 632.751251][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 632.761324][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 632.842147][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 632.865876][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 632.956800][T17928] device veth1_macvtap entered promiscuous mode [ 632.963378][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 632.971466][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 632.979468][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 632.991040][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 633.001357][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 633.045869][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 633.074910][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 633.156362][T18009] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 35595 (only 8 groups) [ 633.290270][T18026] device pim6reg1 entered promiscuous mode [ 633.387167][T18028] device syzkaller0 entered promiscuous mode [ 634.256941][T18060] device pim6reg1 entered promiscuous mode [ 635.798659][T18095] device pim6reg1 entered promiscuous mode [ 638.431579][T18168] device pim6reg1 entered promiscuous mode [ 639.196277][T18186] device sit0 entered promiscuous mode [ 640.979286][T18221] device pim6reg1 entered promiscuous mode [ 641.010000][T18224] device pim6reg1 entered promiscuous mode [ 642.487784][ T28] audit: type=1400 audit(1718164111.923:142): avc: denied { attach_queue } for pid=18246 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 643.099732][T18258] device pim6reg1 entered promiscuous mode [ 645.071332][T18307] device pim6reg1 entered promiscuous mode [ 649.603209][T18378] device pim6reg1 entered promiscuous mode [ 649.789719][T18392] device pim6reg1 entered promiscuous mode [ 650.696297][T18413] device pim6reg1 entered promiscuous mode [ 652.863520][T18454] device veth0_vlan left promiscuous mode [ 652.910444][T18454] device veth0_vlan entered promiscuous mode [ 652.989272][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.425935][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.451564][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.467967][T18461] device pim6reg1 entered promiscuous mode [ 653.654860][T18476] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.661813][T18476] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.669645][T18476] device bridge_slave_0 entered promiscuous mode [ 653.676620][T18476] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.683872][T18476] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.696077][T18476] device bridge_slave_1 entered promiscuous mode [ 654.701836][T18503] device pim6reg1 entered promiscuous mode [ 654.747951][T18507] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 654.752201][T18505] device pim6reg1 entered promiscuous mode [ 654.790480][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 654.797769][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 654.810899][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 654.819070][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 654.853585][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.860480][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 654.867822][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 654.876031][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 654.884565][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.891440][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 654.899388][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 655.413123][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 655.438022][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 655.472190][ T642] device bridge_slave_1 left promiscuous mode [ 655.495400][ T642] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.518350][ T642] device bridge_slave_0 left promiscuous mode [ 655.547494][ T642] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.585442][ T642] device veth0_vlan left promiscuous mode [ 656.510649][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 656.547705][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 656.578458][T18542] device pim6reg1 entered promiscuous mode [ 657.117072][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 657.131384][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 657.199478][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 657.273753][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.302666][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.327680][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.917541][T18476] device veth0_vlan entered promiscuous mode [ 657.937924][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 657.946615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 657.956198][T18476] device veth1_macvtap entered promiscuous mode [ 658.004232][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.014121][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.041781][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.051310][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.345256][T18584] device pim6reg1 entered promiscuous mode [ 659.926162][T18611] device pim6reg1 entered promiscuous mode [ 661.398620][T18686] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1 (only 8 groups) [ 664.221665][T18756] device pim6reg1 entered promiscuous mode [ 665.026946][T18770] device pim6reg1 entered promiscuous mode [ 665.595474][T18801] device pim6reg1 entered promiscuous mode [ 665.995078][T18806] device pim6reg1 entered promiscuous mode [ 666.044522][T18808] device pim6reg1 entered promiscuous mode [ 666.537831][T18838] device pim6reg1 entered promiscuous mode [ 667.008528][T18850] device pim6reg1 entered promiscuous mode [ 668.201474][T18885] device pim6reg1 entered promiscuous mode [ 683.029260][T19172] syz-executor.2[19172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.029342][T19172] syz-executor.2[19172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.851302][T19186] device pim6reg1 entered promiscuous mode [ 684.658208][T19230] device pim6reg1 entered promiscuous mode [ 686.204412][T19277] device pim6reg1 entered promiscuous mode [ 687.707395][T19315] device pim6reg1 entered promiscuous mode [ 688.481464][T19343] device pim6reg1 entered promiscuous mode [ 690.395784][T19378] device pim6reg1 entered promiscuous mode [ 693.665934][T19417] device pim6reg1 entered promiscuous mode [ 695.435890][T19452] device pim6reg1 entered promiscuous mode [ 696.843016][T19467] device pim6reg1 entered promiscuous mode [ 697.860997][T19493] device pim6reg1 entered promiscuous mode [ 700.010333][T19524] device pim6reg1 entered promiscuous mode [ 700.746403][T19517] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.753544][T19517] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.761336][T19517] device bridge_slave_0 entered promiscuous mode [ 700.775637][T19517] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.782631][T19517] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.847999][T19517] device bridge_slave_1 entered promiscuous mode [ 701.773372][ T43] device bridge_slave_1 left promiscuous mode [ 701.796870][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.812841][ T43] device bridge_slave_0 left promiscuous mode [ 701.825618][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.996114][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 704.009126][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 704.067317][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 704.117876][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 704.174973][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.181889][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 704.266414][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 704.328533][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 704.366949][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 704.373859][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 704.447409][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 704.455958][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 704.464450][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 704.472459][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 704.480537][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 704.502994][T19517] device veth0_vlan entered promiscuous mode [ 704.519092][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 704.528277][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 704.536135][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 704.543885][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 704.558856][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 704.568652][T19517] device veth1_macvtap entered promiscuous mode [ 704.582248][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 704.590868][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 704.674262][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 704.704626][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 704.837292][T19626] device pim6reg1 entered promiscuous mode [ 706.856857][T19654] device syzkaller0 entered promiscuous mode [ 711.486348][T19781] device pim6reg1 entered promiscuous mode [ 713.307256][T19823] device pim6reg1 entered promiscuous mode [ 715.643573][T19890] device pim6reg1 entered promiscuous mode [ 716.894841][T19925] device pim6reg1 entered promiscuous mode [ 719.201751][T19960] device pim6reg1 entered promiscuous mode [ 721.238694][T19995] device pim6reg1 entered promiscuous mode [ 722.609626][ T28] audit: type=1400 audit(1718164192.043:143): avc: denied { create } for pid=20019 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 723.917091][T20059] device veth1_macvtap left promiscuous mode [ 723.927480][T20059] device veth1_macvtap entered promiscuous mode [ 723.933664][T20059] device macsec0 entered promiscuous mode [ 730.403272][ T28] audit: type=1400 audit(1718164199.833:144): avc: denied { create } for pid=20224 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 731.927961][T20250] device pim6reg1 entered promiscuous mode [ 732.114109][T20261] device pim6reg1 entered promiscuous mode [ 733.236023][T20295] device pim6reg1 entered promiscuous mode [ 734.426617][T20322] device syzkaller0 entered promiscuous mode [ 735.329169][T20328] device pim6reg1 entered promiscuous mode [ 736.924626][T20367] device pim6reg1 entered promiscuous mode [ 738.417848][T20399] device syzkaller0 entered promiscuous mode [ 739.392093][T20416] syz-executor.0[20416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.392669][T20416] syz-executor.0[20416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.806494][T20524] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.826481][T20524] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.683410][T20563] device syzkaller0 entered promiscuous mode [ 745.584113][T20598] device pim6reg1 entered promiscuous mode [ 745.633756][T20602] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 747.914592][T20666] device pim6reg1 entered promiscuous mode [ 748.071671][T20674] device pim6reg1 entered promiscuous mode [ 749.191206][T20699] device pim6reg1 entered promiscuous mode [ 749.206320][T20694] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.213916][T20694] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.221621][T20694] device bridge_slave_0 entered promiscuous mode [ 749.233657][T20694] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.265066][T20694] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.284731][T20694] device bridge_slave_1 entered promiscuous mode [ 749.639505][T20694] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.646376][T20694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.653620][T20694] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.660500][T20694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.382256][ T642] device bridge_slave_1 left promiscuous mode [ 750.407408][ T642] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.435643][ T642] device bridge_slave_0 left promiscuous mode [ 750.455213][ T642] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.533985][ T642] device veth1_macvtap left promiscuous mode [ 750.540066][ T642] device veth0_vlan left promiscuous mode [ 750.808005][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.824332][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.950335][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 750.969371][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.012904][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 751.022497][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 751.030972][ T3035] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.037880][ T3035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.045453][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 751.054095][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 751.063142][ T3035] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.070035][ T3035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.077877][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 751.086277][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.133487][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 751.691260][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 751.708766][T20694] device veth0_vlan entered promiscuous mode [ 751.718969][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 751.727502][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 751.735690][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 751.743733][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 751.754075][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 751.761661][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 751.778209][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 751.786540][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 751.805601][T20694] device veth1_macvtap entered promiscuous mode [ 751.816353][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 751.824924][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 751.833513][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 751.872039][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 751.939467][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.871970][T20813] device pim6reg1 entered promiscuous mode [ 755.127433][T20852] device pim6reg1 entered promiscuous mode [ 755.412849][T20868] device pim6reg1 entered promiscuous mode [ 757.394516][T20913] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.998526][ T28] audit: type=1400 audit(1718164228.433:145): avc: denied { create } for pid=21006 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 762.429200][T21123] device syzkaller0 entered promiscuous mode [ 762.569640][T21136] device pim6reg1 entered promiscuous mode [ 764.179697][T21163] device pim6reg1 entered promiscuous mode [ 766.097437][T21239] device pim6reg1 entered promiscuous mode [ 768.757664][T21331] device pim6reg1 entered promiscuous mode [ 768.838146][T21336] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 769.595183][T21370] device pim6reg1 entered promiscuous mode [ 770.744195][T21405] device pim6reg1 entered promiscuous mode [ 771.767424][T21436] device pim6reg1 entered promiscuous mode [ 772.388147][T21451] device pim6reg1 entered promiscuous mode [ 773.427642][ T10] device bridge_slave_1 left promiscuous mode [ 773.433605][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.512660][ T10] device bridge_slave_0 left promiscuous mode [ 773.538939][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.558703][ T10] device veth0_vlan left promiscuous mode [ 775.225536][T21487] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.281665][T21487] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.289332][T21487] device bridge_slave_0 entered promiscuous mode [ 775.301589][T21487] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.308566][T21487] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.317845][T21487] device bridge_slave_1 entered promiscuous mode [ 775.549738][T21487] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.556615][T21487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 775.563748][T21487] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.570601][T21487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 775.588925][T21524] device pim6reg1 entered promiscuous mode [ 776.189188][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 776.206328][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.262923][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 776.278226][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 776.322056][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 776.330514][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 776.339428][T21195] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.346530][T21195] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.353814][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 776.362004][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.380279][T21195] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.387211][T21195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.399563][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 776.407675][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 776.422251][T21530] device pim6reg1 entered promiscuous mode [ 776.450055][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 776.460279][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 776.538235][T21487] device veth0_vlan entered promiscuous mode [ 776.548307][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 776.558269][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 776.566518][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 776.576877][T21195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.586734][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.595256][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.608474][T21487] device veth1_macvtap entered promiscuous mode [ 776.614935][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 776.677533][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 776.685577][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 777.345409][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 777.353597][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 777.362033][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 777.370698][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 777.421291][T21561] device pim6reg1 entered promiscuous mode [ 777.608573][T21580] device pim6reg1 entered promiscuous mode [ 780.908304][T21696] bridge0: port 3(team_slave_1) entered blocking state [ 780.915368][T21696] bridge0: port 3(team_slave_1) entered disabled state [ 780.930346][T21696] device team_slave_1 entered promiscuous mode [ 782.456763][T21733] device pim6reg1 entered promiscuous mode [ 785.191373][T21824] device syzkaller0 entered promiscuous mode [ 785.717817][T21833] device syzkaller0 entered promiscuous mode [ 785.732027][T21841] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 786.092859][T21874] device syzkaller0 entered promiscuous mode [ 786.521058][T21923] device syzkaller0 entered promiscuous mode [ 787.609931][T21954] device pim6reg1 entered promiscuous mode [ 787.674088][T21958] device pim6reg1 entered promiscuous mode [ 787.775534][T21964] device syzkaller0 entered promiscuous mode [ 789.021527][T21995] device pim6reg1 entered promiscuous mode [ 793.852788][T22114] device pim6reg1 entered promiscuous mode [ 794.014596][T22132] device veth1_macvtap left promiscuous mode [ 794.029361][T22126] device pim6reg1 entered promiscuous mode [ 794.043674][T22132] device veth1_macvtap entered promiscuous mode [ 794.061907][T22132] device macsec0 entered promiscuous mode [ 796.665737][T22188] device pim6reg1 entered promiscuous mode [ 800.165284][T22230] device pim6reg1 entered promiscuous mode [ 801.912522][T22263] device pim6reg1 entered promiscuous mode [ 802.988067][T22294] device pim6reg1 entered promiscuous mode [ 803.140731][T22308] device pim6reg1 entered promiscuous mode [ 804.213062][T22340] device pim6reg1 entered promiscuous mode [ 805.045236][T22381] device pim6reg1 entered promiscuous mode [ 806.409066][T22436] device pim6reg1 entered promiscuous mode [ 806.740536][T22461] bridge0: port 3(team_slave_1) entered blocking state [ 806.751884][T22461] bridge0: port 3(team_slave_1) entered disabled state [ 806.768114][T22461] device team_slave_1 entered promiscuous mode [ 807.397031][T22465] device pim6reg1 entered promiscuous mode [ 807.701359][T22485] device pim6reg1 entered promiscuous mode [ 807.833941][T22503] device pim6reg1 entered promiscuous mode [ 808.262551][T22536] device pim6reg1 entered promiscuous mode [ 808.446777][T22539] device pim6reg1 entered promiscuous mode [ 808.844926][T22575] device pim6reg1 entered promiscuous mode [ 809.064527][T22588] device pim6reg1 entered promiscuous mode [ 809.374228][T22595] device pim6reg1 entered promiscuous mode [ 810.015865][T22631] device pim6reg1 entered promiscuous mode [ 810.350201][T22665] device pim6reg1 entered promiscuous mode [ 810.498795][T22674] device pim6reg1 entered promiscuous mode [ 810.835195][T22693] device pim6reg1 entered promiscuous mode [ 812.962246][T22810] device pim6reg1 entered promiscuous mode [ 813.801258][T22844] device pim6reg1 entered promiscuous mode [ 814.244047][T22877] device pim6reg1 entered promiscuous mode [ 814.625825][T22896] device pim6reg1 entered promiscuous mode [ 814.961951][T22914] device syzkaller0 entered promiscuous mode [ 816.187111][ T28] audit: type=1400 audit(1718164285.613:146): avc: denied { create } for pid=23007 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 821.893648][T23182] device team_slave_1 entered promiscuous mode [ 821.906813][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 821.919102][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 823.926341][T23219] device pim6reg1 entered promiscuous mode [ 824.129674][T23235] device pim6reg1 entered promiscuous mode [ 827.706376][T23286] device pim6reg1 entered promiscuous mode [ 830.339317][T23363] device pim6reg1 entered promiscuous mode [ 834.605734][T23438] device pim6reg1 entered promiscuous mode [ 835.635246][T23455] device pim6reg1 entered promiscuous mode [ 836.395695][T23475] device pim6reg1 entered promiscuous mode [ 837.917039][T23507] device pim6reg1 entered promiscuous mode [ 837.925781][T23510] device pim6reg1 entered promiscuous mode [ 837.986830][T23512] device pim6reg1 entered promiscuous mode [ 839.193652][T23540] device pim6reg1 entered promiscuous mode [ 839.315657][T23553] device pim6reg1 entered promiscuous mode [ 840.576693][T23580] device pim6reg1 entered promiscuous mode [ 841.506616][T23595] device pim6reg1 entered promiscuous mode [ 843.679754][T23628] device pim6reg1 entered promiscuous mode [ 843.738942][T23638] device pim6reg1 entered promiscuous mode [ 846.690288][T23679] device pim6reg1 entered promiscuous mode [ 846.721499][T23682] device pim6reg1 entered promiscuous mode [ 847.157991][T23714] device pim6reg1 entered promiscuous mode [ 850.813662][T23805] device pim6reg1 entered promiscuous mode [ 850.956033][T23811] device pim6reg1 entered promiscuous mode [ 851.986650][T23840] device pim6reg1 entered promiscuous mode [ 852.015129][T23844] device pim6reg1 entered promiscuous mode [ 852.593030][T23868] device pim6reg1 entered promiscuous mode [ 852.732078][T23872] device pim6reg1 entered promiscuous mode [ 853.252526][T23906] device pim6reg1 entered promiscuous mode [ 854.257488][T23938] device pim6reg1 entered promiscuous mode [ 855.116036][T23969] device pim6reg1 entered promiscuous mode [ 856.305339][T24006] device pim6reg1 entered promiscuous mode [ 858.129957][T24048] device veth0_vlan left promiscuous mode [ 858.157731][T24048] device veth0_vlan entered promiscuous mode [ 858.628027][T24056] device pim6reg1 entered promiscuous mode [ 860.029603][T24075] device veth0_vlan left promiscuous mode [ 860.042664][T24075] device veth0_vlan entered promiscuous mode [ 860.060023][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 860.073919][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 860.084738][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 860.924059][T24119] device pim6reg1 entered promiscuous mode [ 864.535825][T24193] device pim6reg1 entered promiscuous mode [ 866.489727][T24237] ªªªªªª: renamed from vlan0 [ 867.528230][T24266] ªªªªªª: renamed from vlan0 [ 871.769578][T24397] device pim6reg1 entered promiscuous mode [ 872.416729][T24433] device pim6reg1 entered promiscuous mode [ 872.738959][T24460] device pim6reg1 entered promiscuous mode [ 873.769182][T24493] device pim6reg1 entered promiscuous mode [ 874.174336][T24521] device pim6reg1 entered promiscuous mode [ 874.957394][T24534] device pim6reg1 entered promiscuous mode [ 876.224140][T24597] device pim6reg1 entered promiscuous mode [ 876.269985][T24595] device pim6reg1 entered promiscuous mode [ 877.326080][T24629] device pim6reg1 entered promiscuous mode [ 878.216964][T24659] device pim6reg1 entered promiscuous mode [ 878.255576][T24661] device pim6reg1 entered promiscuous mode [ 878.947339][T24715] device pim6reg1 entered promiscuous mode [ 880.083509][T24766] device pim6reg1 entered promiscuous mode [ 881.009856][T24800] device pim6reg1 entered promiscuous mode [ 882.643235][T24848] device pim6reg1 entered promiscuous mode [ 883.317364][T24860] device veth0_vlan left promiscuous mode [ 883.372809][T24860] device veth0_vlan entered promiscuous mode [ 883.752254][T24885] device pim6reg1 entered promiscuous mode [ 884.701102][T24908] device veth0_vlan left promiscuous mode [ 884.721884][T24908] device veth0_vlan entered promiscuous mode [ 888.879719][T24939] device pim6reg1 entered promiscuous mode [ 889.362708][T24972] device pim6reg1 entered promiscuous mode [ 890.537545][T25000] device veth0_vlan left promiscuous mode [ 890.608448][T25000] device veth0_vlan entered promiscuous mode [ 893.930780][T25097] device pim6reg1 entered promiscuous mode [ 893.997449][T25099] device syzkaller0 entered promiscuous mode [ 895.365994][T25162] device pim6reg1 entered promiscuous mode [ 896.208314][T25194] device pim6reg1 entered promiscuous mode [ 904.515624][T25441] device pim6reg1 entered promiscuous mode [ 905.228850][T25487] device pim6reg1 entered promiscuous mode [ 905.293784][T25492] device pim6reg1 entered promiscuous mode [ 905.431159][T25505] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 905.654410][T25531] device pim6reg1 entered promiscuous mode [ 905.741339][T25537] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 906.127869][T25561] device pim6reg1 entered promiscuous mode [ 906.546085][T25604] device pim6reg1 entered promiscuous mode [ 907.662153][T25642] device pim6reg1 entered promiscuous mode [ 908.704927][T25681] device pim6reg1 entered promiscuous mode [ 908.865771][T25691] device pim6reg1 entered promiscuous mode [ 909.903844][T25750] device pim6reg1 entered promiscuous mode [ 911.041107][T25788] device pim6reg1 entered promiscuous mode [ 912.829280][T25844] device sit0 left promiscuous mode [ 914.387507][T25857] device sit0 entered promiscuous mode [ 914.552499][T25875] device syzkaller0 entered promiscuous mode [ 916.573645][T25936] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 917.464792][T25980] Â: renamed from pim6reg1 [ 920.111934][T26172] device pim6reg1 entered promiscuous mode [ 920.168629][T26173] device wg2 entered promiscuous mode [ 924.990100][T26403] device syzkaller0 entered promiscuous mode [ 927.006683][T26481] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 134217728 (only 8 groups) [ 928.527298][T26540] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 134217728 (only 8 groups) [ 928.774458][T26541] device syzkaller0 entered promiscuous mode [ 929.907316][T26679] device pim6reg1 entered promiscuous mode [ 931.489807][T26773] device wg2 left promiscuous mode [ 931.506377][T26773] device wg2 entered promiscuous mode [ 931.539050][T26771] device wg2 entered promiscuous mode [ 931.560074][T26771] tap0: tun_chr_ioctl cmd 1074025677 [ 931.566074][T26771] tap0: linktype set to 704 [ 931.574324][T26773] tap0: tun_chr_ioctl cmd 1074025677 [ 931.580685][T26773] tap0: linktype set to 704 [ 933.045261][T26814] device wg2 left promiscuous mode [ 933.063224][T26814] device wg2 entered promiscuous mode [ 933.123312][T26814] tap0: tun_chr_ioctl cmd 1074025677 [ 933.157939][T26814] tap0: linktype set to 704 [ 933.186115][T26822] device wg2 left promiscuous mode [ 933.199768][T26822] device wg2 entered promiscuous mode [ 933.243885][T26822] tap0: tun_chr_ioctl cmd 1074025677 [ 933.260424][T26822] tap0: linktype set to 704 [ 934.134417][T26853] device wg2 left promiscuous mode [ 935.063175][T26890] device wg2 entered promiscuous mode [ 935.075719][T26890] tap0: tun_chr_ioctl cmd 1074025677 [ 935.102960][T26890] tap0: linktype set to 704 [ 936.834282][T26943] device wg2 entered promiscuous mode [ 936.862714][T26943] tap0: tun_chr_ioctl cmd 1074025677 [ 936.867965][T26943] tap0: linktype set to 704 [ 937.014095][T26970] device wg2 left promiscuous mode [ 937.059377][T26970] device wg2 entered promiscuous mode [ 937.099345][T26970] tap0: tun_chr_ioctl cmd 1074025677 [ 937.112803][T26970] tap0: linktype set to 704 [ 937.354722][T27017] device wg2 entered promiscuous mode [ 937.396695][T27017] tap0: tun_chr_ioctl cmd 1074025677 [ 937.402251][T27017] tap0: linktype set to 704 [ 937.695041][T27049] device wg2 left promiscuous mode [ 937.725968][T27047] tap0: tun_chr_ioctl cmd 1074025677 [ 937.735756][T27047] tap0: linktype set to 512 [ 937.744020][T27049] device wg2 entered promiscuous mode [ 937.756808][T27049] tap0: tun_chr_ioctl cmd 1074025677 [ 937.762775][T27049] tap0: linktype set to 704 [ 938.915345][T27127] device wg2 left promiscuous mode [ 938.936172][T27127] device wg2 entered promiscuous mode [ 938.969822][T27127] tap0: tun_chr_ioctl cmd 1074025677 [ 938.978991][T27127] tap0: linktype set to 704 [ 938.985436][T27135] device wg2 left promiscuous mode [ 938.992887][T27135] device wg2 entered promiscuous mode [ 939.019470][T27135] tap0: tun_chr_ioctl cmd 1074025677 [ 939.025230][T27135] tap0: linktype set to 704 [ 939.767539][T27172] device wg2 left promiscuous mode [ 939.883430][T27172] device wg2 entered promiscuous mode [ 939.941030][T27172] tap0: tun_chr_ioctl cmd 1074025677 [ 939.951472][T27172] tap0: linktype set to 704 [ 940.226175][T27203] tap0: tun_chr_ioctl cmd 1074025677 [ 940.252620][T27203] tap0: linktype set to 512 [ 940.843681][T27237] tap0: tun_chr_ioctl cmd 1074025677 [ 940.852089][T27237] tap0: linktype set to 512 [ 944.269740][T27403] device wg2 left promiscuous mode [ 944.310280][T27403] device wg2 entered promiscuous mode [ 944.358481][T27403] tap0: tun_chr_ioctl cmd 1074025677 [ 944.403718][T27403] tap0: linktype set to 704 [ 945.721196][T27442] device wg2 left promiscuous mode [ 945.730725][T27447] device wg2 entered promiscuous mode [ 945.785581][T27442] tap0: tun_chr_ioctl cmd 1074025677 [ 945.791387][T27442] tap0: linktype set to 704 [ 947.833939][T27535] device wg2 left promiscuous mode [ 947.877457][T27535] device wg2 entered promiscuous mode [ 947.905767][T27535] tap0: tun_chr_ioctl cmd 1074025677 [ 947.941254][T27535] tap0: linktype set to 704 [ 953.438230][T27763] device wg2 left promiscuous mode [ 953.472103][T27763] device wg2 entered promiscuous mode [ 953.951575][T27806] device wg2 left promiscuous mode [ 953.977411][T27806] device wg2 entered promiscuous mode [ 955.596918][T27859] device wg2 left promiscuous mode [ 955.623315][T27859] device wg2 entered promiscuous mode [ 958.910029][T28028] device wg2 left promiscuous mode [ 958.957614][T28036] device wg2 entered promiscuous mode [ 958.972025][T28038] device wg2 entered promiscuous mode [ 958.980221][T28028] tap0: tun_chr_ioctl cmd 1074025677 [ 958.985464][T28028] tap0: linktype set to 704 [ 960.833669][T28094] device wg2 left promiscuous mode [ 960.946343][T28095] device wg2 entered promiscuous mode [ 961.011624][T28094] tap0: tun_chr_ioctl cmd 1074025677 [ 961.033068][T28094] tap0: linktype set to 704 [ 961.847719][T28127] device wg2 left promiscuous mode [ 961.868924][T28127] device wg2 entered promiscuous mode [ 961.910827][T28127] tap0: tun_chr_ioctl cmd 1074025677 [ 961.929967][T28127] tap0: linktype set to 704 [ 964.637674][T28207] device wg2 left promiscuous mode [ 964.655385][T28207] tap0: tun_chr_ioctl cmd 1074025677 [ 964.667048][T28207] tap0: linktype set to 704 [ 965.835147][T28229] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.845764][T28229] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.853583][T28229] device bridge_slave_0 entered promiscuous mode [ 965.861366][T28229] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.868466][T28229] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.875786][T28229] device bridge_slave_1 entered promiscuous mode [ 966.968822][T28281] device wg2 left promiscuous mode [ 967.005292][ T642] device team_slave_1 left promiscuous mode [ 967.011853][ T642] bridge0: port 3(team_slave_1) entered disabled state [ 967.031493][ T642] device bridge_slave_1 left promiscuous mode [ 967.040872][ T642] bridge0: port 2(bridge_slave_1) entered disabled state [ 967.048293][ T642] device bridge_slave_0 left promiscuous mode [ 967.054241][ T642] bridge0: port 1(bridge_slave_0) entered disabled state [ 967.061900][ T642] device veth1_macvtap left promiscuous mode [ 967.194049][T28292] tap0: tun_chr_ioctl cmd 1074025677 [ 967.200363][T28292] tap0: linktype set to 704 [ 967.218307][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 967.229851][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 967.260639][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 967.282448][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 967.299876][ T3030] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.306759][ T3030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 967.318610][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 967.338271][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 967.376391][ T3030] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.383295][ T3030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 967.392374][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 967.417996][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 967.426295][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 967.434764][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 967.443214][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 967.472464][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 967.493085][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 967.530685][T28229] device veth0_vlan entered promiscuous mode [ 967.586671][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 967.617938][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 967.659392][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 967.666746][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 967.753066][T28229] device veth1_macvtap entered promiscuous mode [ 968.348167][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 968.417354][T28332] tap0: tun_chr_ioctl cmd 1074025677 [ 968.423301][T28332] tap0: linktype set to 704 [ 968.442653][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 968.452450][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 968.461111][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 968.470278][ T3030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 970.812279][T28455] device wg2 entered promiscuous mode [ 971.724217][T28488] device wg2 left promiscuous mode [ 971.831760][T28495] device wg2 entered promiscuous mode [ 978.680039][T28720] tap0: tun_chr_ioctl cmd 1074025677 [ 978.685210][T28720] tap0: linktype set to 704 [ 986.368930][T28955] device wg2 entered promiscuous mode [ 986.391695][T28955] tap0: tun_chr_ioctl cmd 1074025677 [ 986.396912][T28955] tap0: linktype set to 704 [ 986.440241][T28960] device wg2 left promiscuous mode [ 987.100575][T28965] device wg2 entered promiscuous mode [ 987.162683][T28960] tap0: tun_chr_ioctl cmd 1074025677 [ 987.185733][T28960] tap0: linktype set to 704 [ 987.376965][T28997] device wg2 entered promiscuous mode [ 987.390342][T28997] tap0: tun_chr_ioctl cmd 1074025677 [ 987.407896][T28997] tap0: linktype set to 704 [ 991.725753][T29081] device wg2 left promiscuous mode [ 991.798413][T29081] device wg2 entered promiscuous mode [ 991.810652][T29089] device wg2 left promiscuous mode [ 991.824005][T29081] tap0: tun_chr_ioctl cmd 1074025677 [ 991.829280][T29081] tap0: linktype set to 704 [ 991.834125][T29089] device wg2 entered promiscuous mode [ 991.844674][T29089] tap0: tun_chr_ioctl cmd 1074025677 [ 991.850376][T29089] tap0: linktype set to 704 [ 991.906278][T29096] device wg2 left promiscuous mode [ 991.935743][T29096] device wg2 entered promiscuous mode [ 991.970614][T29096] tap0: tun_chr_ioctl cmd 1074025677 [ 991.975900][T29096] tap0: linktype set to 704 [ 992.663221][T29125] device wg2 left promiscuous mode [ 992.726849][T29125] device wg2 entered promiscuous mode [ 992.754338][T29125] tap0: tun_chr_ioctl cmd 1074025677 [ 992.777340][T29125] tap0: linktype set to 704 [ 992.806180][T29129] device wg2 left promiscuous mode [ 992.902620][T29129] device wg2 entered promiscuous mode [ 992.915089][T29129] tap0: tun_chr_ioctl cmd 1074025677 [ 992.946423][T29129] tap0: linktype set to 704 [ 994.057755][T29171] device wg2 left promiscuous mode [ 994.114339][T29172] device wg2 entered promiscuous mode [ 994.134518][T29171] tap0: tun_chr_ioctl cmd 1074025677 [ 994.139801][T29171] tap0: linktype set to 704 [ 994.298906][T29198] device wg2 left promiscuous mode [ 994.924979][T29198] device wg2 entered promiscuous mode [ 994.941203][T29205] tap0: tun_chr_ioctl cmd 1074025677 [ 994.957285][T29205] tap0: linktype set to 704 [ 997.030817][T29310] device syzkaller0 entered promiscuous mode [ 997.130272][T29324] tap0: tun_chr_ioctl cmd 1074025677 [ 997.156461][T29324] tap0: linktype set to 704 [ 998.074849][T29363] syz-executor.0[29363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.074920][T29363] syz-executor.0[29363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.108916][T29363] syz-executor.0[29363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.145285][T29363] syz-executor.0[29363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 998.500505][T29392] Â: renamed from pim6reg1 [ 998.798935][T29402] device syzkaller0 entered promiscuous mode [ 999.393545][T29419] device syzkaller0 entered promiscuous mode [ 999.433911][T29420] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1 (only 8 groups) [ 1000.891322][T29488] device syzkaller0 entered promiscuous mode [ 1005.925166][T29679] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 1007.731571][T29791] device wg2 left promiscuous mode [ 1007.739915][T29791] device wg2 entered promiscuous mode [ 1007.769507][T29791] tap0: tun_chr_ioctl cmd 1074025677 [ 1007.780109][T29791] tap0: linktype set to 704 [ 1008.691822][T29827] device wg2 left promiscuous mode [ 1008.706578][T29827] device wg2 entered promiscuous mode [ 1008.715951][T29834] Â: renamed from pim6reg1 [ 1008.746094][T29827] tap0: tun_chr_ioctl cmd 1074025677 [ 1008.752946][T29827] tap0: linktype set to 704 [ 1009.095807][T29866] device wg2 left promiscuous mode [ 1009.139139][T29866] device wg2 entered promiscuous mode [ 1009.173483][T29872] device syzkaller0 entered promiscuous mode [ 1009.182652][T29866] tap0: tun_chr_ioctl cmd 1074025677 [ 1009.188972][T29866] tap0: linktype set to 704 [ 1010.359167][T29908] device wg2 left promiscuous mode [ 1010.436834][T29913] device wg2 entered promiscuous mode [ 1010.461915][T29908] tap0: tun_chr_ioctl cmd 1074025677 [ 1010.502675][T29908] tap0: linktype set to 704 [ 1015.085708][T29957] device wg2 left promiscuous mode [ 1015.109456][T29957] device wg2 entered promiscuous mode [ 1015.133708][T29957] tap0: tun_chr_ioctl cmd 1074025677 [ 1015.139556][T29957] tap0: linktype set to 704 [ 1016.321829][T30007] device wg2 left promiscuous mode [ 1016.337915][T30007] device wg2 entered promiscuous mode [ 1016.348020][T30007] tap0: tun_chr_ioctl cmd 1074025677 [ 1016.353186][T30007] tap0: linktype set to 704 [ 1017.962673][T30046] device wg2 left promiscuous mode [ 1018.010298][T30046] device wg2 entered promiscuous mode [ 1018.018605][T30046] tap0: tun_chr_ioctl cmd 1074025677 [ 1018.034315][T30046] tap0: linktype set to 704 [ 1018.910158][T30085] device wg2 left promiscuous mode [ 1018.933670][T30085] device wg2 entered promiscuous mode [ 1018.978449][T30085] tap0: tun_chr_ioctl cmd 1074025677 [ 1019.013502][T30085] tap0: linktype set to 704 [ 1021.166524][T30131] device wg2 left promiscuous mode [ 1021.239175][T30139] device wg2 entered promiscuous mode [ 1021.268353][T30131] tap0: tun_chr_ioctl cmd 1074025677 [ 1021.302213][T30131] tap0: linktype set to 704 [ 1021.333178][T30142] device wg2 left promiscuous mode [ 1021.399721][T30142] device wg2 entered promiscuous mode [ 1021.430784][T30144] device syzkaller0 entered promiscuous mode [ 1021.466468][T30142] tap0: tun_chr_ioctl cmd 1074025677 [ 1021.472384][T30142] tap0: linktype set to 704 [ 1026.125727][T30246] device wg2 left promiscuous mode [ 1026.134668][T30246] device wg2 entered promiscuous mode [ 1026.146678][T30246] tap0: tun_chr_ioctl cmd 1074025677 [ 1026.152001][T30246] tap0: linktype set to 704 [ 1027.805466][T30293] device sit0 left promiscuous mode [ 1027.877273][T30293] device sit0 entered promiscuous mode [ 1028.870519][ T28] audit: type=1400 audit(1718164498.273:147): avc: denied { create } for pid=30320 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1029.530017][T30345] device sit0 entered promiscuous mode [ 1032.223411][T30433] device pim6reg1 entered promiscuous mode [ 1032.463267][T30453] syz-executor.2[30453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1032.463342][T30453] syz-executor.2[30453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1032.625021][T30465] device pim6reg1 entered promiscuous mode [ 1036.948344][T30521] device wg2 left promiscuous mode [ 1036.971248][T30521] device wg2 entered promiscuous mode [ 1036.983785][T30521] tap0: tun_chr_ioctl cmd 1074025677 [ 1036.989936][T30521] tap0: linktype set to 704 [ 1040.132356][T30616] device syzkaller0 entered promiscuous mode [ 1041.385850][T30656] device syzkaller0 entered promiscuous mode [ 1041.480126][T30670] syz-executor.1[30670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1041.480209][T30670] syz-executor.1[30670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1042.139462][T30699] tap0: tun_chr_ioctl cmd 2147767521 [ 1042.494464][T30715] bridge0: port 1(bridge_slave_0) entered blocking state [ 1042.544360][T30715] bridge0: port 1(bridge_slave_0) entered disabled state [ 1042.582572][T30715] device bridge_slave_0 entered promiscuous mode [ 1042.594004][T30715] bridge0: port 2(bridge_slave_1) entered blocking state [ 1042.601244][T30715] bridge0: port 2(bridge_slave_1) entered disabled state [ 1042.608825][T30715] device bridge_slave_1 entered promiscuous mode [ 1044.411189][T30765] device syzkaller0 entered promiscuous mode [ 1044.549399][ T583] device team_slave_1 left promiscuous mode [ 1044.555258][ T583] bridge0: port 3(team_slave_1) entered disabled state [ 1044.562550][ T583] device bridge_slave_1 left promiscuous mode [ 1044.568596][ T583] bridge0: port 2(bridge_slave_1) entered disabled state [ 1044.575923][ T583] device bridge_slave_0 left promiscuous mode [ 1044.582300][ T583] bridge0: port 1(bridge_slave_0) entered disabled state [ 1044.591141][ T583] device veth1_macvtap left promiscuous mode [ 1044.597088][ T583] device veth0_vlan left promiscuous mode [ 1044.839370][T30772] device pim6reg1 entered promiscuous mode [ 1044.848545][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1044.856210][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1044.874050][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1044.882648][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1044.891372][T11861] bridge0: port 1(bridge_slave_0) entered blocking state [ 1044.898270][T11861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1044.930951][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1044.949653][T11861] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1044.964456][T11861] bridge0: port 2(bridge_slave_1) entered blocking state [ 1044.971402][T11861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1044.996944][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1045.008701][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1045.016669][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1045.027497][ C0] softirq: huh, entered softirq 9 RCU ffffffff8160d1a0 with preempt_count 00000101, exited with 00000100? [ 1045.041106][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1045.049093][ T3035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1045.471179][T30789] BUG: scheduling while atomic: syz-executor.2/30789/0x00000002 [ 1045.479078][T30789] Modules linked in: [ 1045.483700][T30789] Preemption disabled at: [ 1045.483718][T30789] [] bpf_bprintf_prepare+0x118/0x1360 [ 1045.495015][T30789] CPU: 0 PID: 30789 Comm: syz-executor.2 Tainted: G W 6.1.78-syzkaller-00002-g65aed0e2f758 #0 [ 1045.506431][T30789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1045.516312][T30789] Call Trace: [ 1045.519441][T30789] [ 1045.522223][T30789] dump_stack_lvl+0x151/0x1b7 [ 1045.526733][T30789] ? bpf_bprintf_prepare+0x118/0x1360 [ 1045.531935][T30789] ? bpf_bprintf_prepare+0x118/0x1360 [ 1045.537149][T30789] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1045.542639][T30789] ? bpf_bprintf_prepare+0x118/0x1360 [ 1045.547832][T30789] dump_stack+0x15/0x1b [ 1045.551821][T30789] __schedule_bug+0x195/0x260 [ 1045.556337][T30789] ? __kasan_check_write+0x14/0x20 [ 1045.561280][T30789] ? bpf_prog_test_run+0x441/0x630 [ 1045.566239][T30789] ? cpu_util_update_eff+0x10e0/0x10e0 [ 1045.571637][T30789] ? bpf_prog_query+0x260/0x260 [ 1045.576299][T30789] ? selinux_bpf+0xd2/0x100 [ 1045.580641][T30789] __schedule+0xcf7/0x1550 [ 1045.584891][T30789] ? __sys_bpf+0x59f/0x7f0 [ 1045.589144][T30789] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1045.594350][T30789] ? kvm_sched_clock_read+0x18/0x40 [ 1045.599389][T30789] ? __sched_text_start+0x8/0x8 [ 1045.604088][T30789] schedule+0xc3/0x180 [ 1045.607978][T30789] exit_to_user_mode_loop+0x4e/0xa0 [ 1045.613012][T30789] exit_to_user_mode_prepare+0x5a/0xa0 [ 1045.618310][T30789] syscall_exit_to_user_mode+0x26/0x140 [ 1045.623690][T30789] do_syscall_64+0x49/0xb0 [ 1045.627945][T30789] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1045.633578][T30789] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1045.639327][T30789] RIP: 0033:0x7ff69767cea9 [ 1045.643563][T30789] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1045.663003][T30789] RSP: 002b:00007ff69831e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 2024/06/12 03:55:15 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 1045.671246][T30789] RAX: 0000000000000000 RBX: 00007ff6977b3f80 RCX: 00007ff69767cea9 [ 1045.679058][T30789] RDX: 000000000000004c RSI: 0000000020000240 RDI: 000000000000000a [ 1045.686871][T30789] RBP: 00007ff6976ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 1045.694683][T30789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1045.702494][T30789] R13: 000000000000000b R14: 00007ff6977b3f80 R15: 00007fff0ff218d8 [ 1045.710319][T30789]