last executing test programs: 4.392962654s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={0x1, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x3ff}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001800000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], 0x0, 0x1d0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r4, 0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r7, 0x40047451, 0x20004000) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0xa3}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) (async) recvmsg(r6, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r4, @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x5, 0x10001, 0x5, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r8, @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000100), 0x1001) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) (async) write$cgroup_pid(r10, &(0x7f0000000340), 0x1001) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) 4.242643967s ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7023cc92c19000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)=0x2) 4.185459006s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x6, 0x5, 0x4, 0x2000, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000400000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000030dca5b21bf904b20b000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe81) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000040)=0x18, &(0x7f0000000140)=r2}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x42400) sendmsg$inet(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="38a0", 0x2}], 0x1}, 0x0) recvmsg$unix(r6, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000680)=""/109, 0x2}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 4.134024404s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES8=r0], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00f90a0000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000021007b560000000000400000ac8f6e5080024a00"], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB='\x00\x00\x00!\x00{V\x00\x00\x00\x00\x00'], &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r5, 0x11, 0x0, 0x0, @prog_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) 4.033730389s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x4, 0x5}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x13, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2ffdb1d4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x1, 0x2, 0x1, 0x9, 0x4d776ae55f7b1820, 0x8, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x57}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x9, 0xe4, &(0x7f00000004c0)=""/228, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[r0, r0, r0, r0, r0, r0, r0], &(0x7f00000003c0)=[{0x2, 0x2, 0xb, 0xb}, {0x2, 0x3, 0x1}], 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000c41b00000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='ext4_drop_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 4.024534851s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000110000000000000018110000", @ANYRESHEX, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) (async) write$cgroup_freezer_state(r1, &(0x7f0000000400)='FROZEN\x00', 0x7) (async) write$cgroup_freezer_state(r1, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) mkdir(0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000108000000b70400000000d85393570000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f8ffffff8500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x81, 0x8f, 0x1694, r2, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x1, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r9}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 1.008632195s ago: executing program 1: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x4, 0x404, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x1, 0x4, 0x8}, 0x48) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000005c0)='percpu_alloc_percpu\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000800)='ext4_es_insert_delayed_block\x00', r3}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r7, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000540)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='ext4_es_insert_delayed_block\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x2009) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r11, &(0x7f0000000300), 0x20000000}, 0x20) 1.003709715s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000f7b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002680)={&(0x7f00000026c0)='thermal_temperature\x00', r4}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) close(r2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000015c0)={&(0x7f00000005c0)="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", 0x0, 0x0, 0x0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000880), &(0x7f0000000000)=""/5, 0x2}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2a, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="1800e1ffffffffffffff00000100010018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001847000003000000000000000000000011ab01001000000087a40c00fcffffffbf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x25, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000000c0)={0x0, 0x4, 0x2, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000300)=[r0, r6], &(0x7f0000000340)=[{0x5, 0x3, 0x3, 0xb}, {0x0, 0x2, 0xf, 0xc}, {0x0, 0x2, 0x2, 0x7}]}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x1b, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000700000000000000ff07000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004c0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000007f9810000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf910000000000020000000000008500000084000000b7000000000b000095000000000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000680)=""/4096, 0x40f00, 0x48, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x8, &(0x7f0000001680)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000016c0)={0x1, 0x1, 0xde, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001700)=[0xffffffffffffffff], &(0x7f0000001740)=[{0x4, 0x1, 0xe, 0x6}], 0x10, 0x9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001880)={0x11, 0x19, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000070000000000000026ae396618110000", @ANYRES32, @ANYBLOB="0000000000000000b702200014000000b7030000000000008500000083000000bf090000000000000095000000000000001811000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000000831050080000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x55, &(0x7f0000000400)=""/85, 0x41000, 0x4, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x3, 0x5, 0x0, 0xf2}, 0x10, 0x0, r7, 0x0, &(0x7f0000001840)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1c, 0x4, &(0x7f0000002600)=ANY=[@ANYBLOB="18000000ff7f0000000000000000000085201b000200000095000000e000000020eec0d01762598f1e894ae4226f8beec8b19f843f9d460dbfe0b36a5587cb5df6b63bb9404d12897425545c0550d77bb758dac331a1ec44a0d707cff358b5fb1cf07ea7b9b5bdf58d00"/119], &(0x7f00000004c0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001600)=""/4096, 0x41000, 0x12, '\x00', 0x0, 0x1a, r0, 0x8, &(0x7f0000000900)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000940)=[0xffffffffffffffff], &(0x7f0000000980)=[{0x2, 0x5, 0x7, 0x6}, {0x4, 0x4, 0x6, 0xb}, {0x3, 0x2, 0x9, 0xc}, {0x4, 0x1, 0x9, 0xc}], 0x10, 0xffff5f60}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000001f180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='ext4_unlink_exit\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 986.339038ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000040)={r2, &(0x7f0000000300), &(0x7f0000001100)=""/4109}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000005c0)={r2, &(0x7f0000000440), &(0x7f0000000540)=""/73, 0x2}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0x20, 0x4, 0x6}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000040)={r3, &(0x7f0000000300), &(0x7f0000001100)=""/4109}, 0x20) close(r1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000005c0)={r3, &(0x7f0000000440), &(0x7f0000000540)=""/73, 0x2}, 0x20) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000002140)='blkio.throttle.io_serviced\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x12}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={r1, 0x58, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f00)={0x6, 0x8, &(0x7f0000000c40)=ANY=[@ANYBLOB="85000000bf2018160085", @ANYRES32=r1, @ANYBLOB="00000000000000005b960800010000001848000002000000000000000000000018480000feffffff0000000000000000"], &(0x7f0000000c80)='GPL\x00', 0x382, 0x5e, &(0x7f0000000cc0)=""/94, 0x41100, 0x2, '\x00', r5, 0x25, r1, 0x8, &(0x7f0000000e00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0x8, 0x20000, 0x80000001}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000e80)=[r1, r0], &(0x7f0000000ec0)=[{0x0, 0x1, 0x8, 0x2}], 0x10, 0x5}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x7, '\x00', 0x0, r1, 0x5}, 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000002180)='syz0\x00', 0x1ff) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r6, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x61, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f0000000680), 0x8, 0x60, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000840)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3a0, '\x00', r7, r1, 0x5, 0x3, 0x3}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480), 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r8}, &(0x7f0000001340), &(0x7f0000001380)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x4, &(0x7f0000001800)={{r8}, &(0x7f0000001780)=0x4, &(0x7f00000017c0)='%-010d \x00'}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000200)='./file0\x00', 0x88) 986.167978ms ago: executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x7800, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 959.469562ms ago: executing program 3: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x0, 0x8000, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xff, 0x80, 0x1, 0x20, 0x1, 0x815, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4, 0xf}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) (async) sendmsg$unix(r4, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000400)="8d", 0x1}], 0x300, &(0x7f0000001a00)=ANY=[@ANYBLOB="14000000000000000104000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x5000}, 0x0) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x33, &(0x7f0000000040), 0x10) (async) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r7}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYRES8=r8], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0xffffffffffffffa5) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4, 0x7fe2, 0x5}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x0, r11}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x9c) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r12}, 0x10) (async) r13 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r13}, 0x10) (async) mkdir(0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x8000, 0x5, 0xf3, 0x200, r10, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4, 0xc}, 0x48) 943.620814ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='ext4_ext_remove_space\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0xfff6) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='ext4_ext_remove_space\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 940.159975ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000001c0)={0x5e54}, 0x8) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r5 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a40), 0x0}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000cc0)={0x1b, 0x0, 0x0, 0xfffffff9, 0x0, r6, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x2}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 903.890011ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x891f, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 899.499322ms ago: executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x40001, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1f, 0x29, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000ffff00000000000000800000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000001831000002000000000000000000000018120000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=0x1, @ANYBLOB="0004000000000000b70500000800000085000000a500000885200000020000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@bloom_filter={0x1e, 0x3, 0xf, 0xfffffffd, 0x165b, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x8, 0x3, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa2000000000000070200009dffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000030000000d0000000000000904000000070000000000000b040000000d0000000000000700000000070000000000000804000000000000"], &(0x7f0000000540)=""/167, 0x4b, 0xa7, 0x0, 0x33c}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000200001ec3461d18110000c139f4b31166b5602f2f", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000003e8000000000000000018110000e5cbe6d91dc039", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r5}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000540)='cpu&00\t||') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r6}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000800)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0185879, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r10, &(0x7f0000000000), 0x248800) 884.057764ms ago: executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r4, 0x18000000000002a0, 0xfffffffffffffeca, 0xfffffffffffffe54, &(0x7f0000000080)="0180000000000000009b2cc7c1357394abe88503046d37bc17251d3dc245f521c89854826bcf", 0x0, 0x0, 0x60000000, 0x0, 0xfffffffffffffff2, 0x0, 0x0, 0x3}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b708000038ba9a7e7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$tipc(r6, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r6, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000540), 0x4) (async) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) recvmsg(0xffffffffffffffff, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r10}, &(0x7f0000000280), &(0x7f00000002c0)=r11}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r12}, 0x10) ioctl$TUNSETOFFLOAD(r9, 0x40086607, 0x20001412) (async) ioctl$TUNSETOFFLOAD(r9, 0x40086607, 0x20001412) close(0xffffffffffffffff) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r13}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r13}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) 873.889916ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x8, [@volatile={0x7}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x9}}, @fwd={0xa}, @var={0xe, 0x0, 0x0, 0xe, 0x1, 0x1}, @struct={0xf, 0x8, 0x0, 0x4, 0x0, 0x0, [{0xc, 0x3, 0x2}, {0xb, 0x3, 0x2}, {0xd, 0x2, 0x80}, {0x9, 0x4, 0x3}, {0xa, 0x7, 0xfffdffff}, {0x3, 0x3, 0x7}, {0x0, 0x1, 0xb5ef}, {0x3, 0x3, 0x1a}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x5, 0x4}, {0x6, 0x4}, {}, {0x6, 0x1}, {0xf, 0x5}, {0xb, 0x4}, {0xf, 0x5}, {0x1}]}, @union={0x9, 0x0, 0x0, 0x5, 0x0, 0x7}]}, {0x0, [0x61, 0x2e, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000340)=""/80, 0x124, 0x50, 0x0, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x7798, 0x1, 0x4, 0x828, r0, 0x2, '\x00', r1, r2, 0x4, 0x4, 0x0, 0xe}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='track_foreign_dirty\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r11, &(0x7f0000000240)='THAWED\x00', 0x7) 818.707054ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x9}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) 814.355775ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000300)='jbd2_checkpoint_stats\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000300)='jbd2_checkpoint_stats\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='freezer.state\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='freezer.state\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001100), 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000280)) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000d924d015246b00002cfe3cf86a000000000000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r9}, 0x10) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f00000002c0)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f00000000c0)=ANY=[@ANYBLOB="8fedcb7807001175f3751de486dd630080fc47ae2c00db5b685c58bbcfe8875a010000000000000000000000000000000000ac1414aa11"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r14, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x58}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x58, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r15}, 0xc) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) 793.703548ms ago: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x7, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xaf}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xe, 0x4, 0x8, 0xff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x405}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x15, &(0x7f0000000640)={{r2}, &(0x7f00000005c0), 0x0}, 0x20) 767.468432ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000001c0)}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000a40)=""/192, 0xc0}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r8, 0x0, 0x20000000}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 700.455422ms ago: executing program 1: perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x102, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'macsec0\x00', 0x400}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'macsec0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x41100}, 0x90) 632.520582ms ago: executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) write$cgroup_devices(r3, &(0x7f0000000180)=ANY=[], 0xffdd) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 493.859524ms ago: executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xf974a457bb636ff6}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000005208c6b280e9d239ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 176.282083ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001419) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xe3589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000b00000000000000000000000018110000b0fa6a29840e32b7aa2f", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000b0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000008b00000095"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) 74.366569ms ago: executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffd20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffc0000}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8930, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) 67.17942ms ago: executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x1, 0x100, 0x8, 0x11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0700000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f85920f3d503000008000000b7040000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0700000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f85920f3d503000008000000b7040000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000080), &(0x7f0000000200)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c0aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e23729e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1095100002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd9200800000000000080b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d2943e6f5f828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f8586826c69fa35ba5cbc3f2db1516ffc5c6e3ff63b473aa192b0093a4fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4a4ff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea0000000000000001e0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cfeff4c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a176ead4bd5e25b8f2e84728a1a000000000a88b8e123414e73e614ee6701b3dd9fb9f774c757cc544bbd7d25ce47c0ae90985df115df47183117216986274247c5af80d662d4c9b76d7721bf0a1886eafa7d3e42ac9ab9a78a84a4fb8ea575de12df182f821b87cf2e2b3c278463282fbb64563adba68de60e58eccefb3f12d24f9c028402c5b5092aa5df076b9f39813b3b539e9ac97b50ef4dd611d06cf2327616130e1d5df26fbffa0732a96eb43d5dca2c041b1d7b7c224926773fdaf4025ecc29fb801f21e98f4b6bfc3d582fcd8567d97e6fdbf764b99c9696260e64f182310fbb0277719723ae405751e818176cac5964494b6ffa92cb64a2dbd29570c19e97bf0aa6f80219ee40d5a5ef11f00f76b028244ddd1155d613af7d4d7d8a4e4a0c7d294b4c127ac1b2513fd490783b32c716eed84220b13b0eba124d2d98af9"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c0aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e23729e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1095100002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd9200800000000000080b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d2943e6f5f828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f8586826c69fa35ba5cbc3f2db1516ffc5c6e3ff63b473aa192b0093a4fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4a4ff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea0000000000000001e0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cfeff4c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a176ead4bd5e25b8f2e84728a1a000000000a88b8e123414e73e614ee6701b3dd9fb9f774c757cc544bbd7d25ce47c0ae90985df115df47183117216986274247c5af80d662d4c9b76d7721bf0a1886eafa7d3e42ac9ab9a78a84a4fb8ea575de12df182f821b87cf2e2b3c278463282fbb64563adba68de60e58eccefb3f12d24f9c028402c5b5092aa5df076b9f39813b3b539e9ac97b50ef4dd611d06cf2327616130e1d5df26fbffa0732a96eb43d5dca2c041b1d7b7c224926773fdaf4025ecc29fb801f21e98f4b6bfc3d582fcd8567d97e6fdbf764b99c9696260e64f182310fbb0277719723ae405751e818176cac5964494b6ffa92cb64a2dbd29570c19e97bf0aa6f80219ee40d5a5ef11f00f76b028244ddd1155d613af7d4d7d8a4e4a0c7d294b4c127ac1b2513fd490783b32c716eed84220b13b0eba124d2d98af9"], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 60.95709ms ago: executing program 2: write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xffffff6a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000ff0f0000000000ff000000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1a04"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) ioctl$TUNSETOFFLOAD(r1, 0x8008743f, 0x20000000) 15.728767ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000102085000000040000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000d9850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='ext4_writepages_result\x00', r0}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x2041) 0s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES64=r0], 0x0}, 0x90) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) (rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40086602, &(0x7f0000000280)={'veth1_virt_wifi\x00', @local}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) (async) sendmsg$tipc(r5, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r5, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) (async, rerun: 32) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) close(r5) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) (async, rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x200, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070004001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000700)=ANY=[@ANYBLOB="00006400000000000400000000000000000000d13962fca49cd60115c534d63c71565dd4102211284ced7f0ff3989727b90f52704a27dcf5d75a762ee62c0806129bfc75efcb03025e33d5835dd81e2639e739fa8e367339956710d38e5a0eaecc80a36105", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000", @ANYRESOCT=r1], 0x0, 0x0, 0x45, 0x0, 0x0, 0x2, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r9}, 0x10) (async, rerun: 64) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (rerun: 64) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) kernel console output (not intermixed with test programs): [ 622.589033][T32418] device syzkaller0 entered promiscuous mode [ 623.041801][T32435] device syzkaller0 entered promiscuous mode [ 623.529971][T32467] tap0: tun_chr_ioctl cmd 1074025677 [ 623.537215][T32467] tap0: linktype set to 773 [ 623.822740][T32496] device pim6reg1 entered promiscuous mode [ 626.313898][T32689] bpf_get_probe_write_proto: 8 callbacks suppressed [ 626.313905][T32689] syz-executor.1[32689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.321033][T32689] syz-executor.1[32689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.462647][T32738] device vxcan1 entered promiscuous mode [ 626.643254][ T303] device syzkaller0 entered promiscuous mode [ 626.735866][ T325] device syzkaller0 entered promiscuous mode [ 626.991124][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.997983][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.005134][ T347] device bridge_slave_0 entered promiscuous mode [ 627.011842][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.018751][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.025905][ T347] device bridge_slave_1 entered promiscuous mode [ 627.061117][ T347] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.067970][ T347] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.075093][ T347] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.081952][ T347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.102138][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.109640][T18069] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.116842][T18069] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.125701][T32703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.134396][T32703] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.141233][T32703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.151523][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.159499][T18069] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.166331][T18069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.180890][T32703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.188644][T32703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.210695][ T347] device veth0_vlan entered promiscuous mode [ 627.220300][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 627.228506][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.236220][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.243415][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.250639][T18069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 627.261055][ T347] device veth1_macvtap entered promiscuous mode [ 627.270953][ T5026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 627.286042][ T878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 627.368364][ T360] device syzkaller0 entered promiscuous mode [ 627.375876][ T389] bridge0: port 3(erspan0) entered disabled state [ 627.383270][ T389] device erspan0 left promiscuous mode [ 627.390847][ T389] bridge0: port 3(erspan0) entered disabled state [ 627.677027][ T389] device bridge_slave_1 left promiscuous mode [ 627.683402][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.691219][ T389] device bridge_slave_0 left promiscuous mode [ 627.697370][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.707786][ T389] device veth1_macvtap left promiscuous mode [ 627.713873][ T389] device veth0_vlan left promiscuous mode [ 628.039702][ T451] EXT4-fs warning (device sda1): ext4_group_extend:1804: can't shrink FS - resize aborted [ 628.367539][ T465] syz-executor.0[465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.367587][ T465] syz-executor.0[465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.395430][ T465] syz-executor.0[465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.414595][ T465] syz-executor.0[465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.622361][ T480] device pim6reg1 entered promiscuous mode [ 629.052228][ T529] device syzkaller0 entered promiscuous mode [ 629.448167][ T604] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.455147][ T604] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.463624][ T604] device bridge_slave_0 entered promiscuous mode [ 629.479042][ T604] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.486313][ T604] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.493709][ T604] device bridge_slave_1 entered promiscuous mode [ 629.557439][ T604] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.564324][ T604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.571406][ T604] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.578193][ T604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.603695][ T5389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.611850][ T5389] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.622247][ T5389] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.662765][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.671814][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.679764][ T321] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.686614][ T321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.694226][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.702638][ T321] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.709491][ T321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.716895][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.724850][ T321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.737062][ T604] device veth0_vlan entered promiscuous mode [ 629.744805][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.752946][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.760467][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.774532][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.787567][ T604] device veth1_macvtap entered promiscuous mode [ 629.787846][ T630] syz-executor.0[630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.794592][ T630] syz-executor.0[630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.810678][ T5026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.850178][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.104812][ T669] device veth1_macvtap left promiscuous mode [ 630.179294][ T690] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.186338][ T690] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.878657][ T787] device pim6reg1 entered promiscuous mode [ 631.027067][ T800] syz-executor.3[800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.027119][ T800] syz-executor.3[800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.117983][ T818] device syzkaller0 entered promiscuous mode [ 631.143719][ T822] device pim6reg1 entered promiscuous mode [ 631.152949][ T822] device vlan1 entered promiscuous mode [ 631.297448][ T843] tun0: tun_chr_ioctl cmd 1074025676 [ 631.302575][ T843] tun0: owner set to 0 [ 631.806297][ T867] device pim6reg1 entered promiscuous mode [ 633.557972][ T971] device sit0 entered promiscuous mode [ 633.879715][ T996] tap0: tun_chr_ioctl cmd 1074025692 [ 633.890791][ T1002] syz-executor.0[1002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.891124][ T1002] syz-executor.0[1002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.124570][ T1033] device pim6reg1 entered promiscuous mode [ 634.333636][ T1067] ref_ctr_offset mismatch. inode: 0x7a2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 634.374086][ T1078] device syzkaller0 entered promiscuous mode [ 634.380738][ T1078] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 634.642726][ T1138] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4 (only 8 groups) [ 635.398048][ T1254] device wg2 entered promiscuous mode [ 635.480805][ T1266] syz-executor.3[1266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.480857][ T1266] syz-executor.3[1266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.053325][ T1333] device pim6reg1 entered promiscuous mode [ 636.278178][ T1366] device syzkaller0 entered promiscuous mode [ 636.625015][ T1388] device syzkaller0 entered promiscuous mode [ 636.953938][ T1417] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 637.092043][ T1436] syz-executor.3[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.092095][ T1436] syz-executor.3[1436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.286617][ T1458] device vxcan1 entered promiscuous mode [ 637.602160][ T1519] device vxcan1 entered promiscuous mode [ 637.919437][ T1595] device pim6reg1 entered promiscuous mode [ 638.455406][ T1637] device pim6reg1 entered promiscuous mode [ 638.579744][ T1646] device pim6reg1 entered promiscuous mode [ 638.753236][ T1673] device veth1_macvtap left promiscuous mode [ 638.759037][ T1673] device macsec0 entered promiscuous mode [ 638.788342][ T1671] device vxcan1 entered promiscuous mode [ 638.970957][ T1692] syz-executor.3[1692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.971011][ T1692] syz-executor.3[1692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.002866][ T1680] device pim6reg1 entered promiscuous mode [ 639.208167][ T1705] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 2147483648 (only 8 groups) [ 639.245819][ T1708] device macsec0 entered promiscuous mode [ 639.673923][ T1737] device syzkaller0 entered promiscuous mode [ 640.897333][ T1880] device vxcan1 entered promiscuous mode [ 641.348508][ T1898] bridge0: port 3(vlan1) entered blocking state [ 641.355026][ T1898] bridge0: port 3(vlan1) entered disabled state [ 641.361675][ T1898] device vlan1 entered promiscuous mode [ 641.545092][ T1932] device syzkaller0 entered promiscuous mode [ 641.894724][ T1980] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.904021][ T1980] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.911697][ T1980] device bridge_slave_0 entered promiscuous mode [ 641.918561][ T1980] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.925500][ T1980] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.932760][ T1980] device bridge_slave_1 entered promiscuous mode [ 641.977031][ T1980] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.983890][ T1980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 641.990993][ T1980] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.997767][ T1980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.021119][ T390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 642.029104][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 642.036575][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 642.082210][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 642.103783][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 642.112648][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.119497][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.126727][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 642.134791][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.141636][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 642.148896][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 642.156601][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 642.176701][T18068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 642.184769][ T1980] device veth0_vlan entered promiscuous mode [ 642.191691][T18068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 642.199163][T18068] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 642.215077][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 642.226387][ T1980] device veth1_macvtap entered promiscuous mode [ 642.251117][T18068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 642.266363][ T7017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 642.485928][ T2049] device syzkaller0 entered promiscuous mode [ 642.725772][ T2061] device lo entered promiscuous mode [ 642.976056][ T2088] device syzkaller0 entered promiscuous mode [ 643.315087][ T2125] device syzkaller0 entered promiscuous mode [ 643.716853][ T2178] device syzkaller0 entered promiscuous mode [ 644.736596][ T2278] device pim6reg1 entered promiscuous mode [ 644.761622][ T2288] syz-executor.2[2288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.761675][ T2288] syz-executor.2[2288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.774046][ T2288] syz-executor.2[2288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.785862][ T2288] syz-executor.2[2288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.052099][ T2327] device syzkaller0 entered promiscuous mode [ 645.320479][ T2403] device syzkaller0 entered promiscuous mode [ 645.506573][ T2438] device veth1_macvtap left promiscuous mode [ 645.558594][ T2464] device pim6reg1 entered promiscuous mode [ 646.442472][ T2495] device pim6reg1 entered promiscuous mode [ 646.683012][ T2529] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.690005][ T2529] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.774072][ T2546] device pim6reg1 entered promiscuous mode [ 646.849719][ T2554] device sit0 left promiscuous mode [ 646.898710][ T2558] device syzkaller0 entered promiscuous mode [ 647.070961][ T2587] device pim6reg1 entered promiscuous mode [ 647.311397][ T2611] syz-executor.1[2611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.311449][ T2611] syz-executor.1[2611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.550436][ T2627] device pim6reg1 entered promiscuous mode [ 647.655939][ T2641] device syzkaller0 entered promiscuous mode [ 647.988962][ T2676] device pim6reg1 entered promiscuous mode [ 648.068206][ T2683] : renamed from ipvlan1 [ 648.259130][ T2704] syz-executor.2[2704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.259173][ T2704] syz-executor.2[2704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.335521][ T2713] syz-executor.2[2713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.347196][ T2713] syz-executor.2[2713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.402017][ T2715] device pim6reg1 entered promiscuous mode [ 648.445186][ T2717] device syzkaller0 entered promiscuous mode [ 649.002209][ T2755] device syzkaller0 entered promiscuous mode [ 649.069404][ T2760] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 649.517892][ T2814] geneve1: tun_chr_ioctl cmd 1074025692 [ 649.898585][ T2875] device syzkaller0 entered promiscuous mode [ 650.171164][ T2891] bpf_get_probe_write_proto: 7 callbacks suppressed [ 650.171175][ T2891] syz-executor.3[2891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.220160][ T2891] syz-executor.3[2891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.493616][ T2910] device pim6reg1 entered promiscuous mode [ 650.544955][ T2919] device syzkaller0 entered promiscuous mode [ 650.942315][ T2985] syz-executor.1[2985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.942370][ T2985] syz-executor.1[2985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.000665][ T2987] device pim6reg1 entered promiscuous mode [ 651.113900][ T2994] device syzkaller0 entered promiscuous mode [ 651.458451][ T3008] device syzkaller0 entered promiscuous mode [ 651.595951][ T3030] device syzkaller0 entered promiscuous mode [ 651.807475][ T3068] device syzkaller0 entered promiscuous mode [ 651.880151][ T3071] tap0: tun_chr_ioctl cmd 1074025677 [ 651.885286][ T3071] tap0: linktype set to 270 [ 652.130262][ T3110] device syzkaller0 entered promiscuous mode [ 652.388542][ T3148] device syzkaller0 entered promiscuous mode [ 652.464716][ T3150] device syzkaller0 entered promiscuous mode [ 652.802700][ T3160] device pim6reg1 entered promiscuous mode [ 653.085733][ T3177] device syzkaller0 entered promiscuous mode [ 653.311314][ T3213] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.330860][ T3213] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.338813][ T3213] device bridge_slave_0 entered promiscuous mode [ 653.345707][ T3213] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.359563][ T3213] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.379141][ T3213] device bridge_slave_1 entered promiscuous mode [ 653.466250][ T3213] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.473128][ T3213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.480218][ T3213] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.487090][ T3213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.511063][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 653.518562][T18072] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.525692][T18072] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.548402][ T3251] device syzkaller0 entered promiscuous mode [ 653.563804][T18087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.571982][T18087] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.578796][T18087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.586128][T18087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.594519][T18087] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.601364][T18087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.615983][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.624441][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.647980][ T3213] device veth0_vlan entered promiscuous mode [ 653.656669][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 653.671121][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.679229][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.686639][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.700026][ T3213] device veth1_macvtap entered promiscuous mode [ 653.728051][ T3256] device sit0 entered promiscuous mode [ 653.904663][ T5431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 653.924308][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 653.933138][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 653.941676][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 653.950013][ T5440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 654.118917][ T3297] device syzkaller0 entered promiscuous mode [ 654.203537][ T3320] syz-executor.1[3320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.203590][ T3320] syz-executor.1[3320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.328363][ T3328] device syzkaller0 entered promiscuous mode [ 654.385431][ T3339] device syzkaller0 entered promiscuous mode [ 654.584757][ T3380] device syzkaller0 entered promiscuous mode [ 654.823198][ T3433] device syzkaller0 entered promiscuous mode [ 654.884283][ T3445] syz-executor.0[3445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.884335][ T3445] syz-executor.0[3445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.997983][ T3491] syz-executor.1[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.010295][ T3491] syz-executor.1[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.022768][ T3487] device syzkaller0 entered promiscuous mode [ 655.073712][ T3496] device pim6reg1 entered promiscuous mode [ 655.127438][ T3504] device pim6reg1 entered promiscuous mode [ 655.381700][ T3555] device pim6reg1 entered promiscuous mode [ 655.392151][ T3542] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.399016][ T3542] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.406371][ T3542] device bridge_slave_0 entered promiscuous mode [ 655.413414][ T3542] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.420432][ T3542] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.427627][ T3542] device bridge_slave_1 entered promiscuous mode [ 655.443984][ T3558] device syzkaller0 entered promiscuous mode [ 655.482761][ T3561] bpf_get_probe_write_proto: 4 callbacks suppressed [ 655.482769][ T3561] syz-executor.0[3561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.489407][ T3561] syz-executor.0[3561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.494965][ T3542] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.520179][ T3542] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.527263][ T3542] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.534068][ T3542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.541415][ T3561] syz-executor.0[3561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.541465][ T3561] syz-executor.0[3561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.555586][ T3561] syz-executor.0[3561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.574479][T32683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 655.594594][T32683] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.605482][T32683] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.623613][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.632186][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.639047][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.646489][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 655.654491][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.661333][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.677249][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 655.685298][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 655.699236][T32683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 655.710151][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.718752][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.727092][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.734779][ T3542] device veth0_vlan entered promiscuous mode [ 655.751323][T32683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 655.760945][ T3542] device veth1_macvtap entered promiscuous mode [ 655.833847][ T3580] device syzkaller0 entered promiscuous mode [ 655.855031][T32683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 655.868141][T32683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 655.951520][ T389] device bridge_slave_1 left promiscuous mode [ 655.958269][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.966930][ T389] device bridge_slave_0 left promiscuous mode [ 655.973329][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.981161][ T389] device veth1_macvtap left promiscuous mode [ 655.987006][ T389] device veth0_vlan left promiscuous mode [ 656.064348][ T3617] device pim6reg1 entered promiscuous mode [ 656.328393][ T3661] device pim6reg1 entered promiscuous mode [ 656.592064][ T3704] device pim6reg1 entered promiscuous mode [ 656.820442][ T3748] device pim6reg1 entered promiscuous mode [ 656.935810][ T3764] device syzkaller0 entered promiscuous mode [ 657.001148][ T3771] syz-executor.0[3771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.001201][ T3771] syz-executor.0[3771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.079148][ T24] audit: type=1400 audit(1718170993.369:178): avc: denied { create } for pid=3773 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 657.126992][ T3782] device pim6reg1 entered promiscuous mode [ 657.240708][ T3797] device syzkaller0 entered promiscuous mode [ 658.295856][ T3971] syz-executor.0[3971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.297022][ T3971] syz-executor.0[3971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 658.596014][ T4009] device pim6reg1 entered promiscuous mode [ 658.905086][ T4053] device pim6reg1 entered promiscuous mode [ 658.942351][ T4065] device vxcan1 entered promiscuous mode [ 659.932174][ T4139] syz-executor.4[4139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.288830][ T4175] device pim6reg1 entered promiscuous mode [ 660.464506][ T4189] Ÿ: renamed from syzkaller0 [ 660.491575][ T4189] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 660.623319][ T4205] device syzkaller0 entered promiscuous mode [ 660.772078][ T4223] device pim6reg1 entered promiscuous mode [ 660.912345][ T4263] device syzkaller0 entered promiscuous mode [ 660.946847][ T4262] device syzkaller0 entered promiscuous mode [ 660.989667][ T4285] device pim6reg1 entered promiscuous mode [ 661.462565][ T4324] device pim6reg1 entered promiscuous mode [ 661.520058][ T4343] bpf_get_probe_write_proto: 5 callbacks suppressed [ 661.520069][ T4343] syz-executor.3[4343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.526565][ T4343] syz-executor.3[4343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.163666][ T4374] device syzkaller0 entered promiscuous mode [ 662.285572][ T4380] device pim6reg1 entered promiscuous mode [ 662.470890][ T4402] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 663.095977][ T4515] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 663.249085][ T4564] device pim6reg1 entered promiscuous mode [ 663.433184][ T4609] device pim6reg1 entered promiscuous mode [ 663.709972][ T4648] device syzkaller0 entered promiscuous mode [ 663.733495][ T4649] device pim6reg1 entered promiscuous mode [ 664.104351][ T4679] device syzkaller0 entered promiscuous mode [ 664.111111][ T4681] device pim6reg1 entered promiscuous mode [ 664.157518][ T4683] syz-executor.3[4683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.157548][ T4683] syz-executor.3[4683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.209109][ T4686] device syzkaller0 entered promiscuous mode [ 664.363484][ T4722] device syzkaller0 entered promiscuous mode [ 664.372215][ T4724] device pim6reg1 entered promiscuous mode [ 664.519266][ T4757] device syzkaller0 entered promiscuous mode [ 664.527595][ T4759] device pim6reg1 entered promiscuous mode [ 664.592762][ T4770] device syzkaller0 entered promiscuous mode [ 664.711195][ T4804] device syzkaller0 entered promiscuous mode [ 664.744509][ T4809] device pim6reg1 entered promiscuous mode [ 664.925806][ T4853] device syzkaller0 entered promiscuous mode [ 665.022430][ T4855] tap0: tun_chr_ioctl cmd 1074025677 [ 665.027611][ T4855] tap0: linktype set to 776 [ 665.306963][ T4879] device syzkaller0 entered promiscuous mode [ 665.328238][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.328267][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.348356][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.360023][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.372070][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.383624][ T4881] syz-executor.3[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 665.684073][ T4923] device syzkaller0 entered promiscuous mode [ 665.747352][ T4927] device syzkaller0 entered promiscuous mode [ 665.757505][ T4927] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 665.849106][ T4931] device syzkaller0 entered promiscuous mode [ 666.105448][ T4961] device pim6reg1 entered promiscuous mode [ 666.475183][ T5001] device pim6reg1 entered promiscuous mode [ 666.484550][ T5002] device pim6reg1 entered promiscuous mode [ 666.534852][ T5004] device syzkaller0 entered promiscuous mode [ 666.552209][ T5006] device syzkaller0 entered promiscuous mode [ 666.687979][ T5052] device pim6reg1 entered promiscuous mode [ 666.890031][ T5060] device syzkaller0 entered promiscuous mode [ 667.011716][ T5063] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 668.042052][ T5086] device pim6reg1 entered promiscuous mode [ 668.387205][ T5094] Â: renamed from pim6reg1 [ 668.479289][ T5114] device pim6reg1 entered promiscuous mode [ 668.868044][ T5154] device pim6reg1 entered promiscuous mode [ 669.006181][ T5173] device syzkaller0 entered promiscuous mode [ 669.122492][ T5183] bpf_get_probe_write_proto: 2 callbacks suppressed [ 669.122502][ T5183] syz-executor.3[5183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.129067][ T5183] syz-executor.3[5183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.463579][ T5196] device pim6reg1 entered promiscuous mode [ 670.560766][ T5209] syz-executor.3[5209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 670.560817][ T5209] syz-executor.3[5209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 671.480555][ T5236] device syzkaller0 entered promiscuous mode [ 671.708562][ T5260] device pim6reg1 entered promiscuous mode [ 671.933368][ T5270] device syzkaller0 entered promiscuous mode [ 672.502920][ T5317] device syzkaller0 entered promiscuous mode [ 672.650128][ T5331] device veth1_macvtap left promiscuous mode [ 672.659970][ T5331] device veth1_macvtap entered promiscuous mode [ 672.666093][ T5331] device macsec0 entered promiscuous mode [ 672.745100][ T5339] tap0: tun_chr_ioctl cmd 1074025677 [ 672.750543][ T5339] tap0: linktype set to 825 [ 673.071692][ T5459] device vxcan1 entered promiscuous mode [ 673.154687][ T5487] device pim6reg1 entered promiscuous mode [ 673.177714][ T5492] syz-executor.4[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.177769][ T5492] syz-executor.4[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.245292][ T5506] device pim6reg1 entered promiscuous mode [ 673.321373][ T5530] device pim6reg1 entered promiscuous mode [ 673.438183][ T5556] device syzkaller0 entered promiscuous mode [ 673.552041][ T5577] device pim6reg1 entered promiscuous mode [ 673.702178][ T5619] device pim6reg1 entered promiscuous mode [ 674.121687][ T5665] device syzkaller0 entered promiscuous mode [ 674.186161][ T5656] device syzkaller0 entered promiscuous mode [ 674.290744][ T5706] device syzkaller0 entered promiscuous mode [ 674.334858][ T5710] device syzkaller0 entered promiscuous mode [ 674.493659][ T5731] device syzkaller0 entered promiscuous mode [ 674.618719][ T5762] device syzkaller0 entered promiscuous mode [ 674.641564][ T5766] device syzkaller0 entered promiscuous mode [ 674.783431][ T24] audit: type=1400 audit(1718171011.079:179): avc: denied { create } for pid=5811 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 674.914802][ T5829] device syzkaller0 entered promiscuous mode [ 675.153589][ T5846] device pim6reg1 entered promiscuous mode [ 675.489526][ T5876] syz-executor.0[5876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.489574][ T5876] syz-executor.0[5876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.521823][ T5879] device pim6reg1 entered promiscuous mode [ 675.685750][ T5898] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.798873][ T5917] device pim6reg1 entered promiscuous mode [ 676.036423][ T5956] device syzkaller0 entered promiscuous mode [ 676.060383][ T5965] device vxcan1 entered promiscuous mode [ 676.204628][ T5972] device pim6reg1 entered promiscuous mode [ 676.366010][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.366064][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.379168][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.390922][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.433491][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.449300][ T5996] syz-executor.4[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.530432][ T6015] device pim6reg1 entered promiscuous mode [ 677.168943][ T6050] device pim6reg1 entered promiscuous mode [ 677.633622][ T6103] device pim6reg1 entered promiscuous mode [ 677.678443][ T6114] syz-executor.0[6114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.678498][ T6114] syz-executor.0[6114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.755528][ T6116] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 677.887250][ T6131] geneve1: tun_chr_ioctl cmd 2148553947 [ 677.892699][ T6132] geneve1: tun_chr_ioctl cmd 2148553947 [ 677.903160][ T6131] device pim6reg1 entered promiscuous mode [ 677.972162][ T6144] device pim6reg1 entered promiscuous mode [ 677.988595][ T6149] device pim6reg1 entered promiscuous mode [ 678.490895][ T6191] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 925 (only 8 groups) [ 679.367690][ T6287] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.374774][ T6287] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.382572][ T6287] device bridge_slave_0 entered promiscuous mode [ 679.390513][ T6287] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.397345][ T6287] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.404632][ T6287] device bridge_slave_1 entered promiscuous mode [ 679.451299][ T6287] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.458170][ T6287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.465260][ T6287] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.472051][ T6287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.502788][ T5032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 679.520114][ T5032] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.531093][ T5032] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.563229][T18103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 679.582110][T18103] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.588994][T18103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.599748][T18103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 679.609467][T18103] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.616328][T18103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.643259][T18103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 679.651190][T18103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 679.731953][ T6287] device veth0_vlan entered promiscuous mode [ 679.752003][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 679.763203][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 679.771252][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 679.778627][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 679.856127][ T6287] device veth1_macvtap entered promiscuous mode [ 679.880199][T18103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 679.912119][ T5407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 679.936938][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 680.665528][ T6442] bpf_get_probe_write_proto: 6 callbacks suppressed [ 680.665538][ T6442] syz-executor.2[6442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.672126][ T6442] syz-executor.2[6442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.470493][ T6555] syz-executor.2[6555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.488898][ T6555] syz-executor.2[6555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.805010][ T6589] device pim6reg1 entered promiscuous mode [ 681.956392][ T6629] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 682.108107][ T6642] syz-executor.0[6642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.108161][ T6642] syz-executor.0[6642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.811926][ T389] device bridge_slave_1 left promiscuous mode [ 682.944877][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.012738][ T389] device bridge_slave_0 left promiscuous mode [ 683.069809][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.077652][ T389] device veth1_macvtap left promiscuous mode [ 683.083511][ T389] device veth0_vlan left promiscuous mode [ 683.394831][ T6719] device syzkaller0 entered promiscuous mode [ 683.409201][ T6727] device pim6reg1 entered promiscuous mode [ 684.055067][ T6757] device syzkaller0 entered promiscuous mode [ 684.132185][ T6759] device pim6reg1 entered promiscuous mode [ 684.407187][ T6788] device syzkaller0 entered promiscuous mode [ 684.425965][ T389] device bridge_slave_1 left promiscuous mode [ 684.432779][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.452735][ T389] device bridge_slave_0 left promiscuous mode [ 684.462476][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.481283][ T389] device veth1_macvtap left promiscuous mode [ 684.488301][ T389] device veth0_vlan left promiscuous mode [ 684.612102][ T6798] device pim6reg1 entered promiscuous mode [ 684.829842][ T6843] device syzkaller0 entered promiscuous mode [ 685.060900][ T6868] syz-executor.3[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.060946][ T6868] syz-executor.3[6868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.241777][ T6981] device syzkaller0 entered promiscuous mode [ 685.419803][ T7035] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 685.433824][ T7006] device syzkaller0 entered promiscuous mode [ 685.513741][ T7052] syz-executor.0[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.513783][ T7052] syz-executor.0[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 685.519364][ T7049] device syzkaller0 entered promiscuous mode [ 685.553657][ T7047] device syzkaller0 entered promiscuous mode [ 685.592303][ T7055] device syzkaller0 entered promiscuous mode [ 685.706006][ T7073] device pim6reg1 entered promiscuous mode [ 685.987871][ T7086] device syzkaller0 entered promiscuous mode [ 686.158291][ T7103] device pim6reg1 entered promiscuous mode [ 686.556814][ T7142] device syzkaller0 entered promiscuous mode [ 687.315082][ T7158] device pim6reg1 entered promiscuous mode [ 687.373958][ T7152] bpf_get_probe_write_proto: 2 callbacks suppressed [ 687.373968][ T7152] syz-executor.3[7152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.389272][ T7152] syz-executor.3[7152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.498432][ T7196] device pim6reg1 entered promiscuous mode [ 687.742531][ T7252] device pim6reg1 entered promiscuous mode [ 687.814035][ T7269] syz-executor.4[7269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.814081][ T7269] syz-executor.4[7269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.840801][ T7266] device syzkaller0 entered promiscuous mode [ 688.072807][ T7302] device pim6reg1 entered promiscuous mode [ 688.112420][ T7314] device syzkaller0 entered promiscuous mode [ 688.294278][ T7384] device pim6reg1 entered promiscuous mode [ 688.388437][ T7399] device syzkaller0 entered promiscuous mode [ 688.506613][ T7424] device pim6reg1 entered promiscuous mode [ 688.602201][ T7448] device syzkaller0 entered promiscuous mode [ 688.613132][ T7460] syz-executor.4[7460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.613183][ T7460] syz-executor.4[7460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.676894][ T7468] device syzkaller0 entered promiscuous mode [ 688.850535][ T7503] device pim6reg1 entered promiscuous mode [ 688.911544][ T7510] device syzkaller0 entered promiscuous mode [ 689.165850][ T7559] device syzkaller0 entered promiscuous mode [ 689.462230][ T7612] device syzkaller0 entered promiscuous mode [ 689.514713][ T7635] device vxcan1 entered promiscuous mode [ 689.525008][ T7640] syz-executor.3[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.525063][ T7640] syz-executor.3[7640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.672407][ T7667] device syzkaller0 entered promiscuous mode [ 689.822515][ T7686] syz-executor.3[7686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.822557][ T7686] syz-executor.3[7686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.908217][ T7718] device pim6reg1 entered promiscuous mode [ 689.953745][ T7721] device syzkaller0 entered promiscuous mode [ 690.229533][ T7746] device syzkaller0 entered promiscuous mode [ 690.732135][ T1665] device bridge_slave_1 left promiscuous mode [ 690.738121][ T1665] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.796793][ T1665] device bridge_slave_0 left promiscuous mode [ 690.826000][ T1665] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.886544][ T1665] device veth1_macvtap left promiscuous mode [ 691.370626][ T7845] device syzkaller0 entered promiscuous mode [ 691.585129][ T7884] device syzkaller0 entered promiscuous mode [ 691.758330][ T7907] device pim6reg1 entered promiscuous mode [ 692.293776][ T7956] device pim6reg1 entered promiscuous mode [ 692.657191][ T7987] device vxcan1 entered promiscuous mode [ 693.408429][ T8092] device pim6reg1 entered promiscuous mode [ 693.996366][ T8212] device syzkaller0 entered promiscuous mode [ 694.024374][ T8227] bpf_get_probe_write_proto: 17 callbacks suppressed [ 694.024383][ T8227] syz-executor.1[8227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.093152][ T8227] syz-executor.1[8227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.156691][ T8227] device pim6reg1 entered promiscuous mode [ 694.197135][ T8243] syz-executor.4[8243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.197177][ T8243] syz-executor.4[8243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.219041][ T8244] syz-executor.4[8244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.231001][ T8244] syz-executor.4[8244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.363742][ T8289] device pim6reg1 entered promiscuous mode [ 694.516071][ T8311] device macsec0 left promiscuous mode [ 694.556345][ T8324] syz-executor.3[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.556396][ T8324] syz-executor.3[8324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.774982][ T8341] device pim6reg1 entered promiscuous mode [ 695.659658][ T8466] syz-executor.0[8466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.659746][ T8466] syz-executor.0[8466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.923282][ T8503] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.942152][ T8503] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.949596][ T8503] device bridge_slave_0 entered promiscuous mode [ 695.976649][ T8503] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.983664][ T8503] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.991004][ T8503] device bridge_slave_1 entered promiscuous mode [ 696.041158][ T8521] device syzkaller0 entered promiscuous mode [ 696.057443][ T8503] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.064323][ T8503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.071414][ T8503] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.078175][ T8503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.117414][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.125120][ T401] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.132328][ T401] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.157497][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.165630][ T401] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.172496][ T401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.180136][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.188225][ T401] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.195084][ T401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.202956][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 696.210972][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.229766][ T8503] device veth0_vlan entered promiscuous mode [ 696.237235][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 696.245707][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.253794][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.262282][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.293486][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 696.302757][ T8503] device veth1_macvtap entered promiscuous mode [ 696.314270][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 696.335886][ T402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 696.601403][ T8576] device syzkaller0 entered promiscuous mode [ 696.770656][ T564] device bridge_slave_1 left promiscuous mode [ 696.776712][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.785122][ T564] device bridge_slave_0 left promiscuous mode [ 696.791742][ T564] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.169643][ T8640] device syzkaller0 entered promiscuous mode [ 697.227543][ T8665] device vxcan1 entered promiscuous mode [ 697.362445][ T8677] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 697.371202][ T8677] device syzkaller0 entered promiscuous mode [ 697.495491][ T8715] device syzkaller0 entered promiscuous mode [ 697.522250][ T8722] device vxcan1 entered promiscuous mode [ 697.945817][ T8791] device syzkaller0 entered promiscuous mode [ 698.238901][ T8847] device syzkaller0 entered promiscuous mode [ 698.248360][ T8853] ªªªªªª: renamed from vlan0 [ 698.324342][ T8857] device syzkaller0 entered promiscuous mode [ 698.356360][ T8861] device syzkaller0 entered promiscuous mode [ 698.397487][ T8864] device syzkaller0 entered promiscuous mode [ 698.584057][ T8889] device veth0_vlan left promiscuous mode [ 698.594603][ T8889] device veth0_vlan entered promiscuous mode [ 698.639244][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.647300][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.655006][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.716541][ T8904] device syzkaller0 entered promiscuous mode [ 698.762989][ T8909] device syzkaller0 entered promiscuous mode [ 698.929363][ T8931] device syzkaller0 entered promiscuous mode [ 699.156381][ T8969] device syzkaller0 entered promiscuous mode [ 699.343398][ T8994] device syzkaller0 entered promiscuous mode [ 699.432817][ T9006] bpf_get_probe_write_proto: 14 callbacks suppressed [ 699.432826][ T9006] syz-executor.3[9006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.452973][ T9004] device syzkaller0 entered promiscuous mode [ 699.464595][ T9006] syz-executor.3[9006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.709231][ T9052] syz-executor.4[9052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.721315][ T9052] syz-executor.4[9052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.723662][ T9053] device syzkaller0 entered promiscuous mode [ 699.810668][ T9054] device syzkaller0 entered promiscuous mode [ 699.839663][ T9068] device syzkaller0 entered promiscuous mode [ 700.006472][ T9084] device syzkaller0 entered promiscuous mode [ 700.053776][ T9098] device pim6reg1 entered promiscuous mode [ 700.113382][ T9105] device syzkaller0 entered promiscuous mode [ 700.288417][ T9137] device pim6reg1 entered promiscuous mode [ 700.406038][ T9143] device pim6reg1 entered promiscuous mode [ 700.461797][ T9150] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 700.465239][ T9152] device pim6reg1 entered promiscuous mode [ 700.520496][ T9157] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 700.585654][ T9166] : renamed from bond_slave_0 [ 700.634545][ T9177] device pim6reg1 entered promiscuous mode [ 700.725854][ T9196] device syzkaller0 entered promiscuous mode [ 700.946454][ T9227] syz-executor.4[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.946506][ T9227] syz-executor.4[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 701.445478][ T9259] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 701.677142][ T9272] device pim6reg1 entered promiscuous mode [ 701.832792][ T9296] device syzkaller0 entered promiscuous mode [ 702.131308][ T9328] device pim6reg1 entered promiscuous mode [ 702.192905][ T9345] device syzkaller0 entered promiscuous mode [ 702.292901][ T9352] device syzkaller0 entered promiscuous mode [ 702.387901][ T9369] device syzkaller0 entered promiscuous mode [ 702.610805][ T9375] device syzkaller0 entered promiscuous mode [ 702.640461][ T9392] device syzkaller0 entered promiscuous mode [ 702.691328][ T9409] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 703.215522][ T9495] syz-executor.3[9495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 703.215575][ T9495] syz-executor.3[9495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 703.357319][ T9514] device syzkaller0 entered promiscuous mode [ 703.824407][ T9565] syzkaller0: refused to change device tx_queue_len [ 703.887971][ T9569] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.896558][ T9580] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.903437][ T9580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 704.123748][ T9611] syz-executor.1[9611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.123795][ T9611] syz-executor.1[9611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.189765][ T9628] geneve1: tun_chr_ioctl cmd 1074025680 [ 704.361986][ T9657] device pim6reg1 entered promiscuous mode [ 704.833791][ T9694] bridge0: port 1(bridge_slave_0) entered blocking state [ 704.841122][ T9694] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.848583][ T9694] device bridge_slave_0 entered promiscuous mode [ 704.856635][ T9694] bridge0: port 2(bridge_slave_1) entered blocking state [ 704.869384][ T9694] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.880915][ T9694] device bridge_slave_1 entered promiscuous mode [ 704.912098][ T9730] device syzkaller0 entered promiscuous mode [ 704.957480][ T9740] syz-executor.0[9740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.957532][ T9740] syz-executor.0[9740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.959064][ T9694] bridge0: port 2(bridge_slave_1) entered blocking state [ 704.987298][ T9694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 704.994430][ T9694] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.001214][ T9694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.028404][ T9743] device syzkaller0 entered promiscuous mode [ 705.046556][ T9744] tun0: tun_chr_ioctl cmd 2148553947 [ 705.070027][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 705.077420][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 705.087046][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 705.102966][ T9752] device veth1_macvtap left promiscuous mode [ 705.117663][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 705.138408][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 705.162677][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 705.182696][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 705.191050][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 705.201929][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 705.210868][ T9694] device veth0_vlan entered promiscuous mode [ 705.223392][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 705.241493][ T9694] device veth1_macvtap entered promiscuous mode [ 705.257628][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 705.272152][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 705.320804][ T9793] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 705.421392][ T564] device bridge_slave_1 left promiscuous mode [ 705.490469][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.564584][ T564] device bridge_slave_0 left promiscuous mode [ 705.595909][ T564] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.639277][ T564] device veth1_macvtap left promiscuous mode [ 705.674399][ T564] device veth0_vlan left promiscuous mode [ 706.061640][ T9838] syz-executor.3[9838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.061696][ T9838] syz-executor.3[9838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.171734][ T9843] device wg2 entered promiscuous mode [ 706.283031][ T9867] syz-executor.1[9867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.283085][ T9867] syz-executor.1[9867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.107656][ T9922] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.220017][ T9922] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.227470][ T9922] device bridge_slave_0 entered promiscuous mode [ 707.237750][ T9922] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.244663][ T9922] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.252040][ T9922] device bridge_slave_1 entered promiscuous mode [ 707.351238][ T564] device bridge_slave_1 left promiscuous mode [ 707.357208][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.372006][ T564] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.381110][ T564] device veth0_vlan left promiscuous mode [ 707.512799][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 707.520574][ T405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.541359][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 707.549560][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.570282][ T401] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.577141][ T401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.584646][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 707.593212][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.602277][ T401] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.609143][ T401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.616550][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 707.634335][T13390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.642383][T13390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 707.684482][T13390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 707.703902][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.714371][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.721889][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 707.735353][ T9922] device veth0_vlan entered promiscuous mode [ 707.752811][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 707.766746][ T9922] device veth1_macvtap entered promiscuous mode [ 707.792818][T13390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 707.817526][ T6082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 707.887341][T10058] device vxcan1 entered promiscuous mode [ 707.899088][T10067] device macsec0 left promiscuous mode [ 710.487879][T10154] device syzkaller0 entered promiscuous mode [ 710.640238][T10195] device syzkaller0 entered promiscuous mode [ 710.917598][T10255] device syzkaller0 entered promiscuous mode [ 711.479326][T10293] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.486341][T10293] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.582294][T10300] device bridge_slave_1 left promiscuous mode [ 711.588275][T10300] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.666214][T10300] device bridge_slave_0 left promiscuous mode [ 711.687195][T10300] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.751573][T10317] device syzkaller0 entered promiscuous mode [ 712.168206][T10355] device syzkaller0 entered promiscuous mode [ 712.517886][T10425] device pim6reg1 entered promiscuous mode [ 712.584855][T10436] device syzkaller0 entered promiscuous mode [ 712.640548][T10440] O3ãc¤±: renamed from bridge_slave_0 [ 713.069053][T10472] device pim6reg1 entered promiscuous mode [ 713.222118][T10520] device syzkaller0 entered promiscuous mode [ 713.227329][T10522] syz-executor.4[10522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.228085][T10522] syz-executor.4[10522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.251055][T10522] syz-executor.4[10522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.263622][T10522] syz-executor.4[10522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.475128][T10558] device syzkaller0 entered promiscuous mode [ 713.606908][T10579] O3ãc¤±: renamed from bridge_slave_0 [ 713.736648][T10624] device syzkaller0 entered promiscuous mode [ 713.814858][T10649] device pim6reg1 entered promiscuous mode [ 713.977153][T10695] device pim6reg1 entered promiscuous mode [ 714.080689][T10721] device pim6reg1 entered promiscuous mode [ 714.322627][T10757] device pim6reg1 entered promiscuous mode [ 714.463768][T10774] device pim6reg1 entered promiscuous mode [ 714.863569][T10796] device pim6reg1 entered promiscuous mode [ 715.023379][T10815] device pim6reg1 entered promiscuous mode [ 715.348613][T10843] device pim6reg1 entered promiscuous mode [ 715.894799][T10950] syz-executor.0[10950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.894844][T10950] syz-executor.0[10950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.976904][T10968] device syzkaller0 entered promiscuous mode [ 716.294752][T11020] device syzkaller0 entered promiscuous mode [ 716.382848][T11037] device syzkaller0 entered promiscuous mode [ 716.543449][T11067] : renamed from ipvlan1 [ 716.612629][T11078] device syzkaller0 entered promiscuous mode [ 716.656008][T11081] device syzkaller0 entered promiscuous mode [ 716.824428][T11094] device pim6reg1 entered promiscuous mode [ 716.903552][T11096] ªªªªªª: renamed from vlan0 [ 717.069784][T11110] device syzkaller0 entered promiscuous mode [ 717.226752][T11127] syz-executor.0[11127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.226795][T11127] syz-executor.0[11127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.568023][T11179] device pim6reg1 entered promiscuous mode [ 717.611560][T11181] device syzkaller0 entered promiscuous mode [ 717.701933][T11206] syz-executor.0[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.701979][T11206] syz-executor.0[11206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.084586][T11230] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 718.475045][T11270] device veth1_macvtap left promiscuous mode [ 718.530530][T11287] device pim6reg1 entered promiscuous mode [ 718.594924][T11293] bpf_get_probe_write_proto: 2 callbacks suppressed [ 718.594934][T11293] syz-executor.2[11293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.601506][T11293] syz-executor.2[11293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.628412][T11290] device syzkaller0 entered promiscuous mode [ 718.863236][T11331] device syzkaller0 entered promiscuous mode [ 719.143650][T11385] device pim6reg1 entered promiscuous mode [ 719.169208][T11387] device veth1_macvtap entered promiscuous mode [ 719.175512][T11387] device macsec0 entered promiscuous mode [ 719.181913][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 719.202848][T11395] device veth1_macvtap left promiscuous mode [ 719.208769][T11395] device macsec0 left promiscuous mode [ 720.264682][T11526] device pim6reg1 entered promiscuous mode [ 720.660224][T11604] device syzkaller0 entered promiscuous mode [ 720.796080][T11631] device vxcan1 entered promiscuous mode [ 721.122987][T11647] device syzkaller0 entered promiscuous mode [ 721.140218][T11695] syz-executor.2[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.140270][T11695] syz-executor.2[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.222389][T11688] syz-executor.2[11688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.236702][T11688] syz-executor.2[11688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.249792][T11688] syz-executor.2[11688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 721.261961][T11688] syz-executor.2[11688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 722.007657][T11782] device pim6reg1 entered promiscuous mode [ 722.405722][T11830] device pim6reg1 entered promiscuous mode [ 722.724098][T11890] device pim6reg1 entered promiscuous mode [ 723.104535][T11914] device veth1_macvtap entered promiscuous mode [ 723.130141][T11914] device macsec0 entered promiscuous mode [ 723.143700][ T401] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 723.198328][T11916] device vxcan1 entered promiscuous mode [ 723.243924][T11917] syz-executor.3[11917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.243975][T11917] syz-executor.3[11917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 723.356751][T11931] device pim6reg1 entered promiscuous mode [ 723.632852][T11963] device pim6reg1 entered promiscuous mode [ 723.934217][T12004] device pim6reg1 entered promiscuous mode [ 724.300837][T12049] device pim6reg1 entered promiscuous mode [ 724.462161][T12057] device syzkaller0 entered promiscuous mode [ 724.620282][T12063] device pim6reg1 entered promiscuous mode [ 724.748104][T12078] device wg2 entered promiscuous mode [ 724.828309][T12097] device syzkaller0 entered promiscuous mode [ 724.838203][T12094] device pim6reg1 entered promiscuous mode [ 725.093332][T12130] device pim6reg1 entered promiscuous mode [ 725.112018][T12145] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 725.382095][T12204] device pim6reg1 entered promiscuous mode [ 725.436326][T12208] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 725.447321][T12206] bpf_get_probe_write_proto: 4 callbacks suppressed [ 725.447332][T12206] syz-executor.0[12206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.457645][T12206] syz-executor.0[12206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.507457][T12211] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 725.631872][T12241] device pim6reg1 entered promiscuous mode [ 725.761264][T12257] device syzkaller0 entered promiscuous mode [ 725.802068][T12274] device syzkaller0 entered promiscuous mode [ 725.884939][T12294] syz-executor.1[12294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.884984][T12294] syz-executor.1[12294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 725.936596][T12296] device pim6reg1 entered promiscuous mode [ 726.266995][T12356] device pim6reg1 entered promiscuous mode [ 726.267117][T12354] syz-executor.4[12354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.279774][T12354] syz-executor.4[12354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.537807][T12397] device pim6reg1 entered promiscuous mode [ 726.732229][T12452] device syzkaller0 entered promiscuous mode [ 726.740135][T12452] syz-executor.0[12452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.740172][T12452] syz-executor.0[12452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.058498][T12484] device pim6reg1 entered promiscuous mode [ 727.263254][T12522] device sit0 entered promiscuous mode [ 727.339272][T12538] syz-executor.2[12538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.339326][T12538] syz-executor.2[12538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.443933][T12545] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 727.827300][T12572] device syzkaller0 entered promiscuous mode [ 728.130847][T12619] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 728.695868][T12681] device pim6reg1 entered promiscuous mode [ 728.826592][T12704] device veth0_vlan left promiscuous mode [ 728.859108][T12704] device veth0_vlan entered promiscuous mode [ 728.873087][ T5395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 728.884584][ T5395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 728.892967][ T5395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.010156][T12730] device syzkaller0 entered promiscuous mode [ 729.204608][T12752] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.211689][T12752] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.218968][T12752] device bridge_slave_0 entered promiscuous mode [ 729.229583][T12752] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.237721][T12752] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.246252][T12752] device bridge_slave_1 entered promiscuous mode [ 729.332935][T12760] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.339784][T12760] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.347402][T12760] device bridge_slave_0 entered promiscuous mode [ 729.361211][T12760] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.368255][T12760] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.375530][T12760] device bridge_slave_1 entered promiscuous mode [ 729.453363][T18071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.463003][T18071] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.494102][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 729.504849][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.519793][T13373] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.526662][T13373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.538180][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 729.546860][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 729.555146][T13373] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.562010][T13373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.590355][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 729.598719][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 729.606768][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 729.631813][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.640656][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.648016][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.655473][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 729.664353][T12752] device veth0_vlan entered promiscuous mode [ 729.692374][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 729.713053][T12752] device veth1_macvtap entered promiscuous mode [ 729.720622][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.729063][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.737963][T13373] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.744830][T13373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.752955][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 729.761703][T13373] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.768585][T13373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.789777][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 729.798414][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 729.806718][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 729.815873][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 729.823721][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 729.853797][T18091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 729.872886][T12760] device veth0_vlan entered promiscuous mode [ 729.887823][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.904906][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.914883][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.931252][T12760] device veth1_macvtap entered promiscuous mode [ 729.938224][T13373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 729.951696][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 729.965118][T18091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 730.125864][ T564] device bridge_slave_1 left promiscuous mode [ 730.140780][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.153527][ T564] device bridge_slave_0 left promiscuous mode [ 730.163124][ T564] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.191166][ T564] device veth1_macvtap left promiscuous mode [ 730.201718][ T564] device veth0_vlan left promiscuous mode [ 730.265095][T12843] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 730.487208][T12836] device syzkaller0 entered promiscuous mode [ 730.515503][T12851] device vxcan1 entered promiscuous mode [ 730.554241][T12862] device syzkaller0 entered promiscuous mode [ 730.675979][T12887] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 730.792535][T12895] device vxcan1 entered promiscuous mode [ 730.798882][T12897] syz-executor.1[12897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.798935][T12897] syz-executor.1[12897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.909272][T12913] syz-executor.1[12913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.921551][T12913] syz-executor.1[12913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.042063][T12921] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 731.236527][T12938] syz-executor.0[12938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.236573][T12938] syz-executor.0[12938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.420171][T12954] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 731.807069][T12999] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 731.945163][T13027] device pim6reg1 entered promiscuous mode [ 732.122682][T13049] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 732.332159][T13103] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 732.571800][T13144] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 732.698512][T13167] device syzkaller0 entered promiscuous mode [ 732.871505][T13205] device vxcan1 entered promiscuous mode [ 732.932026][T13205] device pim6reg1 entered promiscuous mode [ 733.150940][T13249] syz-executor.3[13249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.150988][T13249] syz-executor.3[13249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.180475][T13247] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 733.398732][T13308] device syzkaller0 entered promiscuous mode [ 733.474271][T13329] geneve1: tun_chr_ioctl cmd 1074025672 [ 733.480060][T13329] geneve1: ignored: set checksum enabled [ 733.619740][T13359] device pim6reg1 entered promiscuous mode [ 733.806720][T13423] device syzkaller0 entered promiscuous mode [ 733.890432][T13450] device pim6reg1 entered promiscuous mode [ 733.941557][T13431] device syzkaller0 entered promiscuous mode [ 733.974071][T13456] syz-executor.0[13456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 733.974118][T13456] syz-executor.0[13456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.084488][T13464] device pim6reg1 entered promiscuous mode [ 734.118036][T13482] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 734.135835][T13489] device syzkaller0 entered promiscuous mode [ 734.196871][T13495] device pim6reg1 entered promiscuous mode [ 734.685851][T13609] device syzkaller0 entered promiscuous mode [ 735.315277][T13783] EXT4-fs warning: 5 callbacks suppressed [ 735.315307][T13783] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 735.482903][T13806] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 735.499100][T13806] device syzkaller0 entered promiscuous mode [ 735.543372][T13809] device syzkaller0 entered promiscuous mode [ 735.843656][T13832] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 736.421087][T13878] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 737.016062][T13930] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 737.629521][T13961] bpf_get_probe_write_proto: 6 callbacks suppressed [ 737.629531][T13961] syz-executor.2[13961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.642972][T13963] syz-executor.2[13963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.688468][T13961] syz-executor.2[13961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.758682][T13970] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 738.002621][T13979] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.010915][T13979] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.018293][T13979] device bridge_slave_0 entered promiscuous mode [ 738.068612][T13979] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.078442][T13979] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.088871][T13979] device bridge_slave_1 entered promiscuous mode [ 738.174175][T14009] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 738.291205][T13979] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.298284][T13979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.305370][T13979] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.312154][T13979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.377053][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 738.388794][T18072] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.396589][T18072] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.423490][T14042] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 738.438848][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 738.447643][T18072] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.454502][T18072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.466103][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.474899][T18072] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.481773][T18072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.530218][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.538028][T18072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.552443][T13979] device veth0_vlan entered promiscuous mode [ 738.561689][ T7017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 738.580625][ T7017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.587920][ T7017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.596322][ T7017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.610243][T13979] device veth1_macvtap entered promiscuous mode [ 738.622569][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 738.631393][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 738.670507][T18111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 738.683774][T14063] bridge0: port 3(veth1_macvtap) entered blocking state [ 738.695520][T14063] bridge0: port 3(veth1_macvtap) entered disabled state [ 738.745350][T14083] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 738.853396][T14099] syz-executor.3[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.853446][T14099] syz-executor.3[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.881835][T14098] syz-executor.3[14098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.898932][T14098] syz-executor.3[14098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.944962][T14114] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 738.972895][ T564] device vlan1 left promiscuous mode [ 738.979436][ T564] bridge0: port 3(vlan1) entered disabled state [ 738.986796][ T564] device bridge_slave_1 left promiscuous mode [ 738.992942][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.000160][ T564] device O3ãc¤± left promiscuous mode [ 739.005421][ T564] bridge0: port 1(O3ãc¤±) entered disabled state [ 739.178834][T14158] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 739.354554][T14175] device pim6reg1 entered promiscuous mode [ 740.420361][T14226] sit0: mtu less than device minimum [ 740.504317][T14226] tap0: tun_chr_ioctl cmd 1074025677 [ 740.531853][T14226] tap0: linktype set to 774 [ 740.623153][T14245] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 741.897095][T14409] device wg2 entered promiscuous mode [ 742.207079][T14461] syz-executor.1[14461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.207129][T14461] syz-executor.1[14461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.243219][T14461] syz-executor.1[14461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.315215][T14471] device syzkaller0 entered promiscuous mode [ 742.971491][T14581] device syzkaller0 entered promiscuous mode [ 743.247533][T14612] device syzkaller0 entered promiscuous mode [ 743.969574][T14782] bpf_get_probe_write_proto: 1 callbacks suppressed [ 743.969583][T14782] syz-executor.4[14782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 743.969610][T14781] syz-executor.4[14781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.033997][T14787] device pim6reg1 entered promiscuous mode [ 744.212512][T14822] syz-executor.3[14822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.212557][T14822] syz-executor.3[14822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.546293][T14873] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 744.589170][T14871] device veth1_macvtap left promiscuous mode [ 744.595393][T14871] device macsec0 left promiscuous mode [ 744.603519][T14871] device veth1_macvtap entered promiscuous mode [ 744.616553][T14871] device macsec0 entered promiscuous mode [ 744.626069][T14871] device pim6reg1 entered promiscuous mode [ 744.794171][T14895] syz-executor.2[14895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.794217][T14895] syz-executor.2[14895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.943591][T14916] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 745.339796][T14973] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 746.051124][T15012] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 746.082642][T15006] syz-executor.1[15006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.082693][T15006] syz-executor.1[15006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.093172][T15023] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 746.296411][T15056] syz-executor.2[15056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.296442][T15056] syz-executor.2[15056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.326759][T15058] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 746.390819][T15074] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 746.461679][T15084] device sit0 left promiscuous mode [ 746.562981][T15108] device sit0 entered promiscuous mode [ 746.619107][T15084] device sit0 entered promiscuous mode [ 746.701879][T15132] device syzkaller0 entered promiscuous mode [ 746.738877][T15141] device syzkaller0 entered promiscuous mode [ 747.492155][T15212] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 747.881538][T15246] device vxcan1 entered promiscuous mode [ 747.891616][T15239] device pim6reg1 entered promiscuous mode [ 747.903786][T15252] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.910784][T15252] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.929864][T15252] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.936710][T15252] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.943830][T15252] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.950607][T15252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.957959][T15252] device bridge0 entered promiscuous mode [ 748.032851][T15257] device pim6reg1 entered promiscuous mode [ 748.215655][T15322] device syzkaller0 entered promiscuous mode [ 748.865496][T15450] device syzkaller0 entered promiscuous mode [ 749.283825][T15533] device veth1_macvtap left promiscuous mode [ 749.301512][T15532] device veth1_macvtap entered promiscuous mode [ 749.307760][T15532] device macsec0 entered promiscuous mode [ 749.529082][T15620] bpf_get_probe_write_proto: 6 callbacks suppressed [ 749.529092][T15620] syz-executor.2[15620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 749.535652][T15620] syz-executor.2[15620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 749.623521][T15639] device syzkaller0 entered promiscuous mode [ 751.321646][T15896] device vxcan1 entered promiscuous mode [ 751.508097][T15926] device syzkaller0 entered promiscuous mode [ 751.565354][T15933] syzkaller0: refused to change device tx_queue_len [ 751.836649][T15944] device syzkaller0 entered promiscuous mode [ 751.850617][T32681] syzkaller0: tun_net_xmit 48 [ 751.968391][T15944] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 751.993434][T15945] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 752.000311][T15945] syzkaller0: Linktype set failed because interface is up [ 752.026165][T15944] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 752.046328][T15944] syzkaller0: Linktype set failed because interface is up [ 753.321805][T16070] device sit0 entered promiscuous mode [ 753.679239][T16090] device sit0 left promiscuous mode [ 753.715319][T16109] syz-executor.3[16109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.715373][T16109] syz-executor.3[16109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.757204][T16109] syz-executor.3[16109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.788723][T16109] syz-executor.3[16109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.089142][T16181] syz-executor.4[16181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.101876][T16181] syz-executor.4[16181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.115705][T16181] syz-executor.4[16181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.127607][T16181] syz-executor.4[16181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.259795][T16226] device syzkaller0 entered promiscuous mode [ 754.590258][T16264] bpf_get_probe_write_proto: 2 callbacks suppressed [ 754.590268][T16264] syz-executor.1[16264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.640109][T16264] syz-executor.1[16264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.704618][T16277] device pim6reg1 entered promiscuous mode [ 754.866620][T16285] syz-executor.1[16285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.866674][T16285] syz-executor.1[16285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.899073][T16282] syz-executor.0[16282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.899098][T16281] syz-executor.0[16281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.911408][T16282] syz-executor.0[16282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.059586][T16281] syz-executor.0[16281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.074587][T16302] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 755.181877][T16311] syz-executor.0[16311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.201017][T16342] syz-executor.1[16342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 755.219112][T16325] device pim6reg1 entered promiscuous mode [ 755.364685][T16370] device syzkaller0 entered promiscuous mode [ 757.731499][T16671] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 757.935488][T16703] device syzkaller0 entered promiscuous mode [ 760.098236][T17115] device syzkaller0 entered promiscuous mode [ 760.154231][T17120] device vxcan1 entered promiscuous mode [ 760.813694][T17253] device pim6reg1 entered promiscuous mode [ 761.506411][T17307] bpf_get_probe_write_proto: 41 callbacks suppressed [ 761.506421][T17307] syz-executor.1[17307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.526723][T17308] syz-executor.1[17308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.564798][T17307] syz-executor.1[17307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.627415][T17322] syz-executor.0[17322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.670703][T17322] syz-executor.0[17322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.699104][T17322] syz-executor.0[17322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.732604][T17322] syz-executor.0[17322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.866336][T17346] device wg2 left promiscuous mode [ 762.039147][T17361] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 762.427354][T17391] device pim6reg1 entered promiscuous mode [ 762.601956][T17414] vxcan1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 762.632471][T17414] device vxcan1 entered promiscuous mode [ 762.798094][T17446] syz-executor.1[17446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.798157][T17446] syz-executor.1[17446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 762.856089][T17447] syz-executor.1[17447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.192553][T17512] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 763.581831][T17522] device syzkaller0 entered promiscuous mode [ 763.929713][T17644] device pim6reg1 entered promiscuous mode [ 764.022278][T17664] tun0: tun_chr_ioctl cmd 1074025677 [ 764.029527][T17664] tun0: linktype set to 6 [ 764.407533][T17725] EXT4-fs warning (device sda1): ext4_group_extend:1804: can't shrink FS - resize aborted [ 764.659472][T17765] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 766.446797][T17997] device pim6reg1 entered promiscuous mode [ 766.842507][T18162] device wg2 left promiscuous mode [ 766.902916][T18167] device syzkaller0 entered promiscuous mode [ 766.910406][T18181] device veth1_macvtap left promiscuous mode [ 767.032891][T18192] device vxcan1 entered promiscuous mode [ 767.199479][T18236] bpf_get_probe_write_proto: 19 callbacks suppressed [ 767.199488][T18236] syz-executor.4[18236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.211316][T18236] syz-executor.4[18236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.215120][T18237] syz-executor.4[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.237623][T18237] syz-executor.4[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.251724][T18237] syz-executor.4[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.264027][T18237] syz-executor.4[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.300962][T18257] syz-executor.3[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.314008][T18257] syz-executor.3[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.330825][T18257] syz-executor.3[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.353074][T18257] syz-executor.3[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.558698][T18289] device syzkaller0 entered promiscuous mode [ 767.631381][T18285] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.638320][T18285] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.645832][T18285] device bridge_slave_0 entered promiscuous mode [ 767.655200][T18285] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.662451][T18285] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.669707][T18285] device bridge_slave_1 entered promiscuous mode [ 767.748951][T18285] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.755829][T18285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 767.762910][T18285] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.769671][T18285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.780064][T18093] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.787177][T18093] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.824674][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 767.831925][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 767.840894][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 767.848945][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 767.858352][T18056] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.865204][T18056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.893051][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 767.901443][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 767.909429][T18056] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.916275][T18056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 767.933783][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 767.941873][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 767.949619][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 767.958113][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 767.976506][T18285] device veth0_vlan entered promiscuous mode [ 767.990134][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 767.998273][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 768.006793][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 768.015275][T18056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 768.027116][T18285] device veth1_macvtap entered promiscuous mode [ 768.040141][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 768.047313][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 768.054736][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 768.063232][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 768.071170][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 768.089199][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 768.097593][T18098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 768.155730][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 768.166233][T18093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 768.298459][ T389] device bridge_slave_1 left promiscuous mode [ 768.310361][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.340661][ T389] device bridge_slave_0 left promiscuous mode [ 768.346690][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.457208][ T389] device veth0_vlan left promiscuous mode [ 769.008122][T18419] device syzkaller0 entered promiscuous mode [ 769.544008][T18487] IPv6: ¥: Disabled Multicast RS [ 770.599479][T18603] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 771.804066][T18730] device pim6reg1 entered promiscuous mode [ 771.953041][T18746] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 772.279883][T18792] device pim6reg1 entered promiscuous mode [ 772.442273][T18809] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.449280][T18809] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.529050][ T24] audit: type=1400 audit(1718171108.819:180): avc: denied { create } for pid=18805 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 772.529258][T18809] device bridge_slave_1 left promiscuous mode [ 772.561761][T18809] bridge0: port 2(bridge_slave_1) entered disabled state [ 772.569182][T18809] device bridge_slave_0 left promiscuous mode [ 772.575571][T18809] bridge0: port 1(bridge_slave_0) entered disabled state [ 772.731065][T18829] device macsec0 left promiscuous mode [ 772.957076][T18888] bpf_get_probe_write_proto: 12 callbacks suppressed [ 772.957086][T18888] syz-executor.2[18888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.970031][T18888] syz-executor.2[18888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.034972][T18900] syz-executor.4[18900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.046911][T18900] syz-executor.4[18900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.105125][T18906] syz-executor.2[18906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.119604][T18906] syz-executor.2[18906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.138089][T18919] syz-executor.4[18919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.153761][T18919] syz-executor.4[18919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 773.310921][T18931] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 773.850698][T18993] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 774.249006][T19075] device syzkaller0 entered promiscuous mode [ 774.272928][T19077] device veth1_macvtap left promiscuous mode [ 774.343768][T19077] device veth1_macvtap entered promiscuous mode [ 774.370056][T19077] device macsec0 entered promiscuous mode [ 774.408089][T19079] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 774.848575][T19111] device syzkaller0 entered promiscuous mode [ 774.924340][T19120] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 775.070598][T19150] syz-executor.2[19150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.070655][T19150] syz-executor.2[19150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.102318][T19154] device sit0 left promiscuous mode [ 775.156490][T19155] device sit0 entered promiscuous mode [ 775.426271][T19188] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 775.717591][T19200] device vxcan1 entered promiscuous mode [ 776.018081][T19234] device vxcan1 entered promiscuous mode [ 776.685030][T19328] device syzkaller0 entered promiscuous mode [ 776.987400][T19338] device vxcan1 entered promiscuous mode [ 777.074400][T19354] bridge0: port 1(bridge_slave_0) entered blocking state [ 777.082359][T19354] bridge0: port 1(bridge_slave_0) entered disabled state [ 777.089712][T19354] device bridge_slave_0 entered promiscuous mode [ 777.096769][T19354] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.121497][T19354] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.134869][T19354] device bridge_slave_1 entered promiscuous mode [ 777.208612][T19354] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.215572][T19354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 777.222678][T19354] bridge0: port 1(bridge_slave_0) entered blocking state [ 777.229450][T19354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 777.277745][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 777.285784][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 777.293339][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.321654][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 777.331947][ T409] bridge0: port 1(bridge_slave_0) entered blocking state [ 777.338805][ T409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 777.347240][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 777.355579][ T409] bridge0: port 2(bridge_slave_1) entered blocking state [ 777.362448][ T409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 777.396177][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 777.407142][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 777.415428][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 777.436908][T19354] device veth0_vlan entered promiscuous mode [ 777.446475][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 777.467139][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 777.475099][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 777.485777][T19354] device veth1_macvtap entered promiscuous mode [ 777.493908][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 777.506252][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 777.539071][ T409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 777.630796][ T389] device bridge_slave_1 left promiscuous mode [ 777.636862][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 777.644467][ T389] device bridge_slave_0 left promiscuous mode [ 777.650682][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 777.913693][T19412] device syzkaller0 entered promiscuous mode [ 778.106092][T19441] device syzkaller0 entered promiscuous mode [ 778.131298][T19451] bpf_get_probe_write_proto: 4 callbacks suppressed [ 778.131306][T19451] syz-executor.1[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.140369][T19451] syz-executor.1[19451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.472587][T19516] syz-executor.2[19516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.493905][T19516] syz-executor.2[19516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.636174][T19536] syz-executor.2[19536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.666263][T19536] syz-executor.2[19536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.681402][T19536] syz-executor.2[19536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.717476][T19536] syz-executor.2[19536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.919680][T19544] device syzkaller0 entered promiscuous mode [ 779.037877][T19589] syz-executor.1[19589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 779.037921][T19589] syz-executor.1[19589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 779.086397][T19587] device pim6reg1 entered promiscuous mode [ 779.099988][T19593] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 49 (only 8 groups) [ 780.000839][T19669] device syzkaller0 entered promiscuous mode [ 780.137518][T19691] device syzkaller0 entered promiscuous mode [ 780.339842][T19722] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.346800][T19722] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.375134][T19722] device bridge_slave_0 entered promiscuous mode [ 780.389129][T19722] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.396048][T19722] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.403892][T19722] device bridge_slave_1 entered promiscuous mode [ 780.468108][T19722] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.474981][T19722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.482174][T19722] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.488925][T19722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.523118][T18085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 780.539251][T18085] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.547787][T18085] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.672926][T19734] device syzkaller0 entered promiscuous mode [ 780.692099][T18099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 780.700317][T18099] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.707156][T18099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 780.739212][T18099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 780.748516][T18099] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.755378][T18099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 780.764734][T18099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 780.772715][T18099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 780.800116][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 780.822359][T19722] device veth0_vlan entered promiscuous mode [ 780.832879][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 780.863243][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 780.885127][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 780.904779][T19722] device veth1_macvtap entered promiscuous mode [ 780.918591][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 780.947582][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 780.959576][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 781.073914][T19855] device syzkaller0 entered promiscuous mode [ 781.100489][ T1665] device bridge_slave_1 left promiscuous mode [ 781.111234][ T1665] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.128180][ T1665] device bridge_slave_0 left promiscuous mode [ 781.135059][ T1665] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.145840][ T1665] device veth1_macvtap left promiscuous mode [ 781.307792][T19865] device sit0 left promiscuous mode [ 781.316981][T19873] device sit0 entered promiscuous mode [ 782.132358][T20067] device syzkaller0 entered promiscuous mode [ 782.144027][T20076] €Â: renamed from pim6reg1 [ 782.219168][T20084] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.226226][T20084] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.234440][T20084] device bridge_slave_0 entered promiscuous mode [ 782.243930][T20084] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.264786][T20084] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.272745][T20084] device bridge_slave_1 entered promiscuous mode [ 782.325427][T20114] device syzkaller0 entered promiscuous mode [ 782.349694][T20084] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.356557][T20084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.363658][T20084] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.370447][T20084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.395040][T18092] bridge0: port 1(bridge_slave_0) entered disabled state [ 782.402420][T18092] bridge0: port 2(bridge_slave_1) entered disabled state [ 782.435737][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 782.443434][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 782.464292][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 782.475607][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 782.491422][T18092] bridge0: port 1(bridge_slave_0) entered blocking state [ 782.498286][T18092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 782.506511][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 782.514681][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 782.522936][T18092] bridge0: port 2(bridge_slave_1) entered blocking state [ 782.529774][T18092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 782.537254][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 782.545170][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 782.553196][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 782.561144][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 782.573001][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 782.581142][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 782.594050][ T7013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 782.602697][ T7013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 782.699356][T20084] device veth0_vlan entered promiscuous mode [ 782.712754][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 782.720496][T18060] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 782.734901][T20084] device veth1_macvtap entered promiscuous mode [ 782.775928][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 782.784146][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 782.792955][T18092] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 782.819917][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 782.828146][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 782.836545][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 782.853847][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 783.065395][T20188] device syzkaller0 entered promiscuous mode [ 783.082062][ T1665] device bridge_slave_1 left promiscuous mode [ 783.087995][ T1665] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.099031][ T1665] device bridge_slave_0 left promiscuous mode [ 783.104994][ T1665] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.284219][T20210] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 784.340996][T20353] bpf_get_probe_write_proto: 13 callbacks suppressed [ 784.341007][T20353] syz-executor.4[20353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.349153][T20353] syz-executor.4[20353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 784.484157][T20378] device syzkaller0 entered promiscuous mode [ 784.863367][T20471] device pim6reg1 entered promiscuous mode [ 785.016583][T20510] device syzkaller0 entered promiscuous mode [ 785.058415][T20513] syz-executor.3[20513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 785.058461][T20513] syz-executor.3[20513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 785.060026][T20514] syz-executor.3[20514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 785.112145][T20536] device pim6reg1 entered promiscuous mode [ 785.402091][T20563] device pim6reg1 entered promiscuous mode [ 785.731529][T20614] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 785.807212][T20620] device syzkaller0 entered promiscuous mode [ 786.394904][T20692] device syzkaller0 entered promiscuous mode [ 786.636998][T20701] device pim6reg1 entered promiscuous mode [ 786.809440][T20720] device vxcan1 entered promiscuous mode [ 786.835783][T20727] device syzkaller0 entered promiscuous mode [ 788.109502][T20917] EXT4-fs warning (device sda1): ext4_group_extend:1812: need to use ext2online to resize further [ 788.317765][T20964] device syzkaller0 entered promiscuous mode [ 888.949859][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 888.956281][ C1] rcu: 1-...!: (9999 ticks this GP) idle=cda/1/0x4000000000000000 softirq=164499/164499 fqs=0 last_accelerate: beb1/e5c0 dyntick_enabled: 1 [ 888.970409][ C1] (t=10000 jiffies g=167889 q=105) [ 888.975442][ C1] rcu: rcu_preempt kthread starved for 10000 jiffies! g167889 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 888.986721][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 888.996529][ C1] rcu: RCU grace-period kthread stack dump: [ 889.002257][ C1] task:rcu_preempt state:I stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 889.011290][ C1] Call Trace: [ 889.014437][ C1] __schedule+0xbe6/0x1330 [ 889.018663][ C1] ? release_firmware_map_entry+0x192/0x192 [ 889.024391][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 889.029687][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 889.034371][ C1] schedule+0x13d/0x1d0 [ 889.038366][ C1] schedule_timeout+0x18c/0x360 [ 889.043053][ C1] ? prepare_to_swait_event+0x39f/0x3e0 [ 889.048430][ C1] ? console_conditional_schedule+0x10/0x10 [ 889.054160][ C1] ? run_local_timers+0x160/0x160 [ 889.059020][ C1] ? __note_gp_changes+0x2d8/0x6f0 [ 889.063967][ C1] rcu_gp_kthread+0xefc/0x23a0 [ 889.068567][ C1] ? dump_blkd_tasks+0x7e0/0x7e0 [ 889.073341][ C1] ? rcu_barrier_callback+0x50/0x50 [ 889.078490][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 889.083150][ C1] ? __kasan_check_read+0x11/0x20 [ 889.088014][ C1] ? __kthread_parkme+0xb9/0x1c0 [ 889.092783][ C1] kthread+0x34b/0x3d0 [ 889.096685][ C1] ? rcu_barrier_callback+0x50/0x50 [ 889.101721][ C1] ? kthread_blkcg+0xd0/0xd0 [ 889.106149][ C1] ret_from_fork+0x1f/0x30 [ 889.110432][ C1] NMI backtrace for cpu 1 [ 889.114571][ C1] CPU: 1 PID: 21026 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 889.126105][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 889.135999][ C1] Call Trace: [ 889.139123][ C1] [ 889.141823][ C1] dump_stack_lvl+0x1e2/0x24b [ 889.146332][ C1] ? panic+0x80b/0x80b [ 889.150240][ C1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 889.155531][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 889.160912][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 889.165601][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 889.171501][ C1] dump_stack+0x15/0x17 [ 889.175493][ C1] nmi_trigger_cpumask_backtrace+0x2b5/0x300 [ 889.181308][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 889.187212][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 889.192940][ C1] rcu_dump_cpu_stacks+0x199/0x2b0 [ 889.197885][ C1] rcu_sched_clock_irq+0xf8a/0x1890 [ 889.202921][ C1] ? rcutree_dead_cpu+0x340/0x340 [ 889.207780][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 889.212814][ C1] update_process_times+0x198/0x200 [ 889.217848][ C1] tick_sched_timer+0x188/0x240 [ 889.222534][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 889.227913][ C1] __hrtimer_run_queues+0x3d7/0xa50 [ 889.232953][ C1] ? hrtimer_interrupt+0x8b0/0x8b0 [ 889.237896][ C1] ? clockevents_program_event+0x214/0x2c0 [ 889.243540][ C1] ? ktime_get_update_offsets_now+0x266/0x280 [ 889.249438][ C1] hrtimer_interrupt+0x39a/0x8b0 [ 889.254216][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 889.259966][ C1] asm_call_irq_on_stack+0xf/0x20 [ 889.264798][ C1] [ 889.267676][ C1] sysvec_apic_timer_interrupt+0x85/0xe0 [ 889.273133][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 889.278951][ C1] RIP: 0010:tipc_sk_lookup+0x4be/0x650 [ 889.284243][ C1] Code: 28 00 10 fd e9 6f fd ff ff 4d 85 ed 49 be 00 00 00 00 00 fc ff df 74 7b 48 8b 44 24 48 42 0f b6 04 30 84 c0 0f 85 62 01 00 00 <48> 8b 44 24 18 0f b7 00 49 29 c5 74 63 4d 8d b5 80 00 00 00 4c 89 [ 889.303683][ C1] RSP: 0018:ffffc90001186660 EFLAGS: 00000246 [ 889.309667][ C1] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000001186603 [ 889.317481][ C1] RDX: ffff888129e262c0 RSI: 0000000000000000 RDI: 0000000000000000 [ 889.325292][ C1] RBP: ffffc90001186750 R08: ffffffff84983b4f R09: 0000000000000003 [ 889.333189][ C1] R10: fffff52000230cdc R11: dffffc0000000001 R12: fffffffffffffc18 [ 889.341009][ C1] R13: ffff88810f9970e8 R14: dffffc0000000000 R15: 000000000000035c [ 889.348997][ C1] ? tipc_sk_lookup+0x31f/0x650 [ 889.353686][ C1] ? tipc_sk_rcv+0x1e30/0x1e30 [ 889.358275][ C1] tipc_sk_rcv+0x499/0x1e30 [ 889.362615][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 889.368258][ C1] ? __stack_depot_save+0x468/0x4d0 [ 889.373294][ C1] ? __skb_queue_purge+0x180/0x180 [ 889.378237][ C1] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 889.383447][ C1] tipc_node_xmit+0x34b/0xe30 [ 889.387958][ C1] ? bpf_trace_run1+0x210/0x210 [ 889.392643][ C1] ? kfree_skbmem+0x104/0x170 [ 889.397156][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 889.402973][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 889.408180][ C1] ? kfree_skbmem+0x104/0x170 [ 889.412695][ C1] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 889.418334][ C1] tipc_node_distr_xmit+0x36a/0x4d0 [ 889.423371][ C1] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 889.428401][ C1] ? trace_tipc_sk_rej_msg+0x2b/0x6f0 [ 889.433626][ C1] tipc_sk_rcv+0x177d/0x1e30 [ 889.438053][ C1] ? __skb_queue_purge+0x180/0x180 [ 889.442993][ C1] ? __alloc_pages_nodemask+0x435/0xaf0 [ 889.448465][ C1] ? new_slab+0x80/0x400 [ 889.452638][ C1] ? __alloc_skb+0x80/0x510 [ 889.456962][ C1] ? sched_clock+0x3a/0x40 [ 889.461216][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 889.465903][ C1] ? __kasan_check_write+0x14/0x20 [ 889.470851][ C1] tipc_node_xmit+0x34b/0xe30 [ 889.475495][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 889.480862][ C1] tipc_sk_push_backlog+0x4da/0x7b0 [ 889.485913][ C1] tipc_sk_proto_rcv+0xaa9/0x1db0 [ 889.490760][ C1] ? trace_tipc_sk_dump+0x6e0/0x6e0 [ 889.495789][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 889.501081][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 889.505768][ C1] ? stack_trace_save+0x113/0x1c0 [ 889.510630][ C1] tipc_sk_filter_rcv+0x3603/0x3e00 [ 889.515659][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 889.521303][ C1] ? __stack_depot_save+0x468/0x4d0 [ 889.526336][ C1] ? bpf_trace_printk+0xcca/0xd50 [ 889.531198][ C1] ? stack_map_get_build_id_offset+0x1460/0x1460 [ 889.537355][ C1] ? bpf_probe_write_user+0xf0/0xf0 [ 889.542395][ C1] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 889.547599][ C1] ? tipc_sk_dump+0xf50/0xf50 [ 889.552116][ C1] ? __kasan_check_write+0x14/0x20 [ 889.557058][ C1] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 889.561918][ C1] ? kmem_cache_free+0xa9/0x1e0 [ 889.566606][ C1] tipc_sk_rcv+0x8a1/0x1e30 [ 889.570945][ C1] ? kfree_skbmem+0x104/0x170 [ 889.575460][ C1] ? __skb_queue_purge+0x180/0x180 [ 889.580495][ C1] ? tipc_sk_filter_rcv+0x3583/0x3e00 [ 889.585710][ C1] tipc_node_xmit+0x34b/0xe30 [ 889.590216][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 889.595597][ C1] tipc_node_distr_xmit+0x36a/0x4d0 [ 889.600648][ C1] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 889.605666][ C1] tipc_sk_backlog_rcv+0x18b/0x210 [ 889.610617][ C1] ? tipc_sk_timeout+0xab0/0xab0 [ 889.615384][ C1] ? __local_bh_enable_ip+0x53/0x80 [ 889.620422][ C1] ? lock_sock_nested+0x26a/0x300 [ 889.625279][ C1] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 889.630316][ C1] __release_sock+0x148/0x410 [ 889.634832][ C1] sock_setsockopt+0x1e3b/0x2e00 [ 889.639597][ C1] ? __sock_set_mark+0x160/0x160 [ 889.644374][ C1] ? irqentry_exit+0x4f/0x60 [ 889.648794][ C1] ? sysvec_reschedule_ipi+0x83/0x160 [ 889.654013][ C1] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 889.659480][ C1] __sys_setsockopt+0x441/0x870 [ 889.664158][ C1] ? __ia32_sys_recv+0xb0/0xb0 [ 889.668757][ C1] ? __kasan_check_write+0x14/0x20 [ 889.673708][ C1] ? switch_fpu_return+0x1e4/0x3c0 [ 889.678654][ C1] ? fpu__clear_all+0x20/0x20 [ 889.683167][ C1] __x64_sys_setsockopt+0xbf/0xd0 [ 889.688024][ C1] do_syscall_64+0x34/0x70 [ 889.692304][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 889.698011][ C1] RIP: 0033:0x7fdfb5afbea9 [ 889.702264][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 889.721707][ C1] RSP: 002b:00007fdfb4e340c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 889.729949][ C1] RAX: ffffffffffffffda RBX: 00007fdfb5c33120 RCX: 00007fdfb5afbea9 [ 889.737756][ C1] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000005 [ 889.745567][ C1] RBP: 00007fdfb5b6aff4 R08: 0000000000000004 R09: 0000000000000000 [ 889.753377][ C1] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 889.761188][ C1] R13: 000000000000000b R14: 00007fdfb5c33120 R15: 00007ffcbe61d0a8 [ 924.948875][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.2:21024] [ 924.957361][ C0] Modules linked in: [ 924.961103][ C0] CPU: 0 PID: 21024 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 924.972639][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 924.982628][ C0] RIP: 0010:kvm_wait+0xfc/0x150 [ 924.987305][ C0] Code: 38 f0 75 26 41 f7 c7 00 02 00 00 75 0f 0f 1f 44 00 00 0f 00 2d d5 4f d5 03 f4 eb 0e 0f 1f 44 00 00 0f 00 2d c6 4f d5 03 fb f4 <4c> 89 7c 24 18 ff 74 24 18 9d 48 c7 44 24 20 0e 36 e0 45 49 c7 04 [ 925.007442][ C0] RSP: 0018:ffffc90001137680 EFLAGS: 00000246 [ 925.013341][ C0] RAX: 0000000000000003 RBX: 1ffff92000226ed4 RCX: ffffffff8150b6c4 [ 925.021153][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc900011376c0 [ 925.028963][ C0] RBP: ffffc90001137730 R08: dffffc0000000000 R09: ffffed1021f32db2 [ 925.036779][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 925.044585][ C0] R13: ffff88810f996d88 R14: 0000000000000003 R15: 0000000000000246 [ 925.052487][ C0] FS: 00007fdfb4e766c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 925.061251][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 925.067674][ C0] CR2: 00007fdfb4e13d58 CR3: 000000010a911000 CR4: 00000000003506b0 [ 925.075489][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 925.083294][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 925.091104][ C0] Call Trace: [ 925.094229][ C0] [ 925.096932][ C0] ? show_regs+0x58/0x60 [ 925.101007][ C0] ? watchdog_timer_fn+0x471/0x590 [ 925.105951][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 925.111092][ C0] ? __hrtimer_run_queues+0x3d7/0xa50 [ 925.116284][ C0] ? hrtimer_interrupt+0x8b0/0x8b0 [ 925.121228][ C0] ? clockevents_program_event+0x214/0x2c0 [ 925.126869][ C0] ? ktime_get_update_offsets_now+0x266/0x280 [ 925.132770][ C0] ? hrtimer_interrupt+0x39a/0x8b0 [ 925.137726][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 925.143620][ C0] ? asm_call_irq_on_stack+0xf/0x20 [ 925.148646][ C0] [ 925.151431][ C0] ? sysvec_apic_timer_interrupt+0x85/0xe0 [ 925.157072][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 925.163063][ C0] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 925.169141][ C0] ? kvm_wait+0xfc/0x150 [ 925.173216][ C0] ? asm_common_interrupt+0x1e/0x40 [ 925.178336][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 925.183282][ C0] ? __pv_queued_spin_lock_slowpath+0x6d4/0xc70 [ 925.189359][ C0] __pv_queued_spin_lock_slowpath+0x72f/0xc70 [ 925.195262][ C0] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 925.201512][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 925.206279][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 925.211318][ C0] ? selinux_socket_sendmsg+0x243/0x340 [ 925.216700][ C0] lock_sock_nested+0x92/0x300 [ 925.221297][ C0] ? sock_init_data+0xc0/0xc0 [ 925.225811][ C0] ? _raw_spin_unlock_bh+0x51/0x60 [ 925.230769][ C0] tipc_sendstream+0x47/0x70 [ 925.235184][ C0] ? tipc_getsockopt+0x790/0x790 [ 925.239956][ C0] ____sys_sendmsg+0x59e/0x8f0 [ 925.244556][ C0] ? __sys_sendmsg_sock+0x40/0x40 [ 925.249418][ C0] ? import_iovec+0xe5/0x120 [ 925.253844][ C0] ___sys_sendmsg+0x252/0x2e0 [ 925.258357][ C0] ? __sys_sendmsg+0x280/0x280 [ 925.262967][ C0] ? __fdget+0x1bc/0x240 [ 925.267034][ C0] __se_sys_sendmsg+0x1b1/0x280 [ 925.271723][ C0] ? __x64_sys_sendmsg+0x90/0x90 [ 925.276498][ C0] ? fpu__clear_all+0x20/0x20 [ 925.281010][ C0] ? __kasan_check_read+0x11/0x20 [ 925.285867][ C0] __x64_sys_sendmsg+0x7b/0x90 [ 925.290467][ C0] do_syscall_64+0x34/0x70 [ 925.294726][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 925.300447][ C0] RIP: 0033:0x7fdfb5afbea9 [ 925.304705][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 925.324141][ C0] RSP: 002b:00007fdfb4e760c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 925.332384][ C0] RAX: ffffffffffffffda RBX: 00007fdfb5c32f80 RCX: 00007fdfb5afbea9 [ 925.340197][ C0] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000006 [ 925.348006][ C0] RBP: 00007fdfb5b6aff4 R08: 0000000000000000 R09: 0000000000000000 [ 925.355817][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 925.363632][ C0] R13: 000000000000000b R14: 00007fdfb5c32f80 R15: 00007ffcbe61d0a8 [ 925.371454][ C0] Sending NMI from CPU 0 to CPUs 1: [ 925.377377][ C1] NMI backtrace for cpu 1 [ 925.377385][ C1] CPU: 1 PID: 21026 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 925.377391][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 925.377394][ C1] RIP: 0010:bcmp+0x3b/0xb0 [ 925.377404][ C1] Code: 84 84 00 00 00 49 89 d6 49 89 f7 49 89 fc 48 ba 00 00 00 00 00 fc ff df 45 31 ed 4b 8d 3c 2c 48 89 f8 48 c1 e8 03 0f b6 04 10 <84> c0 75 2b 43 0f b6 1c 2c 4b 8d 3c 2f 48 89 f8 48 c1 e8 03 0f b6 [ 925.377408][ C1] RSP: 0018:ffffc90001186628 EFLAGS: 00000a03 [ 925.377416][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000001186601 [ 925.377421][ C1] RDX: dffffc0000000000 RSI: ffffc900011866e0 RDI: ffff88810f99705e [ 925.377425][ C1] RBP: ffffc90001186650 R08: ffffffff84983ac5 R09: 0000000000000003 [ 925.377430][ C1] R10: fffff52000230cdc R11: dffffc0000000001 R12: ffff88810f99705c [ 925.377435][ C1] R13: 0000000000000002 R14: 0000000000000004 R15: ffffc900011866e0 [ 925.377440][ C1] FS: 00007fdfb4e346c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 925.377445][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 925.377450][ C1] CR2: 0000000020003280 CR3: 000000010a911000 CR4: 00000000003506a0 [ 925.377455][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 925.377459][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 925.377462][ C1] Call Trace: [ 925.377465][ C1] [ 925.377468][ C1] ? show_regs+0x58/0x60 [ 925.377472][ C1] ? nmi_cpu_backtrace+0x133/0x160 [ 925.377474][ C1] ? bcmp+0x3b/0xb0 [ 925.377477][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 925.377480][ C1] ? nmi_handle+0xa8/0x280 [ 925.377482][ C1] ? bcmp+0x3b/0xb0 [ 925.377484][ C1] ? default_do_nmi+0x69/0x160 [ 925.377487][ C1] ? exc_nmi+0xaf/0x120 [ 925.377490][ C1] ? end_repeat_nmi+0x16/0x31 [ 925.377492][ C1] ? tipc_sk_lookup+0x295/0x650 [ 925.377495][ C1] ? bcmp+0x3b/0xb0 [ 925.377497][ C1] ? bcmp+0x3b/0xb0 [ 925.377499][ C1] ? bcmp+0x3b/0xb0 [ 925.377502][ C1] [ 925.377504][ C1] tipc_sk_lookup+0x313/0x650 [ 925.377507][ C1] ? tipc_sk_rcv+0x1e30/0x1e30 [ 925.377510][ C1] tipc_sk_rcv+0x499/0x1e30 [ 925.377512][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 925.377515][ C1] ? __stack_depot_save+0x468/0x4d0 [ 925.377518][ C1] ? __skb_queue_purge+0x180/0x180 [ 925.377521][ C1] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 925.377523][ C1] tipc_node_xmit+0x34b/0xe30 [ 925.377526][ C1] ? bpf_trace_run1+0x210/0x210 [ 925.377529][ C1] ? kfree_skbmem+0x104/0x170 [ 925.377531][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 925.377534][ C1] ? __bpf_trace_kmem_free+0x6f/0x90 [ 925.377537][ C1] ? kfree_skbmem+0x104/0x170 [ 925.377540][ C1] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 925.377543][ C1] tipc_node_distr_xmit+0x36a/0x4d0 [ 925.377545][ C1] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 925.377548][ C1] ? trace_tipc_sk_rej_msg+0x2b/0x6f0 [ 925.377551][ C1] tipc_sk_rcv+0x177d/0x1e30 [ 925.377553][ C1] ? __skb_queue_purge+0x180/0x180 [ 925.377556][ C1] ? __alloc_pages_nodemask+0x435/0xaf0 [ 925.377559][ C1] ? new_slab+0x80/0x400 [ 925.377561][ C1] ? __alloc_skb+0x80/0x510 [ 925.377564][ C1] ? sched_clock+0x3a/0x40 [ 925.377566][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 925.377569][ C1] ? __kasan_check_write+0x14/0x20 [ 925.377572][ C1] tipc_node_xmit+0x34b/0xe30 [ 925.377574][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 925.377577][ C1] tipc_sk_push_backlog+0x4da/0x7b0 [ 925.377580][ C1] tipc_sk_proto_rcv+0xaa9/0x1db0 [ 925.377582][ C1] ? trace_tipc_sk_dump+0x6e0/0x6e0 [ 925.377585][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 925.377588][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 925.377590][ C1] ? stack_trace_save+0x113/0x1c0 [ 925.377593][ C1] tipc_sk_filter_rcv+0x3603/0x3e00 [ 925.377596][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 925.377599][ C1] ? __stack_depot_save+0x468/0x4d0 [ 925.377601][ C1] ? bpf_trace_printk+0xcca/0xd50 [ 925.377605][ C1] ? stack_map_get_build_id_offset+0x1460/0x1460 [ 925.377607][ C1] ? bpf_probe_write_user+0xf0/0xf0 [ 925.377610][ C1] ? bpf_get_stack_raw_tp+0x1b2/0x220 [ 925.377613][ C1] ? tipc_sk_dump+0xf50/0xf50 [ 925.377615][ C1] ? __kasan_check_write+0x14/0x20 [ 925.377618][ C1] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 925.377621][ C1] ? kmem_cache_free+0xa9/0x1e0 [ 925.377623][ C1] tipc_sk_rcv+0x8a1/0x1e30 [ 925.377626][ C1] ? kfree_skbmem+0x104/0x170 [ 925.377628][ C1] ? __skb_queue_purge+0x180/0x180 [ 925.377631][ C1] ? tipc_sk_filter_rcv+0x3583/0x3e00 [ 925.377634][ C1] tipc_node_xmit+0x34b/0xe30 [ 925.377636][ C1] ? tipc_node_get_linkname+0x190/0x190 [ 925.377639][ C1] tipc_node_distr_xmit+0x36a/0x4d0 [ 925.377642][ C1] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 925.377644][ C1] tipc_sk_backlog_rcv+0x18b/0x210 [ 925.377647][ C1] ? tipc_sk_timeout+0xab0/0xab0 [ 925.377650][ C1] ? __local_bh_enable_ip+0x53/0x80 [ 925.377653][ C1] ? lock_sock_nested+0x26a/0x300 [ 925.377655][ C1] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 925.377658][ C1] __release_sock+0x148/0x410 [ 925.377660][ C1] sock_setsockopt+0x1e3b/0x2e00 [ 925.377663][ C1] ? __sock_set_mark+0x160/0x160 [ 925.377665][ C1] ? irqentry_exit+0x4f/0x60 [ 925.377668][ C1] ? sysvec_reschedule_ipi+0x83/0x160 [ 925.377671][ C1] ? asm_sysvec_reschedule_ipi+0x12/0x20 [ 925.377674][ C1] __sys_setsockopt+0x441/0x870 [ 925.377676][ C1] ? __ia32_sys_recv+0xb0/0xb0 [ 925.377679][ C1] ? __kasan_check_write+0x14/0x20 [ 925.377682][ C1] ? switch_fpu_return+0x1e4/0x3c0 [ 925.377684][ C1] ? fpu__clear_all+0x20/0x20 [ 925.377687][ C1] __x64_sys_setsockopt+0xbf/0xd0 [ 925.377689][ C1] do_syscall_64+0x34/0x70 [ 925.377692][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 925.377695][ C1] RIP: 0033:0x7fdfb5afbea9 [ 925.377703][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 925.377706][ C1] RSP: 002b:00007fdfb4e340c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 925.377712][ C1] RAX: ffffffffffffffda RBX: 00007fdfb5c33120 RCX: 00007fdfb5afbea9 [ 925.377716][ C1] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000005 [ 925.377720][ C1] RBP: 00007fdfb5b6aff4 R08: 0000000000000004 R09: 0000000000000000 [ 925.377723][ C1] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 925.377727][ C1] R13: 000000000000000b R14: 00007fdfb5c33120 R15: 00007ffcbe61d0a8