last executing test programs: 2.843352533s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0xa, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 2.833796194s ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x237b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 2.569866004s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000000), 0x165243) 2.348818169s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x0, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 2.247106094s ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x3, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000200000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 2.168634747s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='jbd2_write_superblock\x00'}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x8, 0xb, 0x1, r2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), 0x0}, 0x20) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.971466606s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='jbd2_write_superblock\x00'}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x8, 0xb, 0x1, r2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, 0x0, &(0x7f00000005c0)=""/155}, 0x20) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.850916705s ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x45}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x0, 0x0, 0x0, 0x6, 0x30, &(0x7f00000002c0)=""/48, 0x0, 0x56, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x1, 0x7ff}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[r0, 0xffffffffffffffff], &(0x7f0000000400)=[{0x3, 0x4, 0x0, 0x9}, {0x5, 0x2, 0x7}]}, 0x90) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 1.670267023s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400000eb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='ext4_ext_show_extent\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r4, &(0x7f0000000000), 0x248800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xd8, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x63b6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0xffff6114}}, @enum={0x6, 0x3, 0x0, 0x6, 0x4, [{0xf, 0x4}, {0x3, 0x5}, {0x1, 0x1}]}, @func={0xf, 0x0, 0x0, 0xc, 0x4}, @enum={0xc, 0x7, 0x0, 0x6, 0x4, [{0x2, 0x9}, {0x8, 0xff}, {0x5, 0x3}, {0x7, 0x8}, {0x7, 0x401}, {}, {0x3, 0x9ff}]}, @enum={0x10, 0x8, 0x0, 0x6, 0x4, [{0x0, 0x5}, {0xe, 0x165ed65d}, {0x7, 0x1f}, {0x9, 0x1}, {0x2, 0x7fffffff}, {0xa}, {0x8, 0x9}, {0xc, 0x8000}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xf, 0x2}, {0x8, 0x3}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xa, 0x5}, {0x4, 0x3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x1e}}, @fwd={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/171, 0x14f, 0xab, 0x1, 0x2}, 0x20) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x57}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0xc, 0x4, 0x0, 0x8}, @jmp={0x5, 0x1, 0x9, 0x5, 0x5, 0x30, 0x1}, @alu={0x4, 0x1, 0x3, 0x4, 0x1, 0x8, 0x10}, @exit, @func, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x6}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000400)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x3, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r6, r6, r6, r6, r8, r6], 0x0, 0x10, 0xff}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x12, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x7}, @ldst={0x1, 0x3, 0x6, 0xd, 0x8, 0x30, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x2, '\x00', r5, 0x25, r7, 0x8, &(0x7f0000000600)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640), &(0x7f0000000680)=[{0x0, 0x4, 0x7, 0x2}], 0x10, 0x2}, 0x90) 1.379621028s ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0xa1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000003a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='memory.numa_stat\x00') bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x20000000000001c0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0xfffffffffffffd7f) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='io.stat\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0xffe000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x2000) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582b, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085008000230000009500000000000000392be07e2bb402145ab159c10963bfe9166ea353f1a3f02ded5355d4f5d4ec83aa08ddfce3f86cc144"], &(0x7f0000000380)='GPL\x00'}, 0x90) 1.359950311s ago: executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000980)={r1, 0x0, &(0x7f0000000880)=""/247}, 0x20) 1.340868874s ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x3, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000200000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 1.325604336s ago: executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x0, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0xffffffffffffffb8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xa, 0x8, 0x2}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2e, 0x42, 0x40}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0, 0x0, 0xa00369a4}, 0x38) 1.307134079s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x237b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 1.291341072s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1807000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000001540)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000004000000ab083ba15705bc85d52a2c2805b9b1dcb283030000006700030000009500000000000000000096d4a46decff6ad9ce958c1c2cf82446796b4bb179288c0000000000000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="6200000071ad8cdf4a654e1b57350b0e0f9864ba3524ad000000851000000200000085000000000000009500b0acc0f802f7b7a97b537deed8f4179302d2e1e104ddf202c3ac6e84b529745f2f3dba4c8c9d6122cca8ce33e0c59ca71b9e634b48e53ada8bd247508ca883b0001a59a9bbd7c424d4c63260eb2ee0bb2422f9f54b0650fe884da75e6cfc669f4f53afa886a24b0b2264dc3a9e73b7dc2a7579cad35c805fe6981343253789f094073db3818586e89d7ac9d1b59e3242a5284daf6217bb"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x7}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x4, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) 1.245940208s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1807000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000001540)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000004000000ab083ba15705bc85d52a2c2805b9b1dcb283030000006700030000009500000000000000000096d4a46decff6ad9ce958c1c2cf82446796b4bb179288c0000000000000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="6200000071ad8cdf4a654e1b57350b0e0f9864ba3524ad000000851000000200000085000000000000009500b0acc0f802f7b7a97b537deed8f4179302d2e1e104ddf202c3ac6e84b529745f2f3dba4c8c9d6122cca8ce33e0c59ca71b9e634b48e53ada8bd247508ca883b0001a59a9bbd7c424d4c63260eb2ee0bb2422f9f54b0650fe884da75e6cfc669f4f53afa886a24b0b2264dc3a9e73b7dc2a7579cad35c805fe6981343253789f094073db3818586e89d7ac9d1b59e3242a5284daf6217bb"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x7}, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x4, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) 1.001699786s ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, 0xffffffffffffffff, 0x2d, 0x2010, 0x0, @link_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 702.002552ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="180000001805000000000000050000001811e100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r0, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000ac0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r2}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="8520000005080000"], &(0x7f0000000040)='GPL\x00', 0x80, 0xa0, &(0x7f0000000340)=""/160, 0x41100, 0x72, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x4, 0xb, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[r0, r1, r0, r0, r6, 0xffffffffffffffff], &(0x7f0000000240)=[{0x4, 0x2, 0x3}, {0x1, 0x2, 0x2}, {0x5, 0x3, 0x1, 0x8}, {0x2, 0x1, 0x9, 0xf}], 0x10, 0x5b69}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 406.820448ms ago: executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x45}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x0, 0x0, 0x0, 0x6, 0x30, &(0x7f00000002c0)=""/48, 0x0, 0x56, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x1, 0x7ff}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[r0, 0xffffffffffffffff], &(0x7f0000000400)=[{0x3, 0x4, 0x0, 0x9}, {0x5, 0x2, 0x7}]}, 0x90) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 330.671539ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 320.925261ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 229.510105ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) 147.217938ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='svcrdma_decode_rqst\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x8, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7e, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x75, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8000, 0x5, 0x20c, 0xffffffffffffffff, 0x1, '\x00', r4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0x7, 0x3ff, 0x0, 0x10, 0x1, 0xffffff26, '\x00', r4, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, &(0x7f0000002780)=""/4096, 0xc26bfe8e8f6baca8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pK \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0xfff, 0x3, 0x0, r6, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100ff010000000000000040000000000000000001a23200000000000000000000004a6966f82f"], 0x0, 0x49}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0506617, &(0x7f0000000040)=0x2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0506617, &(0x7f0000000040)=0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) 112.759343ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x3, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000200000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) 100.543094ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x100, &(0x7f0000000000)=@framed={{}, [@ldst={0x2, 0x1, 0x6, 0xa, 0xb, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x9e}, @alu={0x0, 0x1, 0xb, 0x7, 0xa, 0x1, 0x4}, @map_fd={0x18, 0x40a6a086d0a7ef52, 0x1, 0x0, r0}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x7}, @jmp={0x5, 0x0, 0x6, 0x5, 0xb, 0x10, 0x10}, @map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f00000001c0)}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x2c, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4}, &(0x7f00000006c0), &(0x7f0000000300)}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r3, r4}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYRESDEC=r5], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800200000000000000000000000000071121200000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000003fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, 0x0, &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r6, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x6a, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x15, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000040850000008600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, &(0x7f0000000000), &(0x7f0000000040)=r9}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r9, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 85.364717ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='jbd2_write_superblock\x00'}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x8, 0xb, 0x1, r2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), 0x0}, 0x20) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 79.950988ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000680), 0x12) 59.556371ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000d00850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000ac0)='consume_skb\x00', r2}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5460, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r=\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 12.560828ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) 0s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x237b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r6, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_discard_preallocations\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) kernel console output (not intermixed with test programs): .3[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.862825][ T1382] device syzkaller0 entered promiscuous mode [ 46.398706][ T28] audit: type=1400 audit(1718948485.231:117): avc: denied { create } for pid=1418 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.093593][ T1456] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 47.151136][ T1458] device veth0_vlan left promiscuous mode [ 47.175781][ T1458] device veth0_vlan entered promiscuous mode [ 47.269642][ T1467] device veth0_vlan left promiscuous mode [ 47.282657][ T1467] device veth0_vlan entered promiscuous mode [ 47.370935][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.395415][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.415715][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.953871][ T1516] device veth0_vlan left promiscuous mode [ 47.978149][ T1516] device veth0_vlan entered promiscuous mode [ 48.688489][ T1551] device veth0_vlan left promiscuous mode [ 48.759564][ T1551] device veth0_vlan entered promiscuous mode [ 48.911277][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.939771][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.962334][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.628505][ T1690] device pim6reg1 entered promiscuous mode [ 51.846405][ T28] audit: type=1400 audit(1718948490.671:118): avc: denied { create } for pid=1712 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 51.898796][ T28] audit: type=1400 audit(1718948490.731:119): avc: denied { getattr } for pid=1712 comm="syz-executor.3" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 52.191702][ T1724] device pim6reg1 entered promiscuous mode [ 52.433591][ T1737] device pim6reg1 entered promiscuous mode [ 53.001768][ T1763] device pim6reg1 entered promiscuous mode [ 53.269646][ T1776] device pim6reg1 entered promiscuous mode [ 53.460649][ T1794] syz-executor.2[1794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.460721][ T1794] syz-executor.2[1794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.025904][ T28] audit: type=1400 audit(1718948492.851:120): avc: denied { create } for pid=1815 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 54.613653][ T1833] device veth0_vlan left promiscuous mode [ 54.641725][ T1833] device veth0_vlan entered promiscuous mode [ 54.724569][ T1842] device pim6reg1 entered promiscuous mode [ 54.936803][ T1851] device wg2 left promiscuous mode [ 55.304857][ T1863] device veth0_vlan left promiscuous mode [ 55.337951][ T1863] device veth0_vlan entered promiscuous mode [ 55.437084][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 55.453336][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 55.489779][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 55.521430][ T1880] syz-executor.1[1880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.521510][ T1880] syz-executor.1[1880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.980620][ T1908] device veth0_vlan left promiscuous mode [ 56.026022][ T1908] device veth0_vlan entered promiscuous mode [ 56.870594][ T1949] device veth0_vlan left promiscuous mode [ 56.908625][ T1949] device veth0_vlan entered promiscuous mode [ 57.072252][ T1961] device syzkaller0 entered promiscuous mode [ 57.279012][ T1976] tun0: tun_chr_ioctl cmd 1074025677 [ 57.311914][ T1976] tun0: linktype set to 805 [ 58.719906][ T2020] device pim6reg1 entered promiscuous mode [ 58.780963][ T2025] device veth0_vlan left promiscuous mode [ 58.796871][ T2025] device veth0_vlan entered promiscuous mode [ 58.930801][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.945599][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.985572][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.159006][ T2042] device veth0_vlan left promiscuous mode [ 59.180130][ T2042] device veth0_vlan entered promiscuous mode [ 59.217504][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.233653][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.255844][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.426623][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.433615][ T2035] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.442312][ T2035] device bridge_slave_0 entered promiscuous mode [ 59.666448][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.675097][ T2035] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.686646][ T2035] device bridge_slave_1 entered promiscuous mode [ 59.889909][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.896807][ T2035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.903915][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.910786][ T2035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.958284][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.968538][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.982264][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.990114][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.012025][ T794] device bridge_slave_1 left promiscuous mode [ 60.019085][ T794] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.029045][ T794] device bridge_slave_0 left promiscuous mode [ 60.035231][ T794] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.046812][ T794] device veth1_macvtap left promiscuous mode [ 60.203799][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.231419][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.238414][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.269104][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.294943][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.301849][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.352961][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.364260][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.399016][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 60.433403][ T2035] device veth0_vlan entered promiscuous mode [ 60.444701][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 60.467624][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.506716][ T2035] device veth1_macvtap entered promiscuous mode [ 60.543913][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.556215][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 60.591493][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 60.619519][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 60.630670][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 60.647479][ T2130] Â: renamed from pim6reg1 [ 60.665253][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.681533][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.693266][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.702047][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.975988][ T28] audit: type=1400 audit(1718948499.801:121): avc: denied { create } for pid=2147 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 61.149760][ T28] audit: type=1400 audit(1718948499.981:122): avc: denied { create } for pid=2153 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 61.237668][ T28] audit: type=1400 audit(1718948500.071:123): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 61.853046][ T2195] tun0: tun_chr_ioctl cmd 1074025677 [ 61.862915][ T2195] tun0: linktype set to 805 [ 62.645893][ T2227] device veth0_vlan left promiscuous mode [ 62.672940][ T2227] device veth0_vlan entered promiscuous mode [ 63.609319][ T2262] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 64.062829][ T2286] tun0: tun_chr_ioctl cmd 1074025677 [ 64.080903][ T2286] tun0: linktype set to 805 [ 64.110712][ T2290] device veth0_vlan left promiscuous mode [ 64.142920][ T2290] device veth0_vlan entered promiscuous mode [ 64.223658][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.260527][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.303054][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.413853][ T2308] bridge0: port 3(veth1_macvtap) entered blocking state [ 64.457549][ T2308] bridge0: port 3(veth1_macvtap) entered disabled state [ 65.179755][ T2347] tun0: tun_chr_ioctl cmd 1074025677 [ 65.217470][ T2347] tun0: linktype set to 805 [ 66.066997][ T28] audit: type=1400 audit(1718948504.891:124): avc: denied { create } for pid=2368 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 66.618185][ T2395] device veth0_vlan left promiscuous mode [ 66.677799][ T2395] device veth0_vlan entered promiscuous mode [ 66.773255][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.790541][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.835845][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.052215][ T2402] tun0: tun_chr_ioctl cmd 1074025677 [ 67.057533][ T2402] tun0: linktype set to 805 [ 67.214031][ T2423] device veth0_vlan left promiscuous mode [ 67.233909][ T2423] device veth0_vlan entered promiscuous mode [ 67.273702][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.286436][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.305733][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.846398][ T28] audit: type=1400 audit(1718948506.671:125): avc: denied { create } for pid=2455 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 68.148181][ T2477] device veth0_vlan left promiscuous mode [ 68.173124][ T2477] device veth0_vlan entered promiscuous mode [ 68.239806][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.250656][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.272051][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.670347][ T2507] device veth0_vlan left promiscuous mode [ 68.700366][ T2507] device veth0_vlan entered promiscuous mode [ 69.542106][ T28] audit: type=1400 audit(1718948508.371:126): avc: denied { read } for pid=2545 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 69.616789][ T28] audit: type=1400 audit(1718948508.421:127): avc: denied { write } for pid=2545 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 73.017159][ C0] sched: RT throttling activated [ 73.070875][ T2650] device veth1_macvtap left promiscuous mode [ 73.081708][ T2650] device macsec0 left promiscuous mode [ 73.155531][ T2658] device syzkaller0 entered promiscuous mode [ 73.172988][ T2662] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.180195][ T2662] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.232841][ T2672] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.239762][ T2672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.246917][ T2672] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.253825][ T2672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.261091][ T2672] device bridge0 entered promiscuous mode [ 73.280257][ T2667] device syzkaller0 entered promiscuous mode [ 73.329269][ T28] audit: type=1400 audit(1718948512.161:128): avc: denied { setopt } for pid=2678 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 73.996560][ T2776] device veth1_macvtap left promiscuous mode [ 74.043424][ T2776] device veth1_macvtap entered promiscuous mode [ 74.057477][ T2776] device macsec0 entered promiscuous mode [ 74.321818][ T2809] syz-executor.0[2809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.321894][ T2809] syz-executor.0[2809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.386445][ T2809] syz-executor.0[2809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.488788][ T2809] syz-executor.0[2809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.244442][ T3100] device veth0_vlan left promiscuous mode [ 83.352651][ T3100] device veth0_vlan entered promiscuous mode [ 83.429300][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.444268][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.471694][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.589177][ T3178] device veth0_vlan left promiscuous mode [ 84.616592][ T3178] device veth0_vlan entered promiscuous mode [ 84.777715][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.818212][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.870933][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.918066][ T3226] device veth0_vlan left promiscuous mode [ 85.929291][ T3226] device veth0_vlan entered promiscuous mode [ 86.870213][ T3282] device veth0_vlan left promiscuous mode [ 86.877118][ T3282] device veth0_vlan entered promiscuous mode [ 88.415544][ T3413] device veth0_vlan left promiscuous mode [ 88.493737][ T3413] device veth0_vlan entered promiscuous mode [ 88.609579][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.626520][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.676457][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.868924][ T3417] device veth0_vlan left promiscuous mode [ 88.910365][ T3417] device veth0_vlan entered promiscuous mode [ 89.046814][ T28] audit: type=1400 audit(1718948527.871:129): avc: denied { write } for pid=3422 comm="syz-executor.1" name="net" dev="proc" ino=23983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 89.157634][ T28] audit: type=1400 audit(1718948527.871:130): avc: denied { add_name } for pid=3422 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 89.203615][ T28] audit: type=1400 audit(1718948527.881:131): avc: denied { create } for pid=3422 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 89.227338][ T28] audit: type=1400 audit(1718948527.881:132): avc: denied { associate } for pid=3422 comm="syz-executor.1" name="blkio.throttle.io_service_bytes_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 89.258596][ T3433] device veth0_vlan left promiscuous mode [ 89.264917][ T3433] device veth0_vlan entered promiscuous mode [ 89.272018][ T3434] device pim6reg1 entered promiscuous mode [ 89.726925][ T3463] device veth0_vlan left promiscuous mode [ 89.753123][ T3463] device veth0_vlan entered promiscuous mode [ 89.771839][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.780255][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.787751][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.142180][ T3490] device pim6reg1 entered promiscuous mode [ 90.368632][ T3494] device veth0_vlan left promiscuous mode [ 90.380229][ T3494] device veth0_vlan entered promiscuous mode [ 90.548184][ T3502] device veth0_vlan left promiscuous mode [ 90.580566][ T3502] device veth0_vlan entered promiscuous mode [ 90.642641][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.655862][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.675447][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.706428][ T3529] device pim6reg1 entered promiscuous mode [ 90.721618][ T3531] device veth0_vlan left promiscuous mode [ 90.740715][ T3531] device veth0_vlan entered promiscuous mode [ 90.756623][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.785376][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.825437][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.312156][ T3559] device veth0_vlan left promiscuous mode [ 91.328537][ T3559] device veth0_vlan entered promiscuous mode [ 91.371518][ T3565] device pim6reg1 entered promiscuous mode [ 91.731982][ T3597] device veth0_vlan left promiscuous mode [ 91.768672][ T3597] device veth0_vlan entered promiscuous mode [ 91.795559][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.809292][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.832728][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.858194][ T3601] device veth0_vlan left promiscuous mode [ 91.864111][ T3601] device veth0_vlan entered promiscuous mode [ 91.885349][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.907853][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.930543][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.124333][ T28] audit: type=1400 audit(1718948530.951:133): avc: denied { tracepoint } for pid=3621 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 92.270251][ T3633] device veth0_vlan left promiscuous mode [ 92.294889][ T3633] device veth0_vlan entered promiscuous mode [ 92.646996][ T3650] device pim6reg1 entered promiscuous mode [ 93.574361][ T3686] device veth0_vlan left promiscuous mode [ 93.664828][ T3686] device veth0_vlan entered promiscuous mode [ 94.645948][ T3755] syz-executor.3[3755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.646028][ T3755] syz-executor.3[3755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.308880][ T3801] syz-executor.3[3801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.324707][ T3801] syz-executor.3[3801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.358141][ T3794] device veth0_vlan left promiscuous mode [ 95.420122][ T3794] device veth0_vlan entered promiscuous mode [ 95.465918][ T3783] syz-executor.4 (3783) used greatest stack depth: 20496 bytes left [ 95.498215][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.525253][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.563227][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.330205][ T3848] syz-executor.4[3848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.330282][ T3848] syz-executor.4[3848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.987337][ T3882] device veth0_vlan left promiscuous mode [ 97.081788][ T3882] device veth0_vlan entered promiscuous mode [ 97.099600][ T3897] syz-executor.3[3897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.099678][ T3897] syz-executor.3[3897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.114915][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.186652][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.207830][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.637978][ T3932] syz-executor.4[3932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.638066][ T3932] syz-executor.4[3932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.687262][ T3929] device veth0_vlan left promiscuous mode [ 97.728119][ T3929] device veth0_vlan entered promiscuous mode [ 98.169374][ T3948] device veth0_vlan left promiscuous mode [ 98.187645][ T3948] device veth0_vlan entered promiscuous mode [ 98.215514][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.237040][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.246485][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.613266][ T3982] device veth0_vlan left promiscuous mode [ 98.649024][ T3982] device veth0_vlan entered promiscuous mode [ 98.691537][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.706798][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.735498][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.364036][ T4098] device veth0_vlan left promiscuous mode [ 100.399441][ T4098] device veth0_vlan entered promiscuous mode [ 100.437293][ T4100] device pim6reg1 entered promiscuous mode [ 100.453183][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.467018][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.500066][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.789463][ T4117] bpf_get_probe_write_proto: 2 callbacks suppressed [ 100.789483][ T4117] syz-executor.3[4117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.816468][ T4117] syz-executor.3[4117] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.066843][ T4131] device veth0_vlan left promiscuous mode [ 101.276165][ T4131] device veth0_vlan entered promiscuous mode [ 101.693613][ T4150] syz-executor.4[4150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.693686][ T4150] syz-executor.4[4150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.431578][ T4198] syz-executor.3[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.443829][ T4198] syz-executor.3[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.042130][ T4226] device veth0_vlan left promiscuous mode [ 103.122737][ T4226] device veth0_vlan entered promiscuous mode [ 103.191192][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.213570][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.244009][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.570328][ T4268] device veth0_vlan left promiscuous mode [ 103.617925][ T4268] device veth0_vlan entered promiscuous mode [ 103.701568][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.719852][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.744610][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.857466][ T4291] device veth0_vlan left promiscuous mode [ 103.881313][ T4294] syz-executor.1[4294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.881393][ T4294] syz-executor.1[4294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.887519][ T4291] device veth0_vlan entered promiscuous mode [ 104.913658][ T4340] syz-executor.4[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.913733][ T4340] syz-executor.4[4340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.497567][ T4473] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 106.843884][ T4501] device pim6reg1 entered promiscuous mode [ 107.154852][ T4521] device pim6reg1 entered promiscuous mode [ 107.271303][ T4526] syz-executor.3[4526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.271381][ T4526] syz-executor.3[4526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.319829][ T4526] device pim6reg1 entered promiscuous mode [ 107.496432][ T4547] device pim6reg1 entered promiscuous mode [ 108.387331][ T4611] device veth0_vlan left promiscuous mode [ 108.393202][ T4611] device veth0_vlan entered promiscuous mode [ 108.440008][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.461875][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.491684][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.593389][ T4593] syz-executor.0 (4593) used greatest stack depth: 20376 bytes left [ 109.012581][ T4653] device pim6reg1 entered promiscuous mode [ 109.848129][ T4693] device pim6reg1 entered promiscuous mode [ 110.230596][ T4713] device veth0_vlan left promiscuous mode [ 110.244623][ T4713] device veth0_vlan entered promiscuous mode [ 110.309691][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.328662][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.354778][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.902892][ T4789] device veth0_vlan left promiscuous mode [ 111.943804][ T4789] device veth0_vlan entered promiscuous mode [ 112.040207][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.050796][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.066252][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.984945][ T4827] device pim6reg1 entered promiscuous mode [ 113.255860][ T4842] syz-executor.3[4842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.255929][ T4842] syz-executor.3[4842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.392197][ T4920] syz-executor.3[4920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.405506][ T4920] syz-executor.3[4920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.786316][ T28] audit: type=1400 audit(1718948553.611:134): avc: denied { create } for pid=4935 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 114.818757][ T4942] syz-executor.4[4942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.818838][ T4942] syz-executor.4[4942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.925133][ T4945] device pim6reg1 entered promiscuous mode [ 115.009950][ T4951] syz-executor.1[4951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.010023][ T4951] syz-executor.1[4951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.325822][ T4978] device pim6reg1 entered promiscuous mode [ 115.785937][ T5003] syz-executor.2[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.786013][ T5003] syz-executor.2[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.187544][ T5029] device veth0_vlan left promiscuous mode [ 119.232498][ T5029] device veth0_vlan entered promiscuous mode [ 119.327800][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.335990][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.377489][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.864908][ T5065] device sit0 entered promiscuous mode [ 120.019879][ T5072] device veth0_vlan left promiscuous mode [ 120.025716][ T5072] device veth0_vlan entered promiscuous mode [ 120.073098][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.093625][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.139273][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.362930][ T5104] device sit0 entered promiscuous mode [ 120.667752][ T5117] device veth0_vlan left promiscuous mode [ 120.691687][ T5117] device veth0_vlan entered promiscuous mode [ 121.131699][ T5158] device veth0_vlan left promiscuous mode [ 121.170793][ T5158] device veth0_vlan entered promiscuous mode [ 121.262677][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.281076][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.293135][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.562660][ T5173] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.607208][ T5173] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.634987][ T5173] device bridge_slave_0 entered promiscuous mode [ 121.655758][ T5173] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.686070][ T5173] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.702963][ T5173] device bridge_slave_1 entered promiscuous mode [ 121.828409][ T342] device bridge_slave_1 left promiscuous mode [ 121.834381][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.871984][ T342] device bridge_slave_0 left promiscuous mode [ 121.910496][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.964849][ T342] device veth1_macvtap left promiscuous mode [ 121.999942][ T342] device veth0_vlan left promiscuous mode [ 122.653930][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.662737][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.767555][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.777799][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.796156][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.803044][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.834436][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.854830][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.880908][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.887798][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.906988][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.922676][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.930981][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.957760][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.018820][ T5173] device veth0_vlan entered promiscuous mode [ 123.025911][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.047795][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.090647][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.117517][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.132617][ T5173] device veth1_macvtap entered promiscuous mode [ 123.139954][ T28] audit: type=1400 audit(1718948561.971:135): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 123.225260][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.235495][ T28] audit: type=1400 audit(1718948561.971:136): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 123.267621][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.309802][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.321578][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.330657][ T28] audit: type=1400 audit(1718948562.141:137): avc: denied { mounton } for pid=5173 comm="syz-executor.3" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 123.780168][ T28] audit: type=1400 audit(1718948562.611:138): avc: denied { create } for pid=5282 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 125.349636][ T5315] bpf_get_probe_write_proto: 2 callbacks suppressed [ 125.349654][ T5315] syz-executor.1[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.378227][ T5315] syz-executor.1[5315] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.086948][ T5325] syz-executor.1[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.019999][ T5325] syz-executor.1[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.146331][ T5401] device veth0_vlan left promiscuous mode [ 132.172260][ T5401] device veth0_vlan entered promiscuous mode [ 134.893623][ T5527] device veth0_vlan left promiscuous mode [ 134.938974][ T5527] device veth0_vlan entered promiscuous mode [ 135.017361][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.050403][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.082892][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.549828][ T5668] device veth0_vlan left promiscuous mode [ 137.580771][ T5668] device veth0_vlan entered promiscuous mode [ 137.643075][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.664263][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.734677][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.324410][ T6228] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.331463][ T6228] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.338860][ T6228] device bridge_slave_0 entered promiscuous mode [ 150.392958][ T6228] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.400312][ T6228] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.410153][ T6228] device bridge_slave_1 entered promiscuous mode [ 150.826013][ T6228] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.832884][ T6228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.839958][ T6228] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.846740][ T6228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.858408][ T8] device bridge_slave_1 left promiscuous mode [ 150.865936][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.880782][ T8] device bridge_slave_0 left promiscuous mode [ 150.886793][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.897171][ T8] device veth0_vlan left promiscuous mode [ 151.219614][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.236929][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.443726][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.454548][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.483564][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.513893][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.544106][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.550998][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.594765][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.633815][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.664193][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.671092][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.728022][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.735917][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.762074][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.771478][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.821339][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.837505][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.881148][ T6228] device veth0_vlan entered promiscuous mode [ 151.899547][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 151.926904][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.979037][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.025177][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.072436][ T6228] device veth1_macvtap entered promiscuous mode [ 152.085924][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.098478][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.106529][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.150710][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.169902][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.208956][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.236798][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.702234][ T6661] device veth0_vlan left promiscuous mode [ 160.721223][ T6661] device veth0_vlan entered promiscuous mode [ 160.745289][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.778048][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.809298][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.651170][ T6701] device veth0_vlan left promiscuous mode [ 161.657801][ T6701] device veth0_vlan entered promiscuous mode [ 162.876862][ T6742] device veth0_vlan left promiscuous mode [ 162.905165][ T6742] device veth0_vlan entered promiscuous mode [ 163.687045][ T6781] device veth0_vlan left promiscuous mode [ 163.710431][ T6781] device veth0_vlan entered promiscuous mode [ 164.896298][ T6824] device veth0_vlan left promiscuous mode [ 164.905179][ T6824] device veth0_vlan entered promiscuous mode [ 165.991077][ T6863] device veth0_vlan left promiscuous mode [ 166.021947][ T6863] device veth0_vlan entered promiscuous mode [ 166.123278][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.137916][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.161229][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.906555][ T6898] device veth0_vlan left promiscuous mode [ 166.956180][ T6898] device veth0_vlan entered promiscuous mode [ 167.075960][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.086195][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.120058][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.313797][ T6936] device veth0_vlan left promiscuous mode [ 168.326818][ T6936] device veth0_vlan entered promiscuous mode [ 169.590850][ T6986] device veth0_vlan left promiscuous mode [ 169.604275][ T6986] device veth0_vlan entered promiscuous mode [ 169.643098][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.656803][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.686566][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.366205][ T7020] device veth0_vlan left promiscuous mode [ 170.417299][ T7020] device veth0_vlan entered promiscuous mode [ 171.515914][ T7056] device veth0_vlan left promiscuous mode [ 171.573411][ T7056] device veth0_vlan entered promiscuous mode [ 171.730305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.753661][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.780990][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.599889][ T7094] device veth0_vlan left promiscuous mode [ 172.627590][ T7094] device veth0_vlan entered promiscuous mode [ 172.666431][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.697840][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.722254][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.471114][ T7135] device veth0_vlan left promiscuous mode [ 173.511326][ T7135] device veth0_vlan entered promiscuous mode [ 174.419599][ T7171] device veth0_vlan left promiscuous mode [ 174.483451][ T7171] device veth0_vlan entered promiscuous mode [ 175.345108][ T7205] device veth0_vlan left promiscuous mode [ 175.375705][ T7205] device veth0_vlan entered promiscuous mode [ 176.438975][ T7237] device veth0_vlan left promiscuous mode [ 176.461642][ T7237] device veth0_vlan entered promiscuous mode [ 176.476661][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.501456][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.538248][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.542869][ T7274] device veth0_vlan left promiscuous mode [ 177.583525][ T7274] device veth0_vlan entered promiscuous mode [ 178.207993][ T7307] device veth0_vlan left promiscuous mode [ 178.230615][ T7307] device veth0_vlan entered promiscuous mode [ 178.254208][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.277760][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.310735][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.097371][ T7336] device veth0_vlan left promiscuous mode [ 179.107631][ T7336] device veth0_vlan entered promiscuous mode [ 179.142853][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.165597][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.190180][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.006870][ T7370] device veth0_vlan left promiscuous mode [ 180.090059][ T7370] device veth0_vlan entered promiscuous mode [ 180.096980][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.130656][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.211256][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.836488][ T7400] device veth0_vlan left promiscuous mode [ 180.918162][ T7400] device veth0_vlan entered promiscuous mode [ 181.955844][ T7443] device veth0_vlan left promiscuous mode [ 181.989054][ T7443] device veth0_vlan entered promiscuous mode [ 182.037258][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.062119][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.109990][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.995469][ T7481] device veth0_vlan left promiscuous mode [ 183.030049][ T7481] device veth0_vlan entered promiscuous mode [ 183.049018][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.060964][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.093370][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.951470][ T7549] device veth0_vlan left promiscuous mode [ 185.007236][ T7549] device veth0_vlan entered promiscuous mode [ 185.153733][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.170540][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.197957][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.226255][ T7629] device veth0_vlan left promiscuous mode [ 187.266275][ T7629] device veth0_vlan entered promiscuous mode [ 187.363104][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.379846][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.435177][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.407974][ T7715] device veth0_vlan left promiscuous mode [ 191.420309][ T7715] device veth0_vlan entered promiscuous mode [ 191.588091][ T7724] device veth0_vlan left promiscuous mode [ 191.619748][ T7724] device veth0_vlan entered promiscuous mode [ 191.760211][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.780942][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.818213][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.705492][ T7769] device veth0_vlan left promiscuous mode [ 192.755834][ T7769] device veth0_vlan entered promiscuous mode [ 192.791917][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.810852][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.848969][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.135489][ T7787] device veth0_vlan left promiscuous mode [ 193.171815][ T7787] device veth0_vlan entered promiscuous mode [ 193.210610][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.241530][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.277761][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.670054][ T7816] device veth0_vlan left promiscuous mode [ 193.688387][ T7816] device veth0_vlan entered promiscuous mode [ 197.829153][ T8039] device veth0_vlan left promiscuous mode [ 197.852168][ T8039] device veth0_vlan entered promiscuous mode [ 197.930719][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.947831][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.022479][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.852513][ T8076] device veth0_vlan left promiscuous mode [ 198.881384][ T8076] device veth0_vlan entered promiscuous mode [ 199.914798][ T8126] device veth0_vlan left promiscuous mode [ 199.947322][ T8126] device veth0_vlan entered promiscuous mode [ 200.028405][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.036594][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.070932][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.108430][ T8133] device veth0_vlan left promiscuous mode [ 200.142484][ T8133] device veth0_vlan entered promiscuous mode [ 200.199070][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.217393][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.237588][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.641624][ T8278] syz-executor.0[8278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.641702][ T8278] syz-executor.0[8278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.759822][ T28] audit: type=1400 audit(1718948642.591:139): avc: denied { create } for pid=8291 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 207.430640][ T8442] syz-executor.2[8442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.430721][ T8442] syz-executor.2[8442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.354632][ T8476] device syzkaller0 entered promiscuous mode [ 208.539507][ T8483] tap0: tun_chr_ioctl cmd 1074025677 [ 208.557708][ T8483] tap0: linktype set to 512 [ 208.730566][ T8485] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.767296][ T8485] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.775144][ T8485] device bridge_slave_0 entered promiscuous mode [ 208.797698][ T8485] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.852529][ T8485] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.860117][ T8485] device bridge_slave_1 entered promiscuous mode [ 209.095384][ T8485] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.102285][ T8485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.109399][ T8485] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.116243][ T8485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.154994][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.174645][ T1530] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.198174][ T1530] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.231727][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.241308][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.248189][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.257339][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.265561][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.272452][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.320399][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.341463][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.383686][ T8521] syzkaller0: refused to change device tx_queue_len [ 209.427527][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.449913][ T43] device bridge_slave_1 left promiscuous mode [ 209.455939][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.472463][ T43] device bridge_slave_0 left promiscuous mode [ 209.478779][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.488462][ T43] device veth1_macvtap left promiscuous mode [ 209.715413][ T8485] device veth0_vlan entered promiscuous mode [ 209.733199][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.748486][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.766162][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.781099][ T8485] device veth1_macvtap entered promiscuous mode [ 209.868455][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.876508][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.899320][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.909980][ T8546] syz-executor.2[8546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.910054][ T8546] syz-executor.2[8546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.954593][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.987984][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.020707][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.041691][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.087898][ T8553] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 210.139675][ T8550] device syzkaller0 entered promiscuous mode [ 210.590264][ T8566] syzkaller0: refused to change device tx_queue_len [ 215.557712][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.564730][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.064891][ T8965] device veth0_vlan left promiscuous mode [ 219.084583][ T8965] device veth0_vlan entered promiscuous mode [ 219.118982][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.131621][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.154932][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.261161][ T9005] device veth0_vlan left promiscuous mode [ 220.305989][ T9005] device veth0_vlan entered promiscuous mode [ 220.406693][ T9022] device veth0_vlan left promiscuous mode [ 220.413812][ T9022] device veth0_vlan entered promiscuous mode [ 220.429617][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.466065][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.483994][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.626044][ T28] audit: type=1400 audit(1718948660.451:140): avc: denied { create } for pid=9069 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 225.873109][ T9251] device veth0_vlan left promiscuous mode [ 225.923203][ T9251] device veth0_vlan entered promiscuous mode [ 225.967755][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.976831][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.007723][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.861734][ T9286] device pim6reg1 entered promiscuous mode [ 227.048096][ T9296] device veth0_vlan left promiscuous mode [ 227.058916][ T9296] device veth0_vlan entered promiscuous mode [ 227.086924][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.111150][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.134828][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.201764][ T28] audit: type=1400 audit(1718948666.031:141): avc: denied { create } for pid=9306 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 229.079680][ T9309] device veth0_vlan left promiscuous mode [ 229.104686][ T9309] device veth0_vlan entered promiscuous mode [ 229.113699][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.129089][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.179091][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.519227][ T9336] device pim6reg1 entered promiscuous mode [ 230.072388][ T9360] syz-executor.3[9360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.072461][ T9360] syz-executor.3[9360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.979188][ T9377] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 231.361840][ T9405] device veth0_vlan left promiscuous mode [ 231.375173][ T9405] device veth0_vlan entered promiscuous mode [ 231.387917][ T9410] Â: renamed from pim6reg1 [ 231.489082][ T9416] device sit0 entered promiscuous mode [ 231.652665][ T9433] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 233.728678][ T9526] €Â: renamed from pim6reg1 [ 234.552408][ T9543] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.561607][ T9543] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.600489][ T9543] device bridge_slave_0 entered promiscuous mode [ 234.632738][ T9543] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.639703][ T9543] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.646906][ T9543] device bridge_slave_1 entered promiscuous mode [ 235.002011][ T794] device bridge_slave_1 left promiscuous mode [ 235.008210][ T794] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.015717][ T794] device bridge_slave_0 left promiscuous mode [ 235.047221][ T794] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.076203][ T794] device veth1_macvtap left promiscuous mode [ 235.103017][ T794] device veth0_vlan left promiscuous mode [ 235.640082][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.669399][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.695033][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.713061][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.723166][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.730037][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.775068][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.783355][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.792388][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.799273][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.809535][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.817570][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.836161][ T9543] device veth0_vlan entered promiscuous mode [ 235.849530][ T9585] device veth0_vlan left promiscuous mode [ 235.855588][ T9585] device veth0_vlan entered promiscuous mode [ 235.868428][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.907897][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.947637][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.955076][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.962759][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.970562][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.979081][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.986490][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.002799][ T9543] device veth1_macvtap entered promiscuous mode [ 236.010919][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.019305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.027672][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.096845][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.109356][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.167855][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.203952][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.719256][ T9621] device veth0_vlan left promiscuous mode [ 236.734140][ T9621] device veth0_vlan entered promiscuous mode [ 237.143840][ T9659] device veth0_vlan left promiscuous mode [ 237.162158][ T9659] device veth0_vlan entered promiscuous mode [ 237.294633][ T9674] device syzkaller0 entered promiscuous mode [ 238.160940][ T9709] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 238.221816][ T9708] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 238.473382][ T9735] syz-executor.3[9735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.473467][ T9735] syz-executor.3[9735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.859657][ T9774] syz-executor.1[9774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.893654][ T9774] syz-executor.1[9774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.653336][ T9785] syz-executor.1[9785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.683338][ T9785] syz-executor.1[9785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.194131][ T9861] device veth0_vlan left promiscuous mode [ 242.251956][ T9861] device veth0_vlan entered promiscuous mode [ 242.325414][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.338230][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.381681][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.411728][ T9865] device veth0_vlan left promiscuous mode [ 242.439494][ T9865] device veth0_vlan entered promiscuous mode [ 242.473956][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.490574][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.529978][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.135971][ T9901] device veth0_vlan left promiscuous mode [ 243.168286][ T9901] device veth0_vlan entered promiscuous mode [ 243.271508][ T9908] device veth0_vlan left promiscuous mode [ 243.290835][ T9908] device veth0_vlan entered promiscuous mode [ 243.344370][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.362710][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.393894][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.749396][ T9949] device veth0_vlan left promiscuous mode [ 244.759272][ T9949] device veth0_vlan entered promiscuous mode [ 245.822661][ T9983] device veth0_vlan left promiscuous mode [ 245.871277][ T9983] device veth0_vlan entered promiscuous mode [ 245.942943][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.965006][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.029902][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.695578][T10023] device veth0_vlan left promiscuous mode [ 246.772399][T10023] device veth0_vlan entered promiscuous mode [ 246.891263][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.917744][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.940296][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.935063][T10060] device veth0_vlan left promiscuous mode [ 247.940993][T10060] device veth0_vlan entered promiscuous mode [ 247.951159][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.959540][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.989543][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.791653][T10101] device syzkaller0 entered promiscuous mode [ 249.350237][T10134] device syzkaller0 entered promiscuous mode [ 249.375295][T10139] device sit0 left promiscuous mode [ 249.505430][T10134] device sit0 entered promiscuous mode [ 250.029361][T10170] syz-executor.0[10170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.029434][T10170] syz-executor.0[10170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.727456][T10215] device pim6reg1 entered promiscuous mode [ 252.180583][T10270] device syzkaller0 entered promiscuous mode [ 252.274941][T10273] device veth0_vlan left promiscuous mode [ 252.299221][T10273] device veth0_vlan entered promiscuous mode [ 252.401230][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.414681][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.442067][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.473676][T10270] device sit0 entered promiscuous mode [ 252.516569][T10276] device pim6reg1 entered promiscuous mode [ 252.937000][T10307] device veth0_vlan left promiscuous mode [ 252.959421][T10307] device veth0_vlan entered promiscuous mode [ 253.061502][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.076531][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.093419][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.601114][T10343] syz-executor.4[10343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.601194][T10343] syz-executor.4[10343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.782510][T10347] device veth0_vlan left promiscuous mode [ 253.859213][T10347] device veth0_vlan entered promiscuous mode [ 254.467017][T10372] syz-executor.3[10372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.467171][T10372] syz-executor.3[10372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.772019][T10379] device veth0_vlan left promiscuous mode [ 254.846853][T10379] device veth0_vlan entered promiscuous mode [ 255.133405][T10411] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 255.168729][T10411] pim6reg0: linktype set to 0 [ 255.893975][T10436] device veth0_vlan left promiscuous mode [ 255.964810][T10436] device veth0_vlan entered promiscuous mode [ 256.008485][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.024644][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.071108][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.371011][T10446] device veth0_vlan left promiscuous mode [ 256.407611][T10446] device veth0_vlan entered promiscuous mode [ 256.468512][T10458] device pim6reg1 entered promiscuous mode [ 257.873368][T10516] device veth0_vlan left promiscuous mode [ 257.898702][T10516] device veth0_vlan entered promiscuous mode [ 257.958761][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.967033][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.980020][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.252265][T10541] syz-executor.3[10541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.252687][T10541] syz-executor.3[10541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.865737][T10556] device syzkaller0 entered promiscuous mode [ 259.344538][T10586] device macsec0 entered promiscuous mode [ 259.644887][T10612] syz-executor.4[10612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.644960][T10612] syz-executor.4[10612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.179179][T10646] device syzkaller0 entered promiscuous mode [ 260.845115][T10681] device veth1_macvtap left promiscuous mode [ 260.920155][T10687] device veth1_macvtap entered promiscuous mode [ 260.938810][T10687] device macsec0 entered promiscuous mode [ 261.203129][T10695] device veth0_vlan left promiscuous mode [ 261.212296][T10695] device veth0_vlan entered promiscuous mode [ 261.258342][T10696] device syzkaller0 entered promiscuous mode [ 261.388634][T10707] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.395678][T10707] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.513263][T10716] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.520171][T10716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.527286][T10716] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.534139][T10716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.616987][T10716] device bridge0 entered promiscuous mode [ 261.984989][ T28] audit: type=1400 audit(1718948700.811:142): avc: denied { create } for pid=10742 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 262.822764][T10769] device veth0_vlan left promiscuous mode [ 262.831085][T10769] device veth0_vlan entered promiscuous mode [ 262.848327][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.859363][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.879019][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.030785][T10786] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.037820][T10786] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.111799][T10786] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.118719][T10786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.125829][T10786] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.132707][T10786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.385172][T10786] device bridge0 entered promiscuous mode [ 263.682115][T10805] device syzkaller0 entered promiscuous mode [ 263.803355][T10809] device veth0_vlan left promiscuous mode [ 263.815040][T10809] device veth0_vlan entered promiscuous mode [ 263.882963][T10791] syz-executor.4 (10791) used greatest stack depth: 19736 bytes left [ 264.708957][T10836] device syzkaller0 entered promiscuous mode [ 264.878764][T10844] device syzkaller0 entered promiscuous mode [ 264.893039][T10847] device veth0_vlan left promiscuous mode [ 264.900642][T10847] device veth0_vlan entered promiscuous mode [ 264.974041][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.997931][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.030402][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.078493][T10921] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.085388][T10921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.092526][T10921] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.099398][T10921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.111920][T10921] device bridge0 entered promiscuous mode [ 266.318405][T10935] syz-executor.3[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.318485][T10935] syz-executor.3[10935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.947176][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.015047][T10928] syz-executor.0 (10928) used greatest stack depth: 19544 bytes left [ 267.515715][T10996] device veth0_vlan left promiscuous mode [ 267.552449][T10996] device veth0_vlan entered promiscuous mode [ 267.588918][T10999] device veth0_vlan left promiscuous mode [ 267.617839][T10999] device veth0_vlan entered promiscuous mode [ 268.214115][T11021] device syzkaller0 entered promiscuous mode [ 268.537567][T11038] device syzkaller0 entered promiscuous mode [ 268.832639][ T10] device bridge_slave_1 left promiscuous mode [ 268.847334][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.883509][ T10] device bridge_slave_0 left promiscuous mode [ 268.902579][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.923450][ T10] device veth1_macvtap left promiscuous mode [ 268.932361][ T10] device veth0_vlan left promiscuous mode [ 269.213566][T11041] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.266064][T11041] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.302341][T11041] device bridge_slave_0 entered promiscuous mode [ 269.350896][T11041] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.394104][T11041] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.425116][T11041] device bridge_slave_1 entered promiscuous mode [ 269.471860][T11070] device syzkaller0 entered promiscuous mode [ 269.541090][T11074] device syzkaller0 entered promiscuous mode [ 269.891814][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.904872][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.956354][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.980975][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.999990][ T339] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.006869][ T339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.029468][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.079759][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.133527][ T339] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.140437][ T339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.197425][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.244809][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.278432][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.355075][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.380317][T11041] device veth0_vlan entered promiscuous mode [ 270.387350][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.395175][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.441944][T11041] device veth1_macvtap entered promiscuous mode [ 270.464406][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.472009][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.501767][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.527491][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.535595][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.551323][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.559505][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.572605][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.580788][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.923976][T11121] device veth0_vlan left promiscuous mode [ 270.946454][T11121] device veth0_vlan entered promiscuous mode [ 273.409785][T11243] device syzkaller0 entered promiscuous mode [ 273.750981][T11258] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 274.094125][T11276] device syzkaller0 entered promiscuous mode [ 274.487552][T11294] device veth0_vlan left promiscuous mode [ 274.547571][T11294] device veth0_vlan entered promiscuous mode [ 274.568659][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.586975][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.624863][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.983502][T11319] device syzkaller0 entered promiscuous mode [ 275.287185][T11325] device veth0_vlan left promiscuous mode [ 275.297864][T11325] device veth0_vlan entered promiscuous mode [ 275.853937][T11358] device veth0_vlan left promiscuous mode [ 275.897819][T11358] device veth0_vlan entered promiscuous mode [ 276.775834][T11401] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 276.851279][T11402] device syzkaller0 entered promiscuous mode [ 277.174421][T11431] syz-executor.1[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.174502][T11431] syz-executor.1[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.221342][T11431] syz-executor.1[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.233422][T11431] syz-executor.1[11431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.547834][T11458] device syzkaller0 entered promiscuous mode [ 279.461803][T11513] device syzkaller0 entered promiscuous mode [ 279.774560][T11531] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.401987][T11540] device syzkaller0 entered promiscuous mode [ 280.867993][T11564] syz-executor.0[11564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.868076][T11564] syz-executor.0[11564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.882617][T11565] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.253613][T11575] device veth0_vlan left promiscuous mode [ 281.267501][T11575] device veth0_vlan entered promiscuous mode [ 281.281629][T11577] bond_slave_1: mtu less than device minimum [ 281.322185][T11583] device syzkaller0 entered promiscuous mode [ 281.658789][T11598] syz-executor.1[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.658874][T11598] syz-executor.1[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.711362][T11598] syz-executor.1[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.741649][T11598] syz-executor.1[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.994025][T11623] device veth0_vlan left promiscuous mode [ 282.058349][T11623] device veth0_vlan entered promiscuous mode [ 282.143744][T11624] device syzkaller0 entered promiscuous mode [ 283.119257][T11669] device syzkaller0 entered promiscuous mode [ 283.328359][T11680] device pim6reg1 entered promiscuous mode [ 286.038814][T11802] bpf_get_probe_write_proto: 2 callbacks suppressed [ 286.038836][T11802] syz-executor.0[11802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.077220][T11802] syz-executor.0[11802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.802895][T11846] device veth0_vlan left promiscuous mode [ 286.838600][T11846] device veth0_vlan entered promiscuous mode [ 287.375943][T11873] device syzkaller0 entered promiscuous mode [ 287.750068][T11890] device veth0_vlan left promiscuous mode [ 287.772296][T11890] device veth0_vlan entered promiscuous mode [ 288.644770][T11933] device veth0_vlan left promiscuous mode [ 288.659003][T11933] device veth0_vlan entered promiscuous mode [ 289.168771][T11966] device veth0_vlan left promiscuous mode [ 289.176949][T11966] device veth0_vlan entered promiscuous mode [ 289.186073][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.196138][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.206973][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.660146][T12002] device veth0_vlan left promiscuous mode [ 289.675246][T12002] device veth0_vlan entered promiscuous mode [ 290.667201][T12061] device syzkaller0 entered promiscuous mode [ 293.335837][T12195] device veth0_vlan left promiscuous mode [ 293.353290][T12195] device veth0_vlan entered promiscuous mode [ 293.440323][T12203] device syzkaller0 entered promiscuous mode [ 294.031487][T12237] device veth0_vlan left promiscuous mode [ 294.058751][T12237] device veth0_vlan entered promiscuous mode [ 294.090119][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.124264][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.167377][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.308798][T12265] device syzkaller0 entered promiscuous mode [ 294.851292][T12297] device syzkaller0 entered promiscuous mode [ 295.213377][T12313] device veth0_vlan left promiscuous mode [ 295.238836][T12313] device veth0_vlan entered promiscuous mode [ 295.260813][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.273574][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.295490][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.647382][T12335] device syzkaller0 entered promiscuous mode [ 296.148549][T12366] device syzkaller0 entered promiscuous mode [ 296.318138][T12377] device veth0_vlan left promiscuous mode [ 296.323994][T12377] device veth0_vlan entered promiscuous mode [ 296.330818][T12378] device veth0_vlan left promiscuous mode [ 296.338199][T12378] device veth0_vlan entered promiscuous mode [ 296.351178][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.375624][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.391718][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.415490][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.436458][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.449258][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 296.652952][T12414] device veth0_vlan left promiscuous mode [ 296.663992][T12414] device veth0_vlan entered promiscuous mode [ 296.755057][T12419] device syzkaller0 entered promiscuous mode [ 296.762216][T12376] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.769160][T12376] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.776755][T12376] device bridge_slave_0 entered promiscuous mode [ 296.832699][T12376] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.842146][T12376] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.875304][T12376] device bridge_slave_1 entered promiscuous mode [ 297.165914][T12442] device pim6reg1 entered promiscuous mode [ 297.200910][T12442] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 297.229758][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.238184][ T10] device bridge_slave_0 left promiscuous mode [ 297.244233][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.254334][ T10] device veth1_macvtap left promiscuous mode [ 297.272371][ T10] device veth0_vlan left promiscuous mode [ 297.541352][T12452] device veth0_vlan left promiscuous mode [ 297.547933][T12452] device veth0_vlan entered promiscuous mode [ 297.602474][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.611520][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.626079][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.636988][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.648597][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.655444][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.662774][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.670956][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.679125][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.685963][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.729479][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.758777][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.787431][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.813834][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.853514][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.890926][T12376] device veth0_vlan entered promiscuous mode [ 297.912944][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.927391][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.947749][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.985236][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.009761][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.051161][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.076829][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.109291][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.162538][T12376] device veth1_macvtap entered promiscuous mode [ 298.406248][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.435849][T12487] device veth0_vlan left promiscuous mode [ 298.443945][T12487] device veth0_vlan entered promiscuous mode [ 298.455667][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.464488][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.501874][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.510644][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.210282][T12529] device veth0_vlan left promiscuous mode [ 299.216410][T12529] device veth0_vlan entered promiscuous mode [ 300.016521][T12569] device veth0_vlan left promiscuous mode [ 300.036548][T12569] device veth0_vlan entered promiscuous mode [ 301.082715][T12621] device veth0_vlan left promiscuous mode [ 301.101349][T12621] device veth0_vlan entered promiscuous mode [ 302.732410][T12705] device syzkaller0 entered promiscuous mode [ 303.158761][T12715] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 303.404352][T12734] device veth0_vlan left promiscuous mode [ 303.428340][T12734] device veth0_vlan entered promiscuous mode [ 303.472666][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.487964][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 303.509708][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.138379][ T43] device bridge_slave_1 left promiscuous mode [ 304.144428][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.152404][ T43] device bridge_slave_0 left promiscuous mode [ 304.158728][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.166812][ T43] device veth1_macvtap left promiscuous mode [ 304.172812][ T43] device veth0_vlan left promiscuous mode [ 304.618215][T12774] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.626185][T12774] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.635954][T12774] device bridge_slave_0 entered promiscuous mode [ 304.646232][T12774] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.678559][T12774] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.702742][T12774] device bridge_slave_1 entered promiscuous mode [ 304.767691][T12787] device syzkaller0 entered promiscuous mode [ 305.089349][T12774] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.096240][T12774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.103346][T12774] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.110117][T12774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.167600][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.175490][ T1530] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.183081][ T1530] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.200099][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.234762][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.241707][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.305652][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.349542][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.356447][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.401305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.409441][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.429769][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.438405][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.446344][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.454040][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.483718][T12774] device veth0_vlan entered promiscuous mode [ 305.513878][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.535773][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.575187][T12774] device veth1_macvtap entered promiscuous mode [ 305.592145][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.600004][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.608392][ T1530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.650331][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.663080][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.749923][T12946] device veth0_vlan left promiscuous mode [ 308.798192][T12946] device veth0_vlan entered promiscuous mode [ 309.478227][T12987] device veth0_vlan left promiscuous mode [ 309.505979][T12987] device veth0_vlan entered promiscuous mode [ 309.811374][T13009] device syzkaller0 entered promiscuous mode [ 309.997491][T13019] device veth0_vlan left promiscuous mode [ 310.027827][T13019] device veth0_vlan entered promiscuous mode [ 310.100322][T13024] device syzkaller0 entered promiscuous mode [ 310.741482][T13054] device veth1_macvtap left promiscuous mode [ 313.674140][T13077] device veth0_vlan left promiscuous mode [ 313.686154][T13077] device veth0_vlan entered promiscuous mode [ 313.797185][T13100] device veth1_macvtap left promiscuous mode [ 314.748647][T13126] device veth0_vlan left promiscuous mode [ 314.778652][T13126] device veth0_vlan entered promiscuous mode [ 314.868190][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.885271][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.918460][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.399196][T13169] device veth0_vlan left promiscuous mode [ 315.436121][T13169] device veth0_vlan entered promiscuous mode [ 316.249515][T13207] device veth0_vlan left promiscuous mode [ 316.282026][T13207] device veth0_vlan entered promiscuous mode [ 317.351776][T13248] device veth0_vlan left promiscuous mode [ 317.364518][T13248] device veth0_vlan entered promiscuous mode [ 317.377211][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.385699][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.402235][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.519009][T13255] device veth0_vlan left promiscuous mode [ 317.533865][T13255] device veth0_vlan entered promiscuous mode [ 317.919170][T13283] device syzkaller0 entered promiscuous mode [ 319.122742][T13322] device veth0_vlan left promiscuous mode [ 319.136366][T13322] device veth0_vlan entered promiscuous mode [ 319.186447][T13328] device syzkaller0 entered promiscuous mode [ 319.836447][T13362] device veth0_vlan left promiscuous mode [ 319.891269][T13362] device veth0_vlan entered promiscuous mode [ 321.717183][T13432] device veth0_vlan left promiscuous mode [ 321.727024][T13432] device veth0_vlan entered promiscuous mode [ 321.779105][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.797972][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.827583][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.221591][ T28] audit: type=1400 audit(1718948761.051:143): avc: denied { create } for pid=13460 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 322.641989][T13473] device veth0_vlan left promiscuous mode [ 322.713860][T13473] device veth0_vlan entered promiscuous mode [ 323.827571][T13511] syz-executor.4[13511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.827647][T13511] syz-executor.4[13511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.827926][T13513] syz-executor.4[13513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.922519][T13509] device veth0_vlan left promiscuous mode [ 323.988262][T13509] device veth0_vlan entered promiscuous mode [ 323.995588][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 324.017922][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 324.025283][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.857283][ T28] audit: type=1400 audit(1718948764.691:144): avc: denied { write } for pid=13577 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 325.964181][T13580] device veth0_vlan left promiscuous mode [ 326.013934][T13580] device veth0_vlan entered promiscuous mode [ 326.048831][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.074263][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.107706][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.615573][T13620] syz-executor.0[13620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.615649][T13620] syz-executor.0[13620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.645308][T13618] device veth0_vlan left promiscuous mode [ 326.713266][T13618] device veth0_vlan entered promiscuous mode [ 326.892657][T13636] device veth0_vlan left promiscuous mode [ 326.916453][T13636] device veth0_vlan entered promiscuous mode [ 327.269887][T13674] syz-executor.4[13674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.269954][T13674] syz-executor.4[13674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.644635][T13705] syz-executor.4[13705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.657171][T13705] syz-executor.4[13705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.679180][T13707] device syzkaller0 entered promiscuous mode [ 329.838660][T13811] device veth0_vlan left promiscuous mode [ 329.845013][T13811] device veth0_vlan entered promiscuous mode [ 329.968391][T13814] device veth0_vlan left promiscuous mode [ 329.977564][T13814] device veth0_vlan entered promiscuous mode [ 330.423191][T13852] device veth0_vlan left promiscuous mode [ 330.447750][T13852] device veth0_vlan entered promiscuous mode [ 330.617036][T13872] device syzkaller0 entered promiscuous mode [ 331.139244][T13905] syz-executor.1[13905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.139355][T13905] syz-executor.1[13905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.173703][T13905] syz-executor.1[13905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.203225][T13905] syz-executor.1[13905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.237637][T13896] device veth0_vlan left promiscuous mode [ 331.256992][T13896] device veth0_vlan entered promiscuous mode [ 331.347030][T13909] device veth0_vlan left promiscuous mode [ 331.356859][T13909] device veth0_vlan entered promiscuous mode [ 331.424084][T13918] device syzkaller0 entered promiscuous mode [ 335.903842][T14160] device syzkaller0 entered promiscuous mode [ 337.689170][T14252] device veth0_vlan left promiscuous mode [ 337.696574][T14252] device veth0_vlan entered promiscuous mode [ 337.944488][T14275] device veth0_vlan left promiscuous mode [ 337.954457][T14275] device veth0_vlan entered promiscuous mode [ 339.072023][T14311] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 342.139926][T14436] device veth0_vlan left promiscuous mode [ 342.170958][T14436] device veth0_vlan entered promiscuous mode [ 342.321136][ T28] audit: type=1400 audit(1718948781.151:145): avc: denied { ioctl } for pid=14443 comm="syz-executor.3" path="uts:[4026532380]" dev="nsfs" ino=4026532380 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 343.762019][T14498] device veth0_vlan left promiscuous mode [ 343.785846][T14498] device veth0_vlan entered promiscuous mode [ 343.888638][T14502] device syzkaller0 entered promiscuous mode [ 343.911554][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.921535][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.967719][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.841246][T14536] device syzkaller0 entered promiscuous mode [ 345.012390][T14542] device veth0_vlan left promiscuous mode [ 345.027924][T14542] device veth0_vlan entered promiscuous mode [ 345.977213][T14574] device veth0_vlan left promiscuous mode [ 345.993367][T14574] device veth0_vlan entered promiscuous mode [ 346.005824][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.016945][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.040478][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.097228][T14580] device syzkaller0 entered promiscuous mode [ 346.367221][T14594] device pim6reg1 entered promiscuous mode [ 347.175451][T14617] device veth0_vlan left promiscuous mode [ 347.185923][T14617] device veth0_vlan entered promiscuous mode [ 347.234178][T14619] device syzkaller0 entered promiscuous mode [ 348.467661][T14666] device syzkaller0 entered promiscuous mode [ 349.132545][T14700] device veth0_vlan left promiscuous mode [ 349.138557][T14700] device veth0_vlan entered promiscuous mode [ 349.154230][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.162553][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 349.174793][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.646438][T14726] device sit0 entered promiscuous mode [ 350.491599][T14767] device veth0_vlan left promiscuous mode [ 350.513654][T14767] device veth0_vlan entered promiscuous mode [ 351.162205][T14808] device veth0_vlan left promiscuous mode [ 351.183559][T14808] device veth0_vlan entered promiscuous mode [ 351.229806][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.242478][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.271424][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.571488][T14824] device syzkaller0 entered promiscuous mode [ 351.604554][T14835] device pim6reg1 entered promiscuous mode [ 351.668416][T14839] syz-executor.0[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.668490][T14839] syz-executor.0[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.235858][T14877] device pim6reg1 entered promiscuous mode [ 352.342379][T14877] syz-executor.4[14877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.342455][T14877] syz-executor.4[14877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.870611][T14903] device veth0_vlan left promiscuous mode [ 352.937836][T14903] device veth0_vlan entered promiscuous mode [ 353.701273][T14935] device veth0_vlan left promiscuous mode [ 353.707560][T14935] device veth0_vlan entered promiscuous mode [ 353.716038][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.737622][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.747334][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.938747][T15073] device syzkaller0 entered promiscuous mode [ 358.325015][T15093] device veth0_vlan left promiscuous mode [ 358.353131][T15093] device veth0_vlan entered promiscuous mode [ 358.572005][T15112] device syzkaller0 entered promiscuous mode [ 359.332767][T15151] device syzkaller0 entered promiscuous mode [ 359.645207][T15161] device syzkaller0 entered promiscuous mode [ 360.090990][T15192] bond_slave_1: mtu less than device minimum [ 360.313893][T15208] device syzkaller0 entered promiscuous mode [ 361.657644][T15278] device syzkaller0 entered promiscuous mode [ 363.184525][T15327] device syzkaller0 entered promiscuous mode [ 367.805252][T15475] device syzkaller0 entered promiscuous mode [ 370.879793][T15547] device syzkaller0 entered promiscuous mode [ 371.726193][T15602] device syzkaller0 entered promiscuous mode [ 373.507694][T15715] device syzkaller0 entered promiscuous mode [ 374.133759][T15754] device syzkaller0 entered promiscuous mode [ 374.630523][T15796] device syzkaller0 entered promiscuous mode [ 375.419390][T15836] device syzkaller0 entered promiscuous mode [ 376.326539][T15862] device syzkaller0 entered promiscuous mode [ 377.164132][T15897] device syzkaller0 entered promiscuous mode [ 382.431252][T16088] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 382.448175][T16088] device syzkaller0 entered promiscuous mode [ 384.355000][T16154] device syzkaller0 entered promiscuous mode [ 386.208949][T16224] device syzkaller0 entered promiscuous mode [ 387.531227][T16259] device syzkaller0 entered promiscuous mode [ 387.879212][T16283] device syzkaller0 entered promiscuous mode [ 388.669510][T16305] device syzkaller0 entered promiscuous mode [ 389.687389][T16353] device syzkaller0 entered promiscuous mode [ 393.074639][T16473] device syzkaller0 entered promiscuous mode [ 393.136329][T16477] device syzkaller0 entered promiscuous mode [ 394.219565][T16520] device syzkaller0 entered promiscuous mode [ 396.834482][T16612] device syzkaller0 entered promiscuous mode [ 396.948376][T16617] device syzkaller0 entered promiscuous mode [ 397.010460][T16621] device syzkaller0 entered promiscuous mode [ 397.274709][T16644] device syzkaller0 entered promiscuous mode [ 397.627137][ T28] audit: type=1400 audit(1718948836.451:146): avc: denied { attach_queue } for pid=16665 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 399.368255][T16727] device syzkaller0 entered promiscuous mode [ 399.488847][T16742] device syzkaller0 entered promiscuous mode [ 401.665272][T16800] device syzkaller0 entered promiscuous mode [ 401.895091][T16828] device veth1_macvtap left promiscuous mode [ 401.918516][T16828] device veth1_macvtap entered promiscuous mode [ 403.010138][T16865] device syzkaller0 entered promiscuous mode [ 403.184673][T16875] device syzkaller0 entered promiscuous mode [ 404.955440][T16973] device syzkaller0 entered promiscuous mode [ 405.550975][T17010] device sit0 left promiscuous mode [ 406.913635][T17055] device syzkaller0 entered promiscuous mode [ 406.996572][T17056] device syzkaller0 entered promiscuous mode [ 408.135641][T17102] device syzkaller0 entered promiscuous mode [ 408.160737][T17104] device pim6reg1 entered promiscuous mode [ 408.216242][T17118] device syzkaller0 entered promiscuous mode [ 409.529055][T17158] device syzkaller0 entered promiscuous mode [ 413.798309][T17279] device syzkaller0 entered promiscuous mode [ 413.860721][T17286] device syzkaller0 entered promiscuous mode [ 414.034334][T17298] device syzkaller0 entered promiscuous mode [ 414.495689][T17322] device syzkaller0 entered promiscuous mode [ 414.568324][T17327] device syzkaller0 entered promiscuous mode [ 416.427938][T17423] device syzkaller0 entered promiscuous mode [ 421.140498][T17599] device pim6reg1 entered promiscuous mode [ 425.676336][T17809] device syzkaller0 entered promiscuous mode [ 426.130813][T17868] device syzkaller0 entered promiscuous mode [ 428.511617][T17946] device syzkaller0 entered promiscuous mode [ 429.663956][T17993] device syzkaller0 entered promiscuous mode [ 431.418561][T18044] device pim6reg1 entered promiscuous mode [ 432.866291][T18072] device syzkaller0 entered promiscuous mode [ 433.942141][T18101] device pim6reg1 entered promiscuous mode [ 442.621212][T18286] device syzkaller0 entered promiscuous mode [ 443.219062][T18329] device syzkaller0 entered promiscuous mode [ 444.166637][T18360] device syzkaller0 entered promiscuous mode [ 444.716296][T18403] device syzkaller0 entered promiscuous mode [ 446.530823][T18523] device veth1_macvtap entered promiscuous mode [ 446.541318][T18523] device macsec0 entered promiscuous mode [ 446.566099][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 448.301108][T18606] device pim6reg1 entered promiscuous mode [ 449.395723][T18640] device veth1_macvtap left promiscuous mode [ 449.424830][T18640] device macsec0 left promiscuous mode [ 449.478990][T18640] device veth1_macvtap entered promiscuous mode [ 449.513466][T18640] device macsec0 entered promiscuous mode [ 450.812822][T18674] device syzkaller0 entered promiscuous mode [ 450.947353][T18694] device pim6reg1 entered promiscuous mode [ 451.968133][T18729] device pim6reg1 entered promiscuous mode [ 452.406513][T18758] device syzkaller0 entered promiscuous mode [ 452.885362][T18760] device syzkaller0 entered promiscuous mode [ 454.183113][T18815] device syzkaller0 entered promiscuous mode [ 455.549371][T18855] device syzkaller0 entered promiscuous mode [ 456.406328][T18883] device syzkaller0 entered promiscuous mode [ 457.149395][T18902] device syzkaller0 entered promiscuous mode [ 457.435022][T18917] device syzkaller0 entered promiscuous mode [ 457.463197][ T28] audit: type=1400 audit(1718948896.291:147): avc: denied { create } for pid=18916 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 458.523239][T18938] device syzkaller0 entered promiscuous mode [ 458.688921][T18947] device syzkaller0 entered promiscuous mode [ 459.308819][T18966] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 460.482228][T18989] device syzkaller0 entered promiscuous mode [ 462.437418][T19047] bridge0: port 1(bridge_slave_0) entered blocking state [ 462.513899][T19047] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.563759][T19047] device bridge_slave_0 entered promiscuous mode [ 462.615139][T19059] syz-executor.2[19059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.615217][T19059] syz-executor.2[19059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.658419][T19047] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.717102][T19047] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.757841][T19047] device bridge_slave_1 entered promiscuous mode [ 462.777611][T19059] syz-executor.2[19059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.777685][T19059] syz-executor.2[19059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.976236][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 462.999272][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 463.011478][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 463.019728][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 463.027789][ T319] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.034622][ T319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.042002][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 463.057768][ T28] audit: type=1400 audit(1718948901.891:148): avc: denied { create } for pid=19075 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 463.088830][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 463.097572][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.105599][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.112566][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.152148][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 463.183583][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 463.218658][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 463.268552][ T8] device bridge_slave_1 left promiscuous mode [ 463.274708][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.307948][ T8] device bridge_slave_0 left promiscuous mode [ 463.377148][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.404940][ T8] device veth1_macvtap left promiscuous mode [ 463.424624][ T8] device veth0_vlan left promiscuous mode [ 463.932707][T19047] device veth0_vlan entered promiscuous mode [ 463.950532][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 464.001884][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 464.047461][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 464.073560][T19047] device veth1_macvtap entered promiscuous mode [ 464.128422][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 464.143269][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 464.172310][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 464.224716][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 464.243580][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 464.347130][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 464.372175][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 468.511602][T19172] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.533092][T19172] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.542630][T19172] device bridge_slave_0 entered promiscuous mode [ 468.552027][T19172] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.560164][T19172] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.567504][T19172] device bridge_slave_1 entered promiscuous mode [ 468.818824][T19172] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.825715][T19172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.832826][T19172] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.839597][T19172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.987317][ T794] device bridge_slave_1 left promiscuous mode [ 468.993378][ T794] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.020077][ T794] device bridge_slave_0 left promiscuous mode [ 469.062709][ T794] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.111949][ T794] device veth1_macvtap left promiscuous mode [ 469.147712][ T794] device veth0_vlan left promiscuous mode [ 469.498508][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.506333][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.546454][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 469.587465][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 469.608551][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 469.618858][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 469.626969][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 469.633862][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 469.641181][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 469.650025][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 469.658272][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.665135][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 469.692685][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 469.701005][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.734157][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 470.742076][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 470.762700][T19172] device veth0_vlan entered promiscuous mode [ 470.775462][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 470.784008][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 470.797409][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 470.805316][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.818891][T19172] device veth1_macvtap entered promiscuous mode [ 470.834579][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 470.842712][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.862605][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 470.871641][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 470.879879][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 470.911946][T19203] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 470.920310][T19203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 470.928723][T19203] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 470.939066][T19203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.887697][T19262] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.894558][T19262] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.981828][T19262] device bridge_slave_0 entered promiscuous mode [ 472.007274][T19262] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.014143][T19262] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.046888][T19262] device bridge_slave_1 entered promiscuous mode [ 472.385904][T19262] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.392888][T19262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.399982][T19262] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.406751][T19262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.638873][ T43] device bridge_slave_1 left promiscuous mode [ 472.649179][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.702436][ T43] device bridge_slave_0 left promiscuous mode [ 472.747046][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.804801][ T43] device veth1_macvtap left promiscuous mode [ 472.847868][ T43] device veth0_vlan left promiscuous mode [ 473.227322][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.237784][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.311925][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.319911][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.341675][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 473.379082][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.417901][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.424763][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.507558][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.525252][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.533896][ T319] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.540774][ T319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.586665][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 473.665935][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.688555][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 473.719725][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 473.766842][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 473.787251][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 473.836052][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 473.887230][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.925161][T19262] device veth0_vlan entered promiscuous mode [ 473.936860][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.946525][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.970281][T19262] device veth1_macvtap entered promiscuous mode [ 474.013909][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 474.023884][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 474.054251][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 474.084913][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 474.093245][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 474.115178][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 474.133448][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 474.679665][T19355] syz-executor.1[19355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.679737][T19355] syz-executor.1[19355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.907238][T19364] device pim6reg1 entered promiscuous mode [ 476.392783][T19404] device syzkaller0 entered promiscuous mode [ 476.465826][T19418] syz-executor.2[19418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.465904][T19418] syz-executor.2[19418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.431499][T19559] device syzkaller0 entered promiscuous mode [ 486.289389][T19602] device syzkaller0 entered promiscuous mode [ 487.338039][T19629] device syzkaller0 entered promiscuous mode [ 492.947995][T19716] device veth0_vlan left promiscuous mode [ 492.957684][T19716] device veth0_vlan entered promiscuous mode [ 493.428324][T19739] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.441720][T19739] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.449176][T19739] device bridge_slave_0 entered promiscuous mode [ 493.456353][T19739] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.463347][T19739] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.470748][T19739] device bridge_slave_1 entered promiscuous mode [ 493.731031][ T342] device bridge_slave_1 left promiscuous mode [ 493.739395][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.790616][ T342] device bridge_slave_0 left promiscuous mode [ 493.833413][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.884165][ T342] device veth1_macvtap left promiscuous mode [ 493.923754][ T342] device veth0_vlan left promiscuous mode [ 494.391934][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 494.423692][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 494.456371][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 494.513972][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 494.542371][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.549271][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 494.587632][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 494.658044][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 494.666066][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.672938][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 494.824010][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 494.836369][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 494.863466][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 494.918293][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 494.953388][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 494.995635][T19739] device veth0_vlan entered promiscuous mode [ 495.033620][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 495.056524][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 495.105277][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 495.155784][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 495.186510][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.216419][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 495.274356][T19739] device veth1_macvtap entered promiscuous mode [ 495.318778][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 495.326839][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 495.371145][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 495.397368][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 495.442604][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 495.481227][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 499.716418][T19935] syz-executor.2[19935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.716492][T19935] syz-executor.2[19935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.805065][T19935] device pim6reg1 entered promiscuous mode [ 499.888776][T19935] syz-executor.2[19935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.888859][T19935] syz-executor.2[19935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.901909][ T28] audit: type=1400 audit(1718948943.731:149): avc: denied { append } for pid=20142 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 504.998211][ T28] audit: type=1400 audit(1718948943.781:150): avc: denied { create } for pid=20142 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 515.070223][T20219] device veth1_macvtap left promiscuous mode [ 558.279116][T20676] device sit0 entered promiscuous mode [ 559.960117][T20736] device syzkaller0 entered promiscuous mode [ 564.536064][T20918] device syzkaller0 entered promiscuous mode [ 567.055604][T20955] device syzkaller0 entered promiscuous mode [ 580.239358][T21185] device syzkaller0 entered promiscuous mode [ 581.950694][T21266] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.958788][T21266] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.966182][T21266] device bridge_slave_0 entered promiscuous mode [ 581.973872][T21266] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.980784][T21266] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.988272][T21266] device bridge_slave_1 entered promiscuous mode [ 582.063546][T21266] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.070422][T21266] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.077530][T21266] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.084287][T21266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.115976][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 582.124365][ T339] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.131642][ T339] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.150236][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 582.159111][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.165958][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.173214][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 582.181759][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.188638][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.207989][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 582.215889][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 582.231999][T21266] device veth0_vlan entered promiscuous mode [ 582.239383][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 582.248658][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 582.256580][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 582.264067][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 582.282694][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 582.291348][T21266] device veth1_macvtap entered promiscuous mode [ 582.302600][ T339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 582.317379][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 582.369140][ T8] device bridge_slave_1 left promiscuous mode [ 582.380357][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.389273][ T8] device bridge_slave_0 left promiscuous mode [ 582.395235][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.422904][ T8] device veth1_macvtap left promiscuous mode [ 582.443028][ T8] device veth0_vlan left promiscuous mode [ 589.676871][T21443] syz-executor.4[21443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.677001][T21443] syz-executor.4[21443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.189770][T21485] tap0: tun_chr_ioctl cmd 1074025675 [ 591.222621][T21485] tap0: persist enabled [ 591.232227][T21485] tap0: tun_chr_ioctl cmd 1074025675 [ 591.244839][T21485] tap0: persist enabled [ 595.290969][T21654] device pim6reg1 entered promiscuous mode [ 602.923431][T21943] device syzkaller0 entered promiscuous mode [ 605.959488][T22080] syz-executor.0[22080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.959565][T22080] syz-executor.0[22080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.031846][T22080] syz-executor.0[22080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.082973][T22080] syz-executor.0[22080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.140457][T22286] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.159223][T22286] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.218378][T22328] syz-executor.0[22328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.218455][T22328] syz-executor.0[22328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.279893][T22328] device wg2 entered promiscuous mode [ 612.336727][T22332] syz-executor.0[22332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.336807][T22332] syz-executor.0[22332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.394802][T22328] syz-executor.0[22328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.490168][T22328] syz-executor.0[22328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.491367][T22332] syz-executor.0[22332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.623913][T22332] syz-executor.0[22332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.269192][ T28] audit: type=1400 audit(1718949053.101:151): avc: denied { create } for pid=22403 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 620.318774][T22576] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 620.326901][T22576] #PF: supervisor instruction fetch in kernel mode [ 620.333187][T22576] #PF: error_code(0x0010) - not-present page [ 620.339053][T22576] PGD 1001f3067 P4D 1001f3067 PUD 13701d067 PMD 0 [ 620.345336][T22576] Oops: 0010 [#1] PREEMPT SMP KASAN [ 620.350369][T22576] CPU: 0 PID: 22576 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00020-gcd89d4fa0722 #0 [ 620.360356][T22576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 620.370251][T22576] RIP: 0010:0x0 [ 620.373546][T22576] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 620.380939][T22576] RSP: 0018:ffffc900087b7908 EFLAGS: 00010246 [ 620.386820][T22576] RAX: 1ffff11023fa4c17 RBX: ffff88811fd260b8 RCX: 0000000000040000 [ 620.394636][T22576] RDX: ffffc90009269000 RSI: 00000000000208f1 RDI: ffff8881142be4c0 [ 620.402454][T22576] RBP: ffffc900087b7930 R08: ffffffff841d8447 R09: ffffed1022857ca5 [ 620.410339][T22576] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000004 [ 620.418156][T22576] R13: dffffc0000000000 R14: ffff8881142be4c0 R15: dffffc0000000000 [ 620.425962][T22576] FS: 00007f59ad5b96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 620.434726][T22576] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 620.441150][T22576] CR2: ffffffffffffffd6 CR3: 000000010d202000 CR4: 00000000003506b0 [ 620.448965][T22576] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 620.456935][T22576] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 620.464673][T22576] Call Trace: [ 620.467793][T22576] [ 620.470573][T22576] ? __die_body+0x62/0xb0 [ 620.474740][T22576] ? __die+0x7e/0x90 [ 620.478472][T22576] ? page_fault_oops+0x7f9/0xa90 [ 620.483245][T22576] ? kernelmode_fixup_or_oops+0x270/0x270 [ 620.488800][T22576] ? sk_psock_skb_ingress_enqueue+0x37a/0x430 [ 620.494702][T22576] ? preempt_schedule_notrace+0x140/0x140 [ 620.500253][T22576] ? is_errata93+0xc7/0x240 [ 620.504595][T22576] ? exc_page_fault+0x537/0x700 [ 620.509284][T22576] ? asm_exc_page_fault+0x27/0x30 [ 620.514145][T22576] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 620.519871][T22576] sk_psock_verdict_data_ready+0x129/0x160 [ 620.525510][T22576] unix_stream_sendmsg+0x8fd/0x1070 [ 620.530645][T22576] ? unix_stream_sendmsg+0x8b1/0x1070 [ 620.535859][T22576] ? unix_show_fdinfo+0x2f0/0x2f0 [ 620.540711][T22576] ? ____sys_sendmsg+0x54c/0x9a0 [ 620.545484][T22576] ? unix_show_fdinfo+0x2f0/0x2f0 [ 620.550343][T22576] ____sys_sendmsg+0x5d3/0x9a0 [ 620.554947][T22576] ? __sys_sendmsg_sock+0x40/0x40 [ 620.559811][T22576] __sys_sendmsg+0x2a9/0x390 [ 620.564233][T22576] ? ____sys_sendmsg+0x9a0/0x9a0 [ 620.569004][T22576] ? __hrtimer_run_queues+0xa72/0xad0 [ 620.574219][T22576] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 620.579946][T22576] ? __kasan_check_write+0x14/0x20 [ 620.584886][T22576] ? fpregs_restore_userregs+0x130/0x290 [ 620.590358][T22576] __x64_sys_sendmsg+0x7f/0x90 [ 620.594957][T22576] do_syscall_64+0x3d/0xb0 [ 620.599207][T22576] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 620.604938][T22576] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 620.610672][T22576] RIP: 0033:0x7f59ac87cf29 [ 620.614920][T22576] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 620.634360][T22576] RSP: 002b:00007f59ad5b90c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 620.642716][T22576] RAX: ffffffffffffffda RBX: 00007f59ac9b3f80 RCX: 00007f59ac87cf29 [ 620.650501][T22576] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000007 [ 620.658314][T22576] RBP: 00007f59ac8ec074 R08: 0000000000000000 R09: 0000000000000000 [ 620.666212][T22576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 620.674022][T22576] R13: 000000000000000b R14: 00007f59ac9b3f80 R15: 00007ffc4e7e2ad8 [ 620.681847][T22576] [ 620.684699][T22576] Modules linked in: [ 620.688447][T22576] CR2: 0000000000000000 [ 620.692426][T22576] ---[ end trace 0000000000000000 ]--- [ 620.697805][T22576] RIP: 0010:0x0 [ 620.701109][T22576] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 620.708358][T22576] RSP: 0018:ffffc900087b7908 EFLAGS: 00010246 [ 620.714301][T22576] RAX: 1ffff11023fa4c17 RBX: ffff88811fd260b8 RCX: 0000000000040000 [ 620.722107][T22576] RDX: ffffc90009269000 RSI: 00000000000208f1 RDI: ffff8881142be4c0 [ 620.729920][T22576] RBP: ffffc900087b7930 R08: ffffffff841d8447 R09: ffffed1022857ca5 [ 620.737727][T22576] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000004 [ 620.745538][T22576] R13: dffffc0000000000 R14: ffff8881142be4c0 R15: dffffc0000000000 [ 620.753350][T22576] FS: 00007f59ad5b96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 620.762115][T22576] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 620.768539][T22576] CR2: ffffffffffffffd6 CR3: 000000010d202000 CR4: 00000000003506b0 [ 620.776971][T22576] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 620.784799][T22576] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 620.792580][T22576] Kernel panic - not syncing: Fatal exception [ 620.798728][T22576] Kernel Offset: disabled [ 620.802854][T22576] Rebooting in 86400 seconds..