last executing test programs: 1.975003656s ago: executing program 2 (id=3539): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@li, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r1}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xb, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.739548213s ago: executing program 0 (id=3542): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x8e, &(0x7f0000000200)=""/142}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x118) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000010000000018110000", @ANYRES32, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x900000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={0x0}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x2, 0x4, 0x2300, 0x20}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000016c0)={0x0, &(0x7f0000000600)=""/41, &(0x7f0000000640), &(0x7f00000006c0), 0x1, r4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) 1.094047772s ago: executing program 2 (id=3547): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000040001100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000200), 0x42400) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x7}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0x0, 0x1008}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x7, 0x21}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00'}, 0x10) 1.031703731s ago: executing program 2 (id=3550): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x0, 0xc}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0xe4c9}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r2) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0xffff, 0xfffffffffffffea9, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(r3, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$LINK_DETACH(0x22, &(0x7f00000000c0), 0x4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000004c0), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair(0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000001540)=ANY=[@ANYBLOB, @ANYRESHEX], 0x0}, 0x90) (async) close(r0) 863.522027ms ago: executing program 0 (id=3553): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f00000002c0)=ANY=[], 0x0, 0x2000, 0x4, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(r3, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = getpid() syz_open_procfs$namespace(r9, &(0x7f0000000180)='ns/time_for_children\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r6, 0x40086607, 0x20001412) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r11, &(0x7f0000000200), 0x43400) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 838.075591ms ago: executing program 3 (id=3554): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYRESDEC=r0, @ANYRESOCT=r2, @ANYRES32=r1], 0x0, 0x0, 0x44, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, &(0x7f0000001f00)=""/4090, 0x4}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r5, 0x34, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x17, 0x17, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@alu={0x4, 0x0, 0x7, 0xb, 0x0, 0xffffffffffffffc0}, @alu={0x7, 0x0, 0x3, 0x5, 0x4, 0x50, 0xfffffffffffffffc}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x6}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='syzkaller\x00', 0xfdb, 0x11, &(0x7f0000000500)=""/17, 0x61980, 0x2, '\x00', r6, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0xa, 0x6, 0x4e6}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f0000000c00)=[0xffffffffffffffff, r2, 0xffffffffffffffff, r7], &(0x7f0000000c40)=[{0xffffffff, 0x5, 0xb, 0xc}, {0x1, 0x1, 0x10, 0x3}, {0x2, 0x2, 0xc, 0xa}, {0x2, 0x4, 0xb, 0x1}, {0x4, 0x5, 0x0, 0x7}, {0x0, 0x2, 0x6, 0x8}], 0x10, 0xfffffffa}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) 801.581177ms ago: executing program 3 (id=3555): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x0, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) syz_clone(0xc000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc020660b, &(0x7f0000000040)=0x10f) 738.022006ms ago: executing program 2 (id=3557): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000047000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) 691.844954ms ago: executing program 0 (id=3560): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r2, 0x40305828, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 689.521634ms ago: executing program 2 (id=3561): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001419) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='cachefiles_write\x00'}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=0x0, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 632.372823ms ago: executing program 0 (id=3563): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001419) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='cachefiles_write\x00'}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=0x0, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 570.946282ms ago: executing program 3 (id=3565): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000580)=""/160}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r6}, 0x10) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x7) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) 531.680538ms ago: executing program 1 (id=3566): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff21, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='skb_copy_datagram_iovec\x00', r0}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x220002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r5, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r6}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r9, 0x0, 0x13, 0x0, &(0x7f0000000740)="63eced8e46dc3f0adf33c9f7b9865d70de2e27", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x2000000000000060, 0x0, 0x0, 0x80000001, 0x5e, 0x0, 0x0, 0x8, '\x00', r7, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0xfffffffffffffc66, 0x0, 0x0, 0x0, 0x3}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x5, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r11}, &(0x7f0000000200), &(0x7f0000000280)='%pB \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00'}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r12, &(0x7f0000000980), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 500.414133ms ago: executing program 3 (id=3567): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8924, &(0x7f0000000080)) 381.467741ms ago: executing program 1 (id=3569): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000fffffffb000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000d000000b7020000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8ff1cb79070098750010000086dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x20, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r8) 378.720022ms ago: executing program 2 (id=3570): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0xfffffff7, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r2, &(0x7f0000000400)='FROZEN\x00', 0x7) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8005, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3f) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='freezer.state\x00') 320.69051ms ago: executing program 1 (id=3572): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYRES8, @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040800000000008500000001000000952e7cba5f0c2f2a00f7b745"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000840)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000004bfa200000000000007020000f8ff79109ef80f6586e60000b704100000000000850000000300000095ff000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x35, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='vm_unmapped_area\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x2, 0xff, 0x0, r4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000200000000000000000018110000", @ANYBLOB="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", @ANYRES8, @ANYBLOB="8c5ce7db9d3631b26d72c0ae3c994c7e01fcecccacc6a15279f8c458003143e909bed953fa7610f0135e8597928f64984c1d5b60ecf4880e33d806b12a837ae55dc49067b8f0b518731ec814991e3a4be50f72c283a9cc87de983c01db06b22d0386aae7f899c3fb8ca6ed6924e2bee90725709e00e79ff521e141614becb28fb9c5618f59fa482e37091cd7f90be844e165159717ba3acba4a529946af0d919f77f340d2d32e2ef9b30a225db7e2b63a4e23527090ba2ec53620e", @ANYRESHEX=r1, @ANYRES64=r2, @ANYRES32=r1], 0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffe00}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r0}, 0xfe26) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r7}, 0x10) r8 = openat$cgroup_ro(r4, &(0x7f0000000580)='blkio.bfq.io_wait_time\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x9, 0x0, 0x18000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffdcf, 0x0, 0x0, 0x0, 0xffffffffffffffff, r7, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 301.380154ms ago: executing program 4 (id=3573): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRESOCT=r0, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r2}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 282.726186ms ago: executing program 1 (id=3574): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='f2fs_gc_end\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES16=r8, @ANYRES8=r5, @ANYRESHEX=r2, @ANYRES32=0x0, @ANYRES64=r6, @ANYRES8=r5, @ANYRESDEC=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mb_release_inode_pa\x00', r12}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r13, &(0x7f0000000200), 0x43400) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r15, &(0x7f0000000200), 0x23000) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r16, &(0x7f0000000680), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r3}, 0x10) 261.58431ms ago: executing program 4 (id=3575): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) syz_clone(0x50900000, 0x0, 0x0, 0x0, 0x0, 0x0) 175.011123ms ago: executing program 4 (id=3576): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x5) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x5) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0x2000009) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)=0x2004000) 164.397755ms ago: executing program 4 (id=3577): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000002000000000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffee6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x90) r1 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3f, 0x7, 0xaf, 0x0, 0x0, 0x1, 0x1a020, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf0b5, 0x1, @perf_config_ext={0x58e1, 0x7}, 0x40, 0x3, 0x2, 0x19da18df37273ef4, 0x6, 0x3ff, 0x1f, 0x0, 0x0, 0x0, 0x2de}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000004fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r5 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c40)={r5, r4, 0x0, 0x1, &(0x7f0000001c00)='\x00'}, 0x30) perf_event_open(&(0x7f0000000740)={0x0, 0x80, 0x4, 0x1, 0x9, 0x1f, 0x0, 0x2409, 0x3c4, 0xf066ed2ac6fb90f, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000700), 0x6}, 0x800, 0x1f, 0x7f, 0x6, 0x3, 0x2, 0x6, 0x0, 0x3}, r5, 0xa, r2, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x32810, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x40, 0x6, 0x9, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000003c0), 0x9}, 0xe0b6, 0x20, 0x101, 0x3, 0xfffffffffffffff7, 0x2, 0xa, 0x0, 0x2, 0x0, 0x1}, r5, 0xa, 0xffffffffffffffff, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='ext4_remove_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r10, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) 163.507445ms ago: executing program 0 (id=3578): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xf, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x19}}}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, 0x0, 0x0}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000000)=0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x4, 0xa, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x2, 0x1}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) 125.68717ms ago: executing program 3 (id=3579): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000200000000001200000085000000230000003f0000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2}, 0x0) 115.452152ms ago: executing program 0 (id=3580): r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x244}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 103.160593ms ago: executing program 3 (id=3581): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001419) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='cachefiles_write\x00'}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=0x0, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 101.718934ms ago: executing program 1 (id=3582): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000fffffffb000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000d000000b7020000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8ff1cb79070098750010000086dd6317ce8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x20, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r8) 94.324725ms ago: executing program 4 (id=3583): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008200000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000faffffffb703000008400000b70600000000feff850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x20, &(0x7f0000000080)={&(0x7f0000000040)=""/21, 0x15, 0x0, &(0x7f0000000340)=""/142, 0x8e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_sync_file_enter\x00', r7}, 0x10) 8.336748ms ago: executing program 1 (id=3584): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000005640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffff09}, 0x41) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r4, 0x4) sendmsg$sock(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x7, &(0x7f0000000080)=@generic={0x0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0xad, &(0x7f0000000100)=""/173, 0x40f00, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)=[{0x4, 0x5, 0x9, 0x4}], 0x10, 0x7fffffff}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x37, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = gettid() r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r6}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0xef, 0x7, 0x1, 0x0, 0x5, 0x8002, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140)}, 0x220, 0x287d, 0x0, 0x2, 0x7, 0x5, 0x0, 0x0, 0x4, 0x0, 0x2}, r7, 0xd, r8, 0xb) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x1f2f, 0xe, 0x0, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0x59, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1"}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001700)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, r1, 0x0) close(r6) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80047441, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='../\x00\x00\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x240, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x4}, 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 0s ago: executing program 4 (id=3585): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x8, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="cd7fe62775206dbd9f58852c777fb3bf568bf960155a5fc1d846040800000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001000)=@o_path={&(0x7f0000000680)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000010000000000181100002a18e0410a4e7a4161aec2211b0a17fe09fe9c406dce383cf7f0a6987e1304f7c88c4877ba12d097eb9beef48877bf439a36d14e21b30b0e1a3823d25dc9daf09152872ae88ba6ff3f2e25d2139f48c1cf08c157cc1a697c7af2c8420d4131d3819f919b5a78b70f884ab7927af72ed5e951f4ecb532fb857394a0e5a89b6027be8dc7155ad68fe4df301e3f3aa83f8adcde795385d9b247f0c8865591dffa420bd3973d8955b0b591a8c099ae8f619d75e348dbfe233a4508d80adb546ade32ab44f192c294b0ea500cc4", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91100000000000b7020000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.145' (ED25519) to the list of known hosts. [ 18.437380][ T24] audit: type=1400 audit(1719334726.919:66): avc: denied { mounton } for pid=284 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.438292][ T284] cgroup: Unknown subsys name 'net' [ 18.440356][ T24] audit: type=1400 audit(1719334726.919:67): avc: denied { mount } for pid=284 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.443880][ T24] audit: type=1400 audit(1719334726.919:68): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.443999][ T284] cgroup: Unknown subsys name 'devices' [ 18.566678][ T284] cgroup: Unknown subsys name 'hugetlb' [ 18.572060][ T284] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 18.703430][ T24] audit: type=1400 audit(1719334727.179:69): avc: denied { setattr } for pid=284 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.726108][ T285] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.726371][ T24] audit: type=1400 audit(1719334727.179:70): avc: denied { mounton } for pid=284 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.759293][ T284] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.759353][ T24] audit: type=1400 audit(1719334727.179:71): avc: denied { mount } for pid=284 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.790687][ T24] audit: type=1400 audit(1719334727.209:72): avc: denied { relabelto } for pid=285 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.815999][ T24] audit: type=1400 audit(1719334727.209:73): avc: denied { write } for pid=285 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.841598][ T24] audit: type=1400 audit(1719334727.219:74): avc: denied { read } for pid=284 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.868008][ T24] audit: type=1400 audit(1719334727.219:75): avc: denied { open } for pid=284 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.099717][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.106598][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.113635][ T293] device bridge_slave_0 entered promiscuous mode [ 19.135921][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.142740][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.149894][ T293] device bridge_slave_1 entered promiscuous mode [ 19.172838][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.179719][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.186807][ T292] device bridge_slave_0 entered promiscuous mode [ 19.199451][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.206288][ T294] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.213422][ T294] device bridge_slave_0 entered promiscuous mode [ 19.219903][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.226754][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.233871][ T292] device bridge_slave_1 entered promiscuous mode [ 19.247918][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.254735][ T294] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.261902][ T294] device bridge_slave_1 entered promiscuous mode [ 19.294845][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.301709][ T295] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.308870][ T295] device bridge_slave_0 entered promiscuous mode [ 19.315393][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.322208][ T295] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.329488][ T295] device bridge_slave_1 entered promiscuous mode [ 19.370773][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.377747][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.384856][ T291] device bridge_slave_0 entered promiscuous mode [ 19.393274][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.400122][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.407347][ T291] device bridge_slave_1 entered promiscuous mode [ 19.498756][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.505609][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.512674][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.519500][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.532284][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.539122][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.546199][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.552995][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.561962][ T295] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.568810][ T295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.575876][ T295] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.582673][ T295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.595290][ T294] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.602119][ T294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.609227][ T294] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.616017][ T294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.637200][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.644101][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.651258][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.658729][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.666291][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.673184][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.680153][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.687262][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.694774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.701989][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.709101][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 19.717085][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.724919][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.731727][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.748896][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 19.756255][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.763355][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 19.771364][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.779466][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.786297][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.821430][ T292] device veth0_vlan entered promiscuous mode [ 19.828182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.836256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.844074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.852283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.860709][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.868258][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.875460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.883329][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.890114][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.897264][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.905194][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.912037][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.919170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.927213][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.934022][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.941213][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.948917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.956950][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.963756][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.970934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.978849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.987637][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.994450][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.001764][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.009818][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.016656][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.037848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.046254][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.053882][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.061501][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.069794][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.082990][ T295] device veth0_vlan entered promiscuous mode [ 20.093302][ T293] device veth0_vlan entered promiscuous mode [ 20.099743][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.107170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.114922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.123486][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.130818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.138084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.145196][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.152696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.160747][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.168682][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.175515][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.197588][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.206582][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.214427][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.221236][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.228885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.236795][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.244395][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.252180][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.259863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.267884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.275604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.283292][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.290946][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.298986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.313787][ T291] device veth0_vlan entered promiscuous mode [ 20.322825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.330967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.339102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.348080][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.356149][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.363668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.371480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.378645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.386063][ T295] device veth1_macvtap entered promiscuous mode [ 20.396569][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.403918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.411927][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.422430][ T294] device veth0_vlan entered promiscuous mode [ 20.431027][ T291] device veth1_macvtap entered promiscuous mode [ 20.439016][ T292] device veth1_macvtap entered promiscuous mode [ 20.446084][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.453683][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.461577][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.469835][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.478080][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.485960][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.493761][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.501557][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.509526][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.517566][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.524855][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.532327][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.544951][ T293] device veth1_macvtap entered promiscuous mode [ 20.556205][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.564345][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.572678][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.580390][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.588472][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.596619][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.604536][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.615618][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.623684][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.636762][ T295] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.639753][ T294] device veth1_macvtap entered promiscuous mode [ 20.660294][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.670661][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.680170][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.687819][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.696277][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.704407][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.712890][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.721313][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.734605][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.761719][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.770954][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.779510][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.788155][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.901134][ T334] ------------[ cut here ]------------ [ 20.916195][ T334] trace type BPF program uses run-time allocation [ 20.955818][ T334] WARNING: CPU: 1 PID: 334 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 21.015093][ T334] Modules linked in: [ 21.029303][ T334] CPU: 1 PID: 334 Comm: syz.4.6 Not tainted 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 21.065615][ T334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 21.084768][ T334] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 21.093274][ T334] Code: c8 e9 84 fe ff ff e8 54 f5 ee ff 31 db e9 85 fe ff ff e8 48 f5 ee ff c6 05 fe e9 64 05 01 48 c7 c7 80 6d 45 85 e8 65 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 21.115465][ T334] RSP: 0018:ffffc90003ca6f90 EFLAGS: 00010246 [ 21.121414][ T334] RAX: 8d1cc948740e3c00 RBX: ffff88810b7ce000 RCX: 0000000000040000 [ 21.129448][ T334] RDX: ffffc900023a4000 RSI: 000000000000094d RDI: 000000000000094e [ 21.137512][ T334] RBP: ffffc90003ca6fd0 R08: ffffffff815220c8 R09: ffffed103ee2a5f8 [ 21.145782][ T334] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 21.153849][ T334] R13: 1ffff92000129404 R14: ffff888122360000 R15: ffffc9000094a020 [ 21.163552][ T334] FS: 00007fa1022956c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 21.172677][ T334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.179361][ T334] CR2: ffffffffdfa50000 CR3: 0000000121fb2000 CR4: 00000000003506a0 [ 21.187306][ T334] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.198817][ T334] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.209395][ T334] Call Trace: [ 21.212546][ T334] ? show_regs+0x58/0x60 [ 21.216883][ T334] ? __warn+0x160/0x2f0 [ 21.220958][ T334] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.227022][ T334] ? report_bug+0x3d9/0x5b0 [ 21.231447][ T334] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.257100][ T334] ? handle_bug+0x41/0x70 [ 21.279916][ T334] ? exc_invalid_op+0x1b/0x50 [ 21.284763][ T334] ? asm_exc_invalid_op+0x12/0x20 [ 21.292000][ T334] ? wake_up_klogd+0xb8/0xf0 [ 21.296968][ T334] ? check_map_prog_compatibility+0x65b/0x7c0 [ 21.302900][ T334] ? __fdget+0x1bc/0x240 [ 21.307176][ T334] resolve_pseudo_ldimm64+0x586/0x1020 [ 21.312891][ T334] ? bpf_check+0xf2b0/0xf2b0 [ 21.317780][ T334] ? kvmalloc_node+0x82/0x130 [ 21.322342][ T334] bpf_check+0xaf21/0xf2b0 [ 21.327784][ T334] ? stack_depot_save+0xe/0x10 [ 21.333986][ T334] ? __se_sys_bpf+0x9856/0x11cb0 [ 21.340165][ T334] ? sched_clock+0x3a/0x40 [ 21.344861][ T334] ? bpf_get_btf_vmlinux+0x60/0x60 [ 21.350065][ T334] ? __kernel_text_address+0x9b/0x110 [ 21.355612][ T334] ? unwind_get_return_address+0x4d/0x90 [ 21.365231][ T334] ? arch_stack_walk+0xf3/0x140 [ 21.380164][ T334] ? stack_trace_save+0x113/0x1c0 [ 21.392922][ T334] ? stack_trace_snprint+0xf0/0xf0 [ 21.420042][ T334] ? stack_trace_snprint+0xf0/0xf0 [ 21.442707][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 21.448417][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 21.453753][ T334] ? ____kasan_kmalloc+0xed/0x110 [ 21.458779][ T334] ? ____kasan_kmalloc+0xdb/0x110 [ 21.463673][ T334] ? __kasan_kmalloc+0x9/0x10 [ 21.468733][ T334] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 21.474100][ T334] ? selinux_bpf_prog_alloc+0x51/0x140 [ 21.484321][ T334] ? security_bpf_prog_alloc+0x62/0x90 [ 21.489695][ T334] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 21.494435][ T334] ? __x64_sys_bpf+0x7b/0x90 [ 21.498870][ T334] ? do_syscall_64+0x34/0x70 [ 21.503234][ T334] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 21.509297][ T334] ? __kasan_kmalloc+0x9/0x10 [ 21.513799][ T334] __se_sys_bpf+0x107a2/0x11cb0 [ 21.518719][ T334] ? futex_wait+0x6a0/0x7c0 [ 21.523065][ T334] ? __x64_sys_bpf+0x90/0x90 [ 21.527828][ T334] ? do_futex+0x17b0/0x17b0 [ 21.532650][ T334] ? __bad_area_nosemaphore+0xcd/0x440 [ 21.538905][ T334] ? __init_rwsem+0x1c0/0x1c0 [ 21.543672][ T334] ? do_futex+0x139a/0x17b0 [ 21.548755][ T363] bridge0: port 3(veth0_to_batadv) entered blocking state [ 21.563136][ T334] ? asm_exc_page_fault+0x1e/0x30 [ 21.572425][ T363] bridge0: port 3(veth0_to_batadv) entered disabled state [ 21.580008][ T334] ? futex_exit_release+0x1e0/0x1e0 [ 21.585393][ T334] ? __get_user_nocheck_8+0x10/0x13 [ 21.590729][ T363] device veth0_to_batadv entered promiscuous mode [ 21.597272][ T334] ? perf_copy_attr+0x50/0x760 [ 21.602333][ T363] bridge0: port 3(veth0_to_batadv) entered blocking state [ 21.609310][ T363] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 21.619336][ T334] ? __se_sys_perf_event_open+0xf1/0x3c30 [ 21.625004][ T334] ? __kasan_check_write+0x14/0x20 [ 21.673034][ T334] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 21.679804][ T334] ? __se_sys_futex+0x355/0x470 [ 21.680175][ T376] device sit0 entered promiscuous mode [ 21.685733][ T334] ? __fget_files+0x31e/0x380 [ 21.694292][ T334] ? fpu__clear_all+0x20/0x20 [ 21.699034][ T334] ? __kasan_check_read+0x11/0x20 [ 21.703881][ T334] __x64_sys_bpf+0x7b/0x90 [ 21.708171][ T334] do_syscall_64+0x34/0x70 [ 21.712397][ T334] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 21.755325][ C0] hrtimer: interrupt took 27623 ns [ 21.772063][ T334] RIP: 0033:0x7fa103013d39 [ 21.777602][ T334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 21.831439][ T334] RSP: 002b:00007fa102295048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 21.860601][ T334] RAX: ffffffffffffffda RBX: 00007fa1031a1fa0 RCX: 00007fa103013d39 [ 21.869245][ T334] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 21.987223][ T334] RBP: 00007fa103094766 R08: 0000000000000000 R09: 0000000000000000 [ 21.995865][ T334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 22.003835][ T334] R13: 000000000000000b R14: 00007fa1031a1fa0 R15: 00007ffec9cffe38 [ 22.012327][ T334] ---[ end trace 7196ad2fe570eb4d ]--- [ 22.250664][ T420] device sit0 entered promiscuous mode [ 22.912820][ T458] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.927768][ T458] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.935508][ T458] device bridge_slave_0 entered promiscuous mode [ 22.949410][ T458] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.956407][ T458] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.963967][ T458] device bridge_slave_1 entered promiscuous mode [ 23.014459][ T458] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.021308][ T458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.028403][ T458] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.035184][ T458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.105181][ T460] device sit0 entered promiscuous mode [ 23.144766][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.177217][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.218246][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.293503][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.323875][ T53] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.330740][ T53] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.389900][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.474902][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.481767][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.495418][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.509147][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.522168][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.534122][ T458] device veth0_vlan entered promiscuous mode [ 23.564977][ T458] device veth1_macvtap entered promiscuous mode [ 23.572049][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.580039][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.587265][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.594382][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.846614][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.854753][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.212700][ T7] device bridge_slave_1 left promiscuous mode [ 24.218847][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.255695][ T7] device bridge_slave_0 left promiscuous mode [ 24.311294][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.323435][ T7] device veth1_macvtap left promiscuous mode [ 24.333985][ T7] device veth0_vlan left promiscuous mode [ 24.406694][ T554] syz.3.79[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.406737][ T554] syz.3.79[554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.271469][ T590] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 25.442751][ T24] kauditd_printk_skb: 32 callbacks suppressed [ 25.442760][ T24] audit: type=1400 audit(1719334733.919:108): avc: denied { cpu } for pid=596 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.483546][ T602] device sit0 left promiscuous mode [ 25.620743][ T606] device sit0 entered promiscuous mode [ 26.138203][ T24] audit: type=1400 audit(1719334734.619:109): avc: denied { write } for pid=613 comm="syz.3.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.349823][ T24] audit: type=1400 audit(1719334734.829:110): avc: denied { create } for pid=619 comm="syz.4.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.892940][ T676] device syzkaller0 entered promiscuous mode [ 27.907467][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 27.925131][ T682] device sit0 entered promiscuous mode [ 28.139779][ T24] audit: type=1400 audit(1719334736.619:111): avc: denied { sys_admin } for pid=695 comm="syz.2.133" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 28.177421][ T24] audit: type=1400 audit(1719334736.649:112): avc: denied { ioctl } for pid=701 comm="syz.3.135" path="socket:[16074]" dev="sockfs" ino=16074 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.254113][ T24] audit: type=1400 audit(1719334736.729:113): avc: denied { create } for pid=710 comm="syz.3.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.728865][ T773] device sit0 left promiscuous mode [ 29.855972][ T781] syz.3.165[781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.856016][ T781] syz.3.165[781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.905650][ T773] device sit0 entered promiscuous mode [ 29.936644][ T782] syz.3.165[782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.936684][ T782] syz.3.165[782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.042633][ T882] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.060573][ T882] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.068241][ T882] device bridge_slave_0 entered promiscuous mode [ 32.077163][ T882] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.084015][ T882] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.095243][ T882] device bridge_slave_1 entered promiscuous mode [ 32.162058][ T882] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.168917][ T882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.176000][ T882] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.182785][ T882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.400053][ T911] device sit0 entered promiscuous mode [ 32.619340][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.626888][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.634863][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.645571][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.653390][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.768464][ T24] audit: type=1400 audit(1719334741.249:114): avc: denied { write } for pid=927 comm="syz.1.216" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.893993][ T882] device veth0_vlan entered promiscuous mode [ 32.904369][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.931090][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.939371][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.947047][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.984290][ T882] device veth1_macvtap entered promiscuous mode [ 33.036078][ T548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.110538][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.135738][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.154784][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.193941][ T547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.222298][ T24] audit: type=1400 audit(1719334741.699:115): avc: denied { mounton } for pid=882 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 33.680365][ T7] device bridge_slave_1 left promiscuous mode [ 33.690038][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.775639][ T984] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 33.788021][ T7] device bridge_slave_0 left promiscuous mode [ 33.845555][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.859245][ T7] device veth1_macvtap left promiscuous mode [ 33.865197][ T7] device veth0_vlan left promiscuous mode [ 34.375658][ T24] audit: type=1400 audit(1719334742.859:116): avc: denied { relabelfrom } for pid=1026 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.635090][ T24] audit: type=1400 audit(1719334742.879:117): avc: denied { relabelto } for pid=1026 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.872522][ T1062] syz.1.268[1062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.872568][ T1062] syz.1.268[1062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.325749][ T24] audit: type=1400 audit(1719334743.799:118): avc: denied { create } for pid=1075 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 35.401659][ T1079] cgroup: syz.4.275 (1079) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 35.467476][ T1079] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 35.766320][ T1096] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 36.440675][ T1106] device syzkaller0 entered promiscuous mode [ 36.575719][ T1106] syzkaller0: create flow: hash 3503468470 index 1 [ 36.616840][ T1105] syzkaller0: delete flow: hash 3503468470 index 1 [ 37.515231][ T1156] device syzkaller0 entered promiscuous mode [ 37.590949][ T1156] syzkaller0: create flow: hash 3503468470 index 1 [ 37.625108][ T1153] syzkaller0: delete flow: hash 3503468470 index 1 [ 37.743886][ T1175] device syzkaller0 entered promiscuous mode [ 39.071714][ T1241] device sit0 left promiscuous mode [ 39.291528][ T1240] device sit0 entered promiscuous mode [ 39.328142][ T1243] device sit0 left promiscuous mode [ 39.544932][ T1243] device sit0 entered promiscuous mode [ 40.240757][ T1280] device pim6reg1 entered promiscuous mode [ 40.694791][ T1305] device syzkaller0 entered promiscuous mode [ 40.714115][ T423] syzkaller0: tun_net_xmit 48 [ 40.827260][ T1311] syz.2.364[1311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.827341][ T1311] syz.2.364[1311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.064183][ T1324] syz.0.369[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.080034][ T1325] syz.0.369[1325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.085897][ T1324] syz.0.369[1324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.103451][ T1327] syz.3.370[1327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.115573][ T1327] syz.3.370[1327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.145946][ T24] audit: type=1400 audit(1719334749.629:119): avc: denied { create } for pid=1326 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.189300][ T1333] syz.1.372[1333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.189343][ T1333] syz.1.372[1333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.229376][ T1339] syz.1.375[1339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.397647][ T1352] device sit0 entered promiscuous mode [ 41.922142][ T1374] device syzkaller0 entered promiscuous mode [ 42.276063][ T24] audit: type=1400 audit(1719334750.759:120): avc: denied { create } for pid=1403 comm="syz.4.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 42.997933][ T1420] device veth0_vlan left promiscuous mode [ 43.004201][ T1420] device veth0_vlan entered promiscuous mode [ 43.014952][ T1431] device pim6reg1 entered promiscuous mode [ 44.435284][ T1529] device veth0_vlan left promiscuous mode [ 44.441245][ T1529] device veth0_vlan entered promiscuous mode [ 44.449940][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.460533][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.468049][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.480460][ T1527] device sit0 left promiscuous mode [ 44.501488][ T1531] device sit0 entered promiscuous mode [ 44.523446][ T1527] device sit0 entered promiscuous mode [ 44.908478][ T1557] device syzkaller0 entered promiscuous mode [ 45.069670][ T1576] device sit0 left promiscuous mode [ 45.087820][ T1578] device sit0 left promiscuous mode [ 45.132074][ T1576] device sit0 entered promiscuous mode [ 45.329703][ T24] audit: type=1400 audit(1719334753.809:121): avc: denied { create } for pid=1592 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 45.521813][ T1565] device veth0_vlan left promiscuous mode [ 45.539742][ T1565] device veth0_vlan entered promiscuous mode [ 45.550913][ T1578] device sit0 entered promiscuous mode [ 45.607438][ T1602] device syzkaller0 entered promiscuous mode [ 45.962050][ T1634] device sit0 left promiscuous mode [ 46.078046][ T1634] device sit0 entered promiscuous mode [ 47.510219][ T1700] device syzkaller0 entered promiscuous mode [ 47.525392][ T1709] device sit0 left promiscuous mode [ 47.573560][ T1709] device sit0 entered promiscuous mode [ 48.486948][ T24] audit: type=1400 audit(1719334756.969:122): avc: denied { create } for pid=1739 comm="syz.0.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 48.595878][ T24] audit: type=1400 audit(1719334756.989:123): avc: denied { create } for pid=1739 comm="syz.0.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 49.816408][ T1816] device sit0 left promiscuous mode [ 49.901002][ T1816] device sit0 entered promiscuous mode [ 50.331718][ T1833] bpf_get_probe_write_proto: 7 callbacks suppressed [ 50.331728][ T1833] syz.0.551[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.338227][ T1822] device sit0 left promiscuous mode [ 50.349268][ T1833] syz.0.551[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.368335][ T1833] syz.0.551[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.387140][ T1825] device sit0 entered promiscuous mode [ 50.395708][ T1833] syz.0.551[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.405035][ T1833] syz.0.551[1833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.893975][ T1854] syz.3.561[1854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.086293][ T1854] syz.3.561[1854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.543499][ T24] audit: type=1400 audit(1719334760.019:124): avc: denied { create } for pid=1868 comm="syz.4.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 51.681650][ T24] audit: type=1400 audit(1719334760.149:125): avc: denied { create } for pid=1876 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.703426][ T24] audit: type=1400 audit(1719334760.149:126): avc: denied { write } for pid=1876 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.722879][ T24] audit: type=1400 audit(1719334760.149:127): avc: denied { setopt } for pid=1876 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 51.749595][ T24] audit: type=1400 audit(1719334760.159:128): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 52.154256][ T24] audit: type=1400 audit(1719334760.629:129): avc: denied { append } for pid=1912 comm="syz.1.581" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 52.377535][ T1934] syz.2.590[1934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.377577][ T1934] syz.2.590[1934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.389956][ T1932] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 52.435254][ T1934] device syzkaller0 entered promiscuous mode [ 52.470262][ T1934] syz.2.590[1934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.552007][ T24] audit: type=1400 audit(1719334761.029:130): avc: denied { read } for pid=1947 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.191114][ T2007] device sit0 left promiscuous mode [ 53.388193][ T2015] device sit0 entered promiscuous mode [ 54.572153][ T2070] device sit0 left promiscuous mode [ 54.736235][ T2073] device sit0 left promiscuous mode [ 54.872593][ T2075] device sit0 entered promiscuous mode [ 55.350543][ T2074] device sit0 entered promiscuous mode [ 55.685132][ T2093] bpf_get_probe_write_proto: 1 callbacks suppressed [ 55.685141][ T2093] syz.3.642[2093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.802529][ T2093] syz.3.642[2093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.256293][ T2120] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.316484][ T2120] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.369203][ T2120] device bridge_slave_0 entered promiscuous mode [ 56.376028][ T2120] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.382846][ T2120] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.390045][ T2120] device bridge_slave_1 entered promiscuous mode [ 56.422545][ T2125] device sit0 left promiscuous mode [ 56.449038][ T2126] device sit0 entered promiscuous mode [ 56.608734][ T24] audit: type=1400 audit(1719334765.089:131): avc: denied { create } for pid=2140 comm="syz.1.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.623397][ T2120] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.634589][ T2120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.641687][ T2120] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.648492][ T2120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.873702][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.905919][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.949120][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.057460][ T1534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.108477][ T1534] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.115346][ T1534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.310314][ T1534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.418514][ T1534] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.425378][ T1534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.567267][ T1534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.574976][ T1534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.587673][ T2169] device veth0_vlan left promiscuous mode [ 57.593532][ T2169] device veth0_vlan entered promiscuous mode [ 57.606053][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.614586][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.622291][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.669605][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 57.682914][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 57.693569][ T2120] device veth0_vlan entered promiscuous mode [ 57.700929][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 57.717098][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.739391][ T24] audit: type=1400 audit(1719334766.219:132): avc: denied { create } for pid=2177 comm="syz.0.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 57.760635][ T2120] device veth1_macvtap entered promiscuous mode [ 57.806649][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.813856][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.845863][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 57.864147][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 57.915595][ T583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 57.962028][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 57.974517][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 58.024625][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 58.070387][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 58.227528][ T2206] device pim6reg1 entered promiscuous mode [ 58.766803][ T9] device bridge_slave_1 left promiscuous mode [ 58.834282][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.851072][ T9] device bridge_slave_0 left promiscuous mode [ 58.857381][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.865181][ T9] device veth1_macvtap left promiscuous mode [ 58.875420][ T9] device veth0_vlan left promiscuous mode [ 59.147315][ T2251] syz.4.693[2251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.147356][ T2251] syz.4.693[2251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.162573][ T2250] syz.4.693[2250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.176741][ T2250] syz.4.693[2250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.200241][ T2248] device veth1_macvtap left promiscuous mode [ 59.276900][ T2248] device veth1_macvtap entered promiscuous mode [ 59.283006][ T2248] device macsec0 entered promiscuous mode [ 59.416221][ T2278] device pim6reg1 entered promiscuous mode [ 60.911227][ T2416] syz.1.750[2416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.114485][ T24] audit: type=1400 audit(1719334771.589:133): avc: denied { create } for pid=2531 comm="syz.4.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 63.466625][ T2543] device pim6reg1 entered promiscuous mode [ 64.357003][ T2603] device sit0 entered promiscuous mode [ 65.212457][ T24] audit: type=1400 audit(1719334773.689:134): avc: denied { ioctl } for pid=2645 comm="syz.0.831" path="uts:[4026532361]" dev="nsfs" ino=4026532361 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.258834][ T2646] device veth0_vlan left promiscuous mode [ 65.281746][ T2646] device veth0_vlan entered promiscuous mode [ 65.649910][ T2694] device pim6reg1 entered promiscuous mode [ 65.878070][ T2702] syz.1.850[2702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.878118][ T2702] syz.1.850[2702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.393903][ T2752] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.487599][ T2754] bridge0: port 3(veth0_to_batadv) entered blocking state [ 66.495015][ T2754] bridge0: port 3(veth0_to_batadv) entered disabled state [ 66.502959][ T2754] device veth0_to_batadv entered promiscuous mode [ 66.509534][ T2754] bridge0: port 3(veth0_to_batadv) entered blocking state [ 66.516489][ T2754] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 66.532312][ T2763] device veth0_to_batadv left promiscuous mode [ 66.545816][ T2763] bridge0: port 3(veth0_to_batadv) entered disabled state [ 67.130981][ T2785] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.132974][ T2884] device sit0 left promiscuous mode [ 68.160913][ T2884] device sit0 entered promiscuous mode [ 69.120852][ T2911] device sit0 left promiscuous mode [ 69.133776][ T2919] device sit0 left promiscuous mode [ 69.166421][ T2911] device sit0 entered promiscuous mode [ 69.927792][ T2922] device syzkaller0 entered promiscuous mode [ 69.935731][ T2919] device sit0 entered promiscuous mode [ 69.974961][ T2929] device syzkaller0 entered promiscuous mode [ 70.072799][ T2937] device syzkaller0 entered promiscuous mode [ 70.134790][ T2943] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 70.425941][ T2966] device sit0 left promiscuous mode [ 70.552273][ T2972] device sit0 entered promiscuous mode [ 71.326949][ T3039] device sit0 left promiscuous mode [ 71.378107][ T3039] device sit0 entered promiscuous mode [ 72.150956][ T3075] device syzkaller0 entered promiscuous mode [ 72.451487][ T3131] syz.4.977[3131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.451539][ T3131] syz.4.977[3131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.501778][ T3134] device sit0 left promiscuous mode [ 72.619438][ T3134] device sit0 entered promiscuous mode [ 72.773490][ T3153] device pim6reg1 entered promiscuous mode [ 73.639166][ T24] audit: type=1400 audit(1719334782.119:135): avc: denied { create } for pid=3179 comm="syz.3.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 73.744766][ T3187] device sit0 left promiscuous mode [ 73.824091][ T3187] device sit0 entered promiscuous mode [ 74.613960][ T3211] device sit0 left promiscuous mode [ 74.728250][ T3211] device sit0 entered promiscuous mode [ 74.917420][ T3230] syz.2.1013[3230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.917468][ T3230] syz.2.1013[3230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.463387][ T3243] device sit0 left promiscuous mode [ 75.553900][ T3245] device sit0 entered promiscuous mode [ 76.212345][ T3273] syz.2.1027[3273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.212389][ T3273] syz.2.1027[3273] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.336476][ T3271] syz.2.1027[3271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.396383][ T3271] syz.2.1027[3271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.512017][ T3295] device sit0 left promiscuous mode [ 76.558173][ T3293] device sit0 left promiscuous mode [ 76.679290][ T3295] device sit0 entered promiscuous mode [ 76.702146][ T3293] device sit0 entered promiscuous mode [ 76.959048][ T3331] syz.0.1049[3331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.959088][ T3331] syz.0.1049[3331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.176149][ T3340] device sit0 left promiscuous mode [ 77.282876][ T3338] device sit0 entered promiscuous mode [ 77.890743][ T3374] bpf_get_probe_write_proto: 2 callbacks suppressed [ 77.890751][ T3374] syz.0.1069[3374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.905295][ T3374] syz.0.1069[3374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.216515][ T3418] syz.0.1081[3418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.249235][ T3419] syz.0.1081[3419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.270532][ T3418] syz.0.1081[3418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.410315][ T3432] device sit0 left promiscuous mode [ 78.449610][ T3436] syz.4.1087[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.449679][ T3436] syz.4.1087[3436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.476045][ T3437] device sit0 entered promiscuous mode [ 78.863662][ T3482] device sit0 left promiscuous mode [ 78.899541][ T3486] device pim6reg1 entered promiscuous mode [ 78.957298][ T3494] syz.1.1109[3494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.957483][ T3494] syz.1.1109[3494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.973887][ T3482] device sit0 entered promiscuous mode [ 79.408720][ T3503] syz.1.1112[3503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.934070][ T3539] device syzkaller0 entered promiscuous mode [ 80.039956][ T3547] device sit0 left promiscuous mode [ 80.133792][ T3547] device sit0 entered promiscuous mode [ 80.168940][ T24] audit: type=1400 audit(1719334788.649:136): avc: denied { ioctl } for pid=3551 comm="syz.1.1129" path="socket:[25888]" dev="sockfs" ino=25888 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 80.885790][ T3605] device sit0 left promiscuous mode [ 80.905964][ T3613] device sit0 left promiscuous mode [ 80.944853][ T3613] device sit0 entered promiscuous mode [ 81.728745][ T3605] device sit0 entered promiscuous mode [ 81.975818][ T3675] device sit0 left promiscuous mode [ 82.034678][ T3675] device sit0 entered promiscuous mode [ 82.166896][ T3688] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 83.306875][ T3759] device syzkaller0 entered promiscuous mode [ 83.593519][ T3776] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 83.750677][ T3781] device syzkaller0 entered promiscuous mode [ 84.258118][ T3822] device syzkaller0 entered promiscuous mode [ 84.747607][ T3854] device syzkaller0 entered promiscuous mode [ 85.431135][ T24] audit: type=1400 audit(1719334793.909:137): avc: denied { create } for pid=3898 comm="syz.1.1258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 86.147196][ T3940] device sit0 left promiscuous mode [ 86.184470][ T3946] bpf_get_probe_write_proto: 13 callbacks suppressed [ 86.184479][ T3946] syz.4.1278[3946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.187544][ T3940] device sit0 entered promiscuous mode [ 86.191300][ T3946] syz.4.1278[3946] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.859702][ T3959] device syzkaller0 entered promiscuous mode [ 86.968486][ T3972] device syzkaller0 entered promiscuous mode [ 87.282767][ T4001] syz.1.1298[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.282808][ T4001] syz.1.1298[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.307381][ T4001] syz.1.1298[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.325857][ T4001] syz.1.1298[4001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.766809][ T4023] device syzkaller0 entered promiscuous mode [ 88.027139][ T4059] device veth1_macvtap left promiscuous mode [ 88.048436][ T4059] device macsec0 left promiscuous mode [ 88.068256][ T4061] device sit0 left promiscuous mode [ 88.108134][ T4059] device veth1_macvtap entered promiscuous mode [ 88.137454][ T4059] device macsec0 entered promiscuous mode [ 88.158962][ T4061] device sit0 entered promiscuous mode [ 88.242919][ T24] audit: type=1400 audit(1719334796.699:138): avc: denied { create } for pid=4071 comm="syz.3.1324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 89.036120][ T4104] syz.2.1333[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.036163][ T4104] syz.2.1333[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.078453][ T24] audit: type=1400 audit(1719334797.559:139): avc: denied { create } for pid=4105 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 89.117048][ T4104] syz.2.1333[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.117100][ T4104] syz.2.1333[4104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.905343][ T4189] device sit0 left promiscuous mode [ 90.086773][ T4199] device sit0 entered promiscuous mode [ 90.117803][ T24] audit: type=1400 audit(1719334798.579:140): avc: denied { tracepoint } for pid=4198 comm="syz.4.1364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 91.042283][ T4242] device sit0 left promiscuous mode [ 91.159846][ T4242] device sit0 entered promiscuous mode [ 92.623951][ T4344] bridge0: port 3(veth0_to_batadv) entered blocking state [ 92.631674][ T4346] bpf_get_probe_write_proto: 4 callbacks suppressed [ 92.631683][ T4346] syz.0.1413[4346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.638590][ T4344] bridge0: port 3(veth0_to_batadv) entered disabled state [ 92.675508][ T4346] syz.0.1413[4346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.697877][ T4344] device veth0_to_batadv entered promiscuous mode [ 92.725765][ T4344] bridge0: port 3(veth0_to_batadv) entered blocking state [ 92.732759][ T4344] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 93.328961][ T4395] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.336715][ T4395] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.343902][ T4395] device bridge_slave_0 entered promiscuous mode [ 93.352672][ T4395] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.359921][ T4395] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.375622][ T4395] device bridge_slave_1 entered promiscuous mode [ 93.422479][ T4395] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.429327][ T4395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.436428][ T4395] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.443204][ T4395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.464125][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.471728][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.479718][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.556435][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.564360][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.571205][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.578726][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.586742][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.593569][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.602890][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.634425][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 93.676380][ T93] udevd[93]: worker [1779] terminated by signal 33 (Unknown signal 33) [ 93.685018][ T4395] device veth0_vlan entered promiscuous mode [ 93.705256][ T93] udevd[93]: worker [1779] failed while handling '/devices/virtual/block/loop2' [ 93.741360][ T4147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.755784][ T4147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.793394][ T4147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.819977][ T4147] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.884939][ T4395] device veth1_macvtap entered promiscuous mode [ 93.947504][ T4451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 93.960503][ T4451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.980874][ T4451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.111642][ T4474] syz.3.1458[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.111681][ T4474] syz.3.1458[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.196364][ T4474] syz.3.1458[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.235152][ T4474] syz.3.1458[4474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.546664][ T390] device bridge_slave_1 left promiscuous mode [ 94.789938][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.849132][ T390] device bridge_slave_0 left promiscuous mode [ 94.855063][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.875165][ T390] device veth1_macvtap left promiscuous mode [ 95.023218][ T4492] device sit0 left promiscuous mode [ 95.078519][ T4506] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 95.204587][ T4528] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.715341][ T4565] device sit0 left promiscuous mode [ 95.801136][ T4565] device sit0 entered promiscuous mode [ 96.372487][ T4629] device sit0 entered promiscuous mode [ 97.585804][ T4685] device syzkaller0 entered promiscuous mode [ 97.596498][ T4695] device sit0 left promiscuous mode [ 97.694186][ T4698] device sit0 entered promiscuous mode [ 98.730117][ T4752] syz.3.1569[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.730157][ T4752] syz.3.1569[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.772240][ T4752] syz.3.1569[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.885618][ T4752] syz.3.1569[4752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.933015][ T4769] syz.2.1575[4769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.960524][ T4769] syz.2.1575[4769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.132878][ T4799] device sit0 left promiscuous mode [ 99.173560][ T4799] device sit0 entered promiscuous mode [ 99.887206][ T4850] syz.0.1603[4850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.887249][ T4850] syz.0.1603[4850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.103477][ T4864] device pim6reg1 entered promiscuous mode [ 100.331041][ T4866] device syzkaller0 entered promiscuous mode [ 100.339053][ T4886] syz.4.1611[4886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.339098][ T4886] syz.4.1611[4886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.654876][ T4902] device sit0 left promiscuous mode [ 100.708965][ T4902] device sit0 entered promiscuous mode [ 101.870800][ T4948] device syzkaller0 entered promiscuous mode [ 102.009380][ T4964] device sit0 left promiscuous mode [ 102.080857][ T4964] device sit0 entered promiscuous mode [ 102.285883][ T24] audit: type=1400 audit(1719334810.769:141): avc: denied { create } for pid=4985 comm="syz.3.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 102.626272][ T4999] bridge0: port 3(veth0_to_batadv) entered disabled state [ 102.643881][ T4999] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.013705][ T5013] device sit0 left promiscuous mode [ 103.087019][ T5015] device sit0 entered promiscuous mode [ 103.623893][ T5053] device vxcan1 entered promiscuous mode [ 103.973706][ T5073] device sit0 entered promiscuous mode [ 104.621762][ T5078] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.629093][ T5078] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.641029][ T5083] device bridge_slave_1 left promiscuous mode [ 104.647194][ T5083] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.654420][ T5083] device bridge_slave_0 left promiscuous mode [ 104.660824][ T5083] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.867573][ T24] audit: type=1400 audit(1719334813.339:142): avc: denied { create } for pid=5092 comm="syz.4.1686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 105.024628][ T5116] device sit0 left promiscuous mode [ 105.116221][ T5116] device sit0 entered promiscuous mode [ 105.806578][ T5124] device sit0 left promiscuous mode [ 105.816095][ T24] audit: type=1400 audit(1719334814.299:143): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 105.842343][ T24] audit: type=1400 audit(1719334814.299:144): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 105.842924][ T5133] device sit0 entered promiscuous mode [ 105.984789][ T5167] device pim6reg1 entered promiscuous mode [ 106.047801][ T5177] device sit0 left promiscuous mode [ 106.188556][ T5177] device sit0 entered promiscuous mode [ 106.912214][ T5298] device sit0 left promiscuous mode [ 106.936463][ T5303] device sit0 entered promiscuous mode [ 107.125251][ T5311] device syzkaller0 entered promiscuous mode [ 107.301138][ T5346] bpf_get_probe_write_proto: 6 callbacks suppressed [ 107.301147][ T5346] syz.0.1739[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.317409][ T5346] syz.0.1739[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.359323][ T5346] syz.0.1739[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.370918][ T5343] device sit0 left promiscuous mode [ 107.387638][ T5346] syz.0.1739[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.461414][ T5348] device sit0 entered promiscuous mode [ 108.017745][ T5393] device pim6reg1 entered promiscuous mode [ 108.245991][ T5413] syz.2.1766[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.246035][ T5413] syz.2.1766[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.286638][ T5413] syz.2.1766[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.328305][ T5413] syz.2.1766[5413] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.709518][ T5433] syz.0.1770[5433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.799282][ T5433] syz.0.1770[5433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.005072][ T5438] device syzkaller0 entered promiscuous mode [ 110.216559][ T5509] device veth0_vlan left promiscuous mode [ 110.222703][ T5509] device veth0_vlan entered promiscuous mode [ 110.230445][ T2397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 110.238640][ T2397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.246571][ T2397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.441867][ T5531] device sit0 left promiscuous mode [ 110.490087][ T5531] device sit0 entered promiscuous mode [ 111.117323][ T5587] device sit0 left promiscuous mode [ 111.154029][ T5587] device sit0 entered promiscuous mode [ 111.481855][ T24] audit: type=1400 audit(1719334819.959:145): avc: denied { create } for pid=5613 comm="syz.0.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 112.618752][ T5685] bpf_get_probe_write_proto: 24 callbacks suppressed [ 112.618760][ T5685] syz.0.1877[5685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.655408][ T5685] syz.0.1877[5685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.431496][ T5710] device sit0 left promiscuous mode [ 113.435434][ T5714] syz.0.1888[5714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.477714][ T5714] syz.0.1888[5714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.478676][ T5717] device sit0 entered promiscuous mode [ 114.426269][ T5741] device pim6reg1 entered promiscuous mode [ 115.366572][ T5755] device sit0 left promiscuous mode [ 115.448822][ T5762] device sit0 entered promiscuous mode [ 115.899953][ T5782] device sit0 left promiscuous mode [ 115.956214][ T5787] syz.2.1914[5787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.956255][ T5787] syz.2.1914[5787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.975926][ T5782] device sit0 entered promiscuous mode [ 116.175904][ T5812] device sit0 left promiscuous mode [ 116.222030][ T5812] device sit0 entered promiscuous mode [ 116.414027][ T5823] syz.0.1926[5823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.414089][ T5823] syz.0.1926[5823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.588228][ T5828] syz.0.1926[5828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.711169][ T5828] syz.0.1926[5828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.764861][ T5813] device sit0 left promiscuous mode [ 116.792157][ T5820] device sit0 entered promiscuous mode [ 117.299847][ T5857] device syzkaller0 entered promiscuous mode [ 117.810025][ T5871] device sit0 left promiscuous mode [ 117.832953][ T5871] device sit0 entered promiscuous mode [ 117.969388][ T5884] bpf_get_probe_write_proto: 4 callbacks suppressed [ 117.969396][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.059006][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.166625][ T5888] syz.3.1949[5888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.182336][ T5888] syz.3.1949[5888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.224767][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.245851][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.258535][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.272886][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.294986][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.339680][ T5884] syz.3.1949[5884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.616689][ T5898] device pim6reg1 entered promiscuous mode [ 119.029565][ T5925] device syzkaller0 entered promiscuous mode [ 119.287960][ T5942] device sit0 left promiscuous mode [ 119.399756][ T5945] device sit0 entered promiscuous mode [ 122.727035][ T6080] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 122.751035][ T6084] device sit0 left promiscuous mode [ 122.820443][ T6084] device sit0 entered promiscuous mode [ 122.977555][ T6105] bpf_get_probe_write_proto: 18 callbacks suppressed [ 122.977563][ T6105] syz.2.2025[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.987392][ T6105] syz.2.2025[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.241336][ T6158] syz.2.2043[6158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.282274][ T6158] syz.2.2043[6158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.772744][ T6175] device syzkaller0 entered promiscuous mode [ 127.138519][ T24] audit: type=1400 audit(1719334835.619:146): avc: denied { create } for pid=6266 comm="syz.3.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 128.041287][ T6320] syz.1.2103[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.041335][ T6320] syz.1.2103[6320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.505541][ T6402] device sit0 left promiscuous mode [ 129.625388][ T6403] device sit0 entered promiscuous mode [ 130.357588][ T6423] syz.1.2142[6423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.357634][ T6423] syz.1.2142[6423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.476195][ T6423] syz.1.2142[6423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.536197][ T6423] syz.1.2142[6423] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.745372][ T6438] device sit0 left promiscuous mode [ 130.987867][ T6446] device sit0 entered promiscuous mode [ 131.641508][ T6476] device pim6reg1 entered promiscuous mode [ 132.758810][ T6503] device sit0 left promiscuous mode [ 132.902724][ T6503] device sit0 entered promiscuous mode [ 134.317009][ T6565] device sit0 left promiscuous mode [ 134.394675][ T6565] device sit0 entered promiscuous mode [ 136.259835][ T6656] syz.3.2232[6656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.259882][ T6656] syz.3.2232[6656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.240015][ T6698] syz.3.2248[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.254477][ T6698] syz.3.2248[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.305733][ T6698] syz.3.2248[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.335159][ T6698] syz.3.2248[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.399108][ T6713] geneve1: tun_chr_ioctl cmd 1074025698 [ 140.456676][ T6822] syz.2.2292[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.456722][ T6822] syz.2.2292[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.538231][ T6822] syz.2.2292[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.625720][ T6822] syz.2.2292[6822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.536340][ T6870] device sit0 left promiscuous mode [ 141.652246][ T6878] device sit0 left promiscuous mode [ 141.711046][ T6876] device sit0 entered promiscuous mode [ 142.347212][ T6878] device sit0 entered promiscuous mode [ 142.506699][ T6908] syz.4.2324[6908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.506768][ T6908] syz.4.2324[6908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.609768][ T6908] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 143.058979][ T6927] device sit0 left promiscuous mode [ 143.154445][ T6927] device sit0 entered promiscuous mode [ 144.401916][ T7003] device sit0 left promiscuous mode [ 145.440908][ T7055] device syzkaller0 entered promiscuous mode [ 145.486374][ T7056] device sit0 left promiscuous mode [ 145.631850][ T7048] device sit0 entered promiscuous mode [ 150.167720][ T7307] device sit0 entered promiscuous mode [ 151.025350][ T7337] device sit0 left promiscuous mode [ 151.124313][ T7337] device sit0 entered promiscuous mode [ 152.035762][ T7367] syz.3.2499[7367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.035813][ T7367] syz.3.2499[7367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.212470][ T7380] device sit0 left promiscuous mode [ 152.347531][ T7382] device sit0 left promiscuous mode [ 152.464982][ T7388] device sit0 entered promiscuous mode [ 152.908843][ T7392] device sit0 left promiscuous mode [ 152.922454][ T7393] device sit0 entered promiscuous mode [ 153.052235][ T7409] syz.2.2514[7409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.052281][ T7409] syz.2.2514[7409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.128246][ T7410] device syzkaller0 entered promiscuous mode [ 153.268838][ T7429] device sit0 left promiscuous mode [ 153.424963][ T7429] device sit0 entered promiscuous mode [ 153.564737][ T7452] syz.2.2531[7452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.564785][ T7452] syz.2.2531[7452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.954834][ T7468] device sit0 left promiscuous mode [ 154.131011][ T7470] device sit0 entered promiscuous mode [ 155.021254][ T7474] device syzkaller0 entered promiscuous mode [ 155.199190][ T7497] device syzkaller0 entered promiscuous mode [ 155.408208][ T7526] device sit0 left promiscuous mode [ 155.558729][ T7526] device sit0 entered promiscuous mode [ 156.499198][ T7562] device syzkaller0 entered promiscuous mode [ 156.745356][ T7583] device sit0 left promiscuous mode [ 156.851902][ T7583] device sit0 entered promiscuous mode [ 156.934086][ T7596] syz.2.2585[7596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.934126][ T7596] syz.2.2585[7596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.803411][ T7627] syz.0.2595[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.875543][ T7627] syz.0.2595[7627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.917548][ T7630] syz.2.2596[7630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.928923][ T7630] syz.2.2596[7630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.998265][ T7634] device sit0 left promiscuous mode [ 158.061676][ T7642] device sit0 left promiscuous mode [ 158.086685][ T7634] device sit0 entered promiscuous mode [ 158.486364][ T7664] syz.0.2608[7664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.486412][ T7664] syz.0.2608[7664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.849494][ T7642] device sit0 entered promiscuous mode [ 159.245419][ T7704] syz.1.2621[7704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.245471][ T7704] syz.1.2621[7704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.571133][ T7730] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 159.752580][ T7751] syz.4.2639[7751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.752635][ T7751] syz.4.2639[7751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.836404][ T7755] device sit0 left promiscuous mode [ 160.692962][ T7804] device syzkaller0 entered promiscuous mode [ 162.292815][ T7901] device syzkaller0 entered promiscuous mode [ 163.050573][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.096494][ T7941] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.139080][ T7941] device bridge_slave_0 entered promiscuous mode [ 163.186100][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.192996][ T7941] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.200676][ T7941] device bridge_slave_1 entered promiscuous mode [ 163.228628][ T24] audit: type=1400 audit(1719334871.709:147): avc: denied { create } for pid=7941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.233019][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.255777][ T7941] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.262854][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.269671][ T7941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.277279][ T24] audit: type=1400 audit(1719334871.709:148): avc: denied { write } for pid=7941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.297594][ T4140] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.305871][ T24] audit: type=1400 audit(1719334871.709:149): avc: denied { read } for pid=7941 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.327485][ T4140] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.392358][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.400565][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.415613][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.423818][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.446412][ T5228] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.453271][ T5228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.469031][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.481319][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.490063][ T5228] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.496910][ T5228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.504197][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.512178][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.529626][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.546656][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.592742][ T7941] device veth0_vlan entered promiscuous mode [ 163.654508][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.671110][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.685255][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.693261][ T5225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.742483][ T7941] device veth1_macvtap entered promiscuous mode [ 163.773964][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.807190][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.815096][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.823464][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.831716][ T5228] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.854746][ T5218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.867398][ T5218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.876719][ T5218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.897046][ T5218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.572958][ T8035] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.664136][ T8035] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.802418][ T8035] device bridge_slave_0 entered promiscuous mode [ 164.984282][ T8035] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.077675][ T8035] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.120064][ T8035] device bridge_slave_1 entered promiscuous mode [ 165.372963][ T8035] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.379821][ T8035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.386914][ T8035] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.393699][ T8035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.496039][ T1975] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.503542][ T1975] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.530512][ T9] device veth0_vlan left promiscuous mode [ 165.697889][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.705114][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.757615][ T2526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.766497][ T2526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.774553][ T2526] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.781396][ T2526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.788772][ T2526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.797852][ T2526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.806386][ T2526] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.813220][ T2526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.829145][ T8035] device veth0_vlan entered promiscuous mode [ 165.840669][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.849075][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.857252][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.865245][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.898097][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.913553][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.931014][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.938837][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.946989][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.954159][ T4140] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.007151][ T8035] device veth1_macvtap entered promiscuous mode [ 166.025855][ T8120] device pim6reg1 entered promiscuous mode [ 166.032879][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.041068][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.050152][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.058062][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.066237][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.075733][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.083731][ T4161] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.183559][ T8125] device sit0 entered promiscuous mode [ 166.686436][ T8136] device sit0 left promiscuous mode [ 167.856439][ T8205] bpf_get_probe_write_proto: 2 callbacks suppressed [ 167.856448][ T8205] syz.2.2810[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.026115][ T8205] syz.2.2810[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.195894][ T8205] syz.2.2810[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.315478][ T8205] syz.2.2810[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.493784][ T9] device bridge_slave_1 left promiscuous mode [ 168.634649][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.681215][ T9] device bridge_slave_0 left promiscuous mode [ 168.708195][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.709882][ T8224] syz.0.2815[8224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.715078][ T8224] syz.0.2815[8224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.715410][ T8223] syz.0.2815[8223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.745210][ T9] device veth1_macvtap left promiscuous mode [ 168.762862][ T8223] syz.0.2815[8223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.769225][ T9] device veth0_vlan left promiscuous mode [ 168.928935][ T8247] device sit0 entered promiscuous mode [ 170.032887][ T8270] syz.2.2834 uses obsolete (PF_INET,SOCK_PACKET) [ 170.238702][ T8292] device sit0 left promiscuous mode [ 170.477538][ T8292] device sit0 entered promiscuous mode [ 170.643494][ T8309] syz.1.2847[8309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.643534][ T8309] syz.1.2847[8309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.445263][ T8463] ¯Ê®¸}p: renamed from pim6reg1 [ 175.507921][ T8590] device sit0 left promiscuous mode [ 175.596343][ T8593] device sit0 entered promiscuous mode [ 176.680118][ T8670] device sit0 left promiscuous mode [ 176.716646][ T8670] device sit0 entered promiscuous mode [ 177.752490][ T8741] device sit0 entered promiscuous mode [ 178.185160][ T8800] bpf_get_probe_write_proto: 2 callbacks suppressed [ 178.185167][ T8800] syz.2.3025[8800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.193269][ T8800] syz.2.3025[8800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.248904][ T8803] device sit0 left promiscuous mode [ 178.279775][ T8818] device pim6reg1 entered promiscuous mode [ 178.312966][ T8803] device sit0 entered promiscuous mode [ 179.102213][ T8853] syz.2.3041[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.102256][ T8853] syz.2.3041[8853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.283133][ T8939] device pim6reg1 entered promiscuous mode [ 179.395598][ T24] audit: type=1400 audit(1719334887.879:150): avc: denied { attach_queue } for pid=8959 comm="syz.3.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 179.509185][ T8977] syz.1.3075[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.509224][ T8977] syz.1.3075[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.521336][ T8977] syz.1.3075[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.536487][ T8977] syz.1.3075[8977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.570046][ T8979] device syzkaller0 entered promiscuous mode [ 179.632689][ T8987] device syzkaller0 entered promiscuous mode [ 181.056682][ T9095] device veth0_vlan left promiscuous mode [ 181.062858][ T9095] device veth0_vlan entered promiscuous mode [ 182.287845][ T9141] syz.0.3138[9141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.287887][ T9141] syz.0.3138[9141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.836961][ T9238] : renamed from bond_slave_0 [ 186.882803][ T24] audit: type=1400 audit(1719334895.359:151): avc: denied { create } for pid=9245 comm="syz.3.3172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 188.469235][ T9310] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 190.574980][ T9410] syz.0.3235[9410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.575023][ T9410] syz.0.3235[9410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.137707][ T9448] syz.3.3250[9448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.182936][ T9448] syz.3.3250[9448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.725503][ T9477] device pim6reg1 entered promiscuous mode [ 192.048612][ T9514] syz.0.3273[9514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.048652][ T9514] syz.0.3273[9514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.070991][ T9563] syz.0.3286[9563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.085688][ T9563] syz.0.3286[9563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.851351][ T9722] Â: renamed from pim6reg1 [ 197.924613][ T9881] syz.2.3390[9881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.924655][ T9881] syz.2.3390[9881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.085109][ T9890] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 203.474485][T10046] device sit0 left promiscuous mode [ 203.588032][T10046] device sit0 entered promiscuous mode [ 204.585696][T10109] device syzkaller0 entered promiscuous mode [ 207.164581][T10185] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.171473][T10185] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.178640][T10185] device bridge_slave_0 entered promiscuous mode [ 207.185280][T10185] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.192490][T10185] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.201250][T10185] device bridge_slave_1 entered promiscuous mode [ 207.257910][T10185] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.264739][T10185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.271865][T10185] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.278636][T10185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.645581][ T5234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.652908][ T5234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.661241][ T5234] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.687819][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.696480][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.704684][ T5220] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.711524][ T5220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.719295][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.727594][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.735708][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.745263][ T5220] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.869767][T10185] device veth0_vlan entered promiscuous mode [ 207.876526][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.884817][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.893482][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 207.901306][ T5237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.932985][T10185] device veth1_macvtap entered promiscuous mode [ 207.974624][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.984095][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.992094][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.000523][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.013037][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.183694][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.202741][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.223336][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.236471][ T5230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.532186][T10227] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.548276][T10227] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.555513][T10227] device bridge_slave_0 entered promiscuous mode [ 208.562219][T10227] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.569107][T10227] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.576237][T10227] device bridge_slave_1 entered promiscuous mode [ 208.910148][T10227] device veth0_vlan entered promiscuous mode [ 208.917001][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.925108][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.050935][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.122843][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.180200][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.243053][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.292123][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.320460][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.342419][ T8897] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.349265][ T8897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.381294][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.395538][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.411780][ T8897] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.418631][ T8897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.439378][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.458151][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.466884][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.474910][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.493065][T10227] device veth1_macvtap entered promiscuous mode [ 209.530874][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.544727][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.565927][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.625925][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.633962][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.654452][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.731952][T10269] device sit0 left promiscuous mode [ 209.808789][T10270] device sit0 entered promiscuous mode [ 211.053956][T10307] device syzkaller0 entered promiscuous mode [ 211.245720][T10322] device sit0 entered promiscuous mode [ 211.989173][T10330] device sit0 left promiscuous mode [ 212.000892][T10331] device sit0 entered promiscuous mode [ 212.185747][T10333] device sit0 left promiscuous mode [ 212.197412][T10335] device sit0 entered promiscuous mode [ 212.331425][T10342] device veth1_macvtap left promiscuous mode [ 212.399815][ T390] device bridge_slave_1 left promiscuous mode [ 212.421260][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.466766][ T390] device bridge_slave_0 left promiscuous mode [ 212.473145][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.484831][ T390] device bridge_slave_1 left promiscuous mode [ 212.491299][ T390] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.559588][ T390] device bridge_slave_0 left promiscuous mode [ 212.625479][ T390] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.729654][ T390] device veth1_macvtap left promiscuous mode [ 212.775625][ T390] device veth0_vlan left promiscuous mode [ 212.895788][ T390] device veth1_macvtap left promiscuous mode [ 213.448733][T10377] device sit0 left promiscuous mode [ 213.457394][T10379] device sit0 entered promiscuous mode [ 213.484791][T10403] device syzkaller0 entered promiscuous mode [ 213.505172][T10414] device syzkaller0 entered promiscuous mode [ 213.627560][ T24] audit: type=1400 audit(1719334922.109:152): avc: denied { create } for pid=10435 comm="syz.1.3559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 213.765181][T10442] device sit0 left promiscuous mode [ 213.810002][T10442] device sit0 entered promiscuous mode [ 213.854117][T10454] syz.3.3567[10454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.854158][T10454] syz.3.3567[10454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.933042][T10445] device sit0 left promiscuous mode [ 213.960399][T10455] device sit0 entered promiscuous mode [ 214.125836][T10472] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 214.254810][T10493] syz.4.3583[10493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.254871][T10493] syz.4.3583[10493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.295972][T10493] syz.4.3583[10493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.307223][T10491] device sit0 left promiscuous mode [ 214.309626][T10493] syz.4.3583[10493] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.376716][T10491] device sit0 entered promiscuous mode [ 214.452114][T10488] general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN [ 214.463636][T10488] KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] [ 214.471884][T10488] CPU: 0 PID: 10488 Comm: syz.0.3580 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 214.483077][T10488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 214.492987][T10488] RIP: 0010:inherit_task_group+0x573/0x670 [ 214.498625][T10488] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 a8 00 00 00 8b 1b 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a8 00 00 00 41 89 1f 45 31 ff 44 89 f8 [ 214.518054][T10488] RSP: 0018:ffffc90003807908 EFLAGS: 00010207 [ 214.523957][T10488] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88810b87a780 [ 214.531775][T10488] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811f581890 [ 214.539581][T10488] RBP: ffffc90003807970 R08: dffffc0000000000 R09: ffffed103ee0ae72 [ 214.547392][T10488] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90003807a20 [ 214.555201][T10488] R13: dffffc0000000000 R14: ffff88811f581810 R15: 000000000000008c [ 214.563015][T10488] FS: 00005555571bf500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 214.571780][T10488] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 214.578201][T10488] CR2: 00007faa5c89dd58 CR3: 000000011c7cf000 CR4: 00000000003506b0 [ 214.586025][T10488] DR0: 0000000020000240 DR1: 0000000020000300 DR2: 0000000000000000 [ 214.593824][T10488] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 214.601632][T10488] Call Trace: [ 214.604769][T10488] ? __die_body+0x62/0xb0 [ 214.608929][T10488] ? die_addr+0x9f/0xd0 [ 214.612923][T10488] ? exc_general_protection+0x3ff/0x490 [ 214.618310][T10488] ? asm_exc_general_protection+0x1e/0x30 [ 214.623861][T10488] ? inherit_task_group+0x573/0x670 [ 214.628889][T10488] ? inherit_task_group+0x52c/0x670 [ 214.633931][T10488] perf_event_init_task+0x331/0x770 [ 214.638961][T10488] ? memset+0x35/0x40 [ 214.642779][T10488] ? perf_event_attrs+0x30/0x30 [ 214.647468][T10488] ? sched_fork+0x162/0x7a0 [ 214.651811][T10488] copy_process+0x1015/0x3340 [ 214.656322][T10488] ? lru_cache_add+0x15e/0x380 [ 214.660922][T10488] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 214.665864][T10488] ? copy_clone_args_from_user+0x744/0x830 [ 214.671510][T10488] kernel_clone+0x21e/0x9e0 [ 214.675845][T10488] ? __delayed_free_task+0x20/0x20 [ 214.680795][T10488] ? create_io_thread+0x1e0/0x1e0 [ 214.685656][T10488] ? recalc_sigpending+0x1a5/0x230 [ 214.690605][T10488] __x64_sys_clone3+0x376/0x3a0 [ 214.695291][T10488] ? __ia32_sys_clone+0x290/0x290 [ 214.700161][T10488] ? debug_smp_processor_id+0x17/0x20 [ 214.705358][T10488] do_syscall_64+0x34/0x70 [ 214.709609][T10488] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 214.715335][T10488] RIP: 0033:0x7faa5d8b4e99 [ 214.719591][T10488] Code: f7 06 00 48 8d 3d 4c f7 06 00 e8 42 26 f6 ff 66 90 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 [ 214.739028][T10488] RSP: 002b:00007fff639b42e8 EFLAGS: 00000202 ORIG_RAX: 00000000000001b3 [ 214.747362][T10488] RAX: ffffffffffffffda RBX: 00007faa5d837570 RCX: 00007faa5d8b4e99 [ 214.755173][T10488] RDX: 00007faa5d837570 RSI: 0000000000000058 RDI: 00007fff639b4330 [ 214.762984][T10488] RBP: 00007faa5c89d6c0 R08: 00007faa5c89d6c0 R09: 00007fff639b4417 [ 214.770796][T10488] R10: 0000000000000008 R11: 0000000000000202 R12: ffffffffffffffa8 [ 214.778605][T10488] R13: 000000000000006e R14: 00007fff639b4330 R15: 00007fff639b4418 [ 214.786425][T10488] Modules linked in: [ 214.859493][T10488] ---[ end trace 7196ad2fe570eb4e ]--- [ 214.875438][T10488] RIP: 0010:inherit_task_group+0x573/0x670 [ 214.882204][T10488] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 a8 00 00 00 8b 1b 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a8 00 00 00 41 89 1f 45 31 ff 44 89 f8 [ 214.926880][T10488] RSP: 0018:ffffc90003807908 EFLAGS: 00010207 [ 214.932833][T10488] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88810b87a780 [ 214.940859][T10488] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88811f581890 [ 214.948822][T10488] RBP: ffffc90003807970 R08: dffffc0000000000 R09: ffffed103ee0ae72 [ 214.957675][T10488] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90003807a20 [ 214.965642][T10488] R13: dffffc0000000000 R14: ffff88811f581810 R15: 000000000000008c [ 214.973493][T10488] FS: 00005555571bf500(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 214.982550][T10488] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 214.989113][T10488] CR2: 00007fbc2041f178 CR3: 000000011c7cf000 CR4: 00000000003506b0 [ 215.000383][T10488] DR0: 0000000020000240 DR1: 0000000020000300 DR2: 0000000000000000 [ 215.014106][T10488] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 215.023628][T10488] Kernel panic - not syncing: Fatal exception [ 215.029684][T10488] Kernel Offset: disabled [ 215.033799][T10488] Rebooting in 86400 seconds..