last executing test programs:

17.157474683s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

14.118963994s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

10.927097788s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

8.258866701s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

4.90861351s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

3.298123809s ago: executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfe, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r0, 0x2e, 0x0, 0x40, &(0x7f00000001c0)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], <r2=>0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1c, 0x4, 0x0, @prog_id=r1, r2}, 0x20)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x16}, 0x48)
r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000))
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3)

2.076674898s ago: executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r2, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0], ""/16, <r3=>0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x67, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x0, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000c40)={r2, 0x20, &(0x7f0000000ac0)={&(0x7f0000000a40)=""/23, 0x17, <r4=>0x0, &(0x7f0000000a80)=""/47, 0x2f}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x6, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xed63}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0xffff, 0xfb, &(0x7f0000000580)=""/251, 0x41000, 0x40, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000940)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x12, 0x4, 0x1ff, 0x5}, 0x10, r4, r0, 0x5, &(0x7f0000000c80)=[r1], &(0x7f0000000cc0)=[{0x3, 0x3, 0xe, 0x5}, {0x4, 0x2, 0xe, 0x5}, {0x0, 0x5, 0x8, 0x5}, {0x2, 0x2, 0xb, 0x5}, {0x2, 0x4, 0x8, 0xb}], 0x10, 0x7fffffff}, 0x90)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='ext4_es_remove_extent\x00', r6}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00'}, 0x10)
unlink(&(0x7f0000000000)='./cgroup\x00')
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d)
r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x10002, 0x0, 0x1}, 0x48)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r9}, 0x48)
r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r11}, 0x10)
bpf$MAP_UPDATE_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r10}, 0x38)

2.038305955s ago: executing program 4:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_da_reserve_space\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000240)=0x100000, 0x12)

1.983209103s ago: executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfe, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r0, 0x2e, 0x0, 0x40, &(0x7f00000001c0)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], <r2=>0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1c, 0x4, 0x0, @prog_id=r1, r2}, 0x20)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x16}, 0x48)
r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000))
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3)

1.783450124s ago: executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001d40)={&(0x7f00000009c0)='sched_switch\x00', r0}, 0x10)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48)
bpf$PROG_LOAD(0x21, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)

1.67667157s ago: executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d90000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='percpu_alloc_percpu\x00', r0}, 0x10)
r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, <r2=>0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0x6e, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000640)}}, 0x10)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x9, [@var={0x5, 0x0, 0x0, 0xe, 0x3, 0x1}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x60, 0x0, 0x20}, @ptr={0xe, 0x0, 0x0, 0x2, 0x3}, @typedef={0x1}]}, {0x0, [0x2e, 0x0, 0x0, 0x1e, 0x7f, 0x0, 0x30]}}, &(0x7f0000000840)=""/70, 0x59, 0x46, 0x1, 0x10001}, 0x20)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x7, <r4=>0x0}, 0x8)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x2, 0x1a, &(0x7f00000009c0)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @exit, @ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000ac0)='syzkaller\x00', 0x800, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x5, 0x6, 0xe0, 0x5}, 0x10, 0x0, r1, 0x6, &(0x7f0000000b80)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, r0, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000bc0)=[{0x2, 0x4, 0x2, 0x1}, {0x2, 0x2, 0x2, 0x2}, {0x1, 0x1, 0x1, 0xdcb36d461eb0338b}, {0x0, 0x3, 0xe, 0x5}, {0x4, 0x5, 0x0, 0x4}, {0x5, 0x5, 0xa, 0xa}], 0x10, 0x3}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={<r6=>0xffffffffffffffff})
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [<r7=>0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef)
r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r9, 0x0, 0xda00)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d80)={{0xffffffffffffffff, <r10=>0xffffffffffffffff}, &(0x7f0000000d00), &(0x7f0000000d40)='%pB    \x00'}, 0x20)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_pid(r11, &(0x7f0000000980), 0x45000)
r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x9eb, 0x8}, 0xc)
ioctl$TUNSETTXFILTER(r11, 0x400454d1, &(0x7f0000000f80)={0x1, 0x2, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]})
bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x3d, 0x0, &(0x7f0000000080), &(0x7f00000001c0)='GPL\x00', 0x0, 0xeb, &(0x7f00000003c0)=""/235, 0x0, 0x48, '\x00', r2, 0xd, r3, 0x8, &(0x7f0000000900)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x6, 0x2, 0x17d}, 0x10, r4, r5, 0x9, &(0x7f0000000dc0)=[r7, r12, r9, r10, r11], &(0x7f0000000e00)=[{0x4, 0x2, 0x6, 0xb}, {0x4, 0x5, 0x10, 0x9}, {0x4, 0x4, 0x8, 0x3}, {0x0, 0x2, 0x8, 0x5}, {0x2, 0x1, 0x6, 0xd9a671e54e8c1f25}, {0x4, 0x5, 0x10, 0x9}, {0x1, 0x1, 0x7}, {0x4, 0x4, 0x5, 0x5}, {0x3, 0x4, 0x6, 0xb}], 0x10, 0x4}, 0x90)

1.537433492s ago: executing program 0:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x5, 0x7fe2, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001a00)={{r1}, &(0x7f0000001980), &(0x7f00000019c0)='%pB    \x00'}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r3}, 0x10)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000))
r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400ea00b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10)

1.377785717s ago: executing program 1:
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x23, &(0x7f0000000040)={0x0, r1}, 0x10)

1.339610603s ago: executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r2, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0], ""/16, <r3=>0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0], 0x0, 0x67, &(0x7f0000000800)=[{}], 0x8, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x0, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000c40)={r2, 0x20, &(0x7f0000000ac0)={&(0x7f0000000a40)=""/23, 0x17, <r4=>0x0, &(0x7f0000000a80)=""/47, 0x2f}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x6, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xed63}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='GPL\x00', 0xffff, 0xfb, &(0x7f0000000580)=""/251, 0x41000, 0x40, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000940)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x12, 0x4, 0x1ff, 0x5}, 0x10, r4, r0, 0x5, &(0x7f0000000c80)=[r1], &(0x7f0000000cc0)=[{0x3, 0x3, 0xe, 0x5}, {0x4, 0x2, 0xe, 0x5}, {0x0, 0x5, 0x8, 0x5}, {0x2, 0x2, 0xb, 0x5}, {0x2, 0x4, 0x8, 0xb}], 0x10, 0x7fffffff}, 0x90)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='ext4_es_remove_extent\x00', r6}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00'}, 0x10)
unlink(&(0x7f0000000000)='./cgroup\x00')
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d)
r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x8, 0x10002, 0x0, 0x1}, 0x48)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r9}, 0x48)
r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r11}, 0x10)
bpf$MAP_UPDATE_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2, r10}, 0x38)

1.326589235s ago: executing program 1:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4)
bpf$LINK_DETACH(0x22, &(0x7f0000000180)=r3, 0x4)
r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000500)=@bpf_tracing={0x1a, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x400}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x3a, &(0x7f0000000340)=""/58, 0x41000, 0x20, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x5, 0x6, 0xac}, 0x10, 0x28205, r2, 0x1, &(0x7f0000000400)=[r0, r0, r0, r0], &(0x7f00000004c0)=[{0x5, 0x4, 0xb, 0x3}], 0x10, 0x5}, 0x90)
bpf$PROG_BIND_MAP(0x23, &(0x7f00000005c0)={r4, r0}, 0xc)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r2}, 0x10)
mkdir(&(0x7f0000000240)='./file0\x00', 0x0)

1.298039429s ago: executing program 1:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfd, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='qdisc_create\x00', r3}, 0x28)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8930, &(0x7f0000000080))

1.286188131s ago: executing program 0:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180))
bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r3}, 0x10)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r4}, 0x10)
write$cgroup_pid(r0, &(0x7f0000000980), 0x12)

1.242392748s ago: executing program 0:
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf35d, 0x0, 0x0, 0x0, 0x9}, [@map_idx_val={0x18, 0xb, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}]}, 0x0, 0x3, 0xe, &(0x7f0000000340)=""/14, 0x41100, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x0, 0x40, 0x40}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000900)=[{0x5, 0x5, 0x6, 0x9}, {0x2, 0x2, 0xc}, {0x4, 0x3, 0x5, 0x8}, {0x0, 0x4, 0x6, 0xa}, {0x3, 0x0, 0x1, 0xc}, {0x0, 0x2, 0x0, 0x3}], 0x10, 0xfffffbff}, 0x90)
close(0xffffffffffffffff)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='skb_copy_datagram_iovec\x00'}, 0x70)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={<r3=>0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x40)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10)
sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)

1.050673527s ago: executing program 3:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080))

1.023919132s ago: executing program 1:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10)
unlink(0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRES32=r4, @ANYRES8=r1, @ANYBLOB="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", @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r0], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r6}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48)

818.031774ms ago: executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700)
write$cgroup_int(r3, &(0x7f0000000200), 0x43400)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000880)='ext4_evict_inode\x00', r5}, 0x10)
socketpair(0x10, 0x2, 0xffffffff, &(0x7f0000000180))
unlink(&(0x7f0000000140)='./cgroup\x00')

805.597535ms ago: executing program 2:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x400000)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2009)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008040000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$tipc(0x1e, 0x2, 0x2000000, &(0x7f0000000240)={<r2=>0xffffffffffffffff})
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
close(r2)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x7, 0x4, 0x18, 0xa042}, 0x48)

717.013559ms ago: executing program 3:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfe, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r0, 0x2e, 0x0, 0x40, &(0x7f00000001c0)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], <r2=>0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1c, 0x4, 0x0, @prog_id=r1, r2}, 0x20)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x16}, 0x48)
r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000))
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3)

712.90501ms ago: executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb01001800000000000000780000007800000002000000050000000000000800000000000000000600000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000c010000000000000000000009000000000000000000000009000000000029528f1c576304f86cbb3d0000"], 0x0, 0x92}, 0x20)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040))
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180)=0x9)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_int(r4, &(0x7f0000000000), 0xffe000)
write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[], 0x32600)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00)
ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040))
r6 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0xb, &(0x7f0000000000)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7)
r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000002000000000000000008500000061000000850000000700000095"], &(0x7f0000000200)='GPL\x00'}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x27, 0xe, 0x0, &(0x7f0000000100)="f80204000000000000007f5b88a8", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}, {}, {0x85, 0x0, 0x0, 0xba}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x90)

414.913926ms ago: executing program 2:
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x10)
openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'\x00', 0x41})
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x7, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)

293.238825ms ago: executing program 0:
r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x19b7, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x90)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)
close(r1)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20)
sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{0x0}], 0x1}, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000004b000e000000000002200018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000008000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_ext_handle_unwritten_extents\x00', r7}, 0x10)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cpuacct.usage_sys\x00', 0x275a, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000300)={[{0x0, 'cpu'}]}, 0x5)
ioctl$SIOCSIFHWADDR(r8, 0xc020660b, &(0x7f0000000540)={'\x00', @link_local={0x2, 0x80, 0xc2, 0x5}})

135.977439ms ago: executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x800, 0x4, 0x80000000, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90)
openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000020000000000008500000084000000b7000000000000009500000000000000e83e8dc163390e73b03843586f475512ca30ab79a337ef8a9ff4957ea07fe9e90ee1b6250b1804b56e010c483ae738393b9ec874a5c442be929d68e5da0303e9f4ff"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x9d)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="8721000000400c006ab8923675ca00000c000000060000000500"], &(0x7f0000000200)=""/144, 0x2a, 0x90, 0x1}, 0x20)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000002000000000000fcffffff73013400000000009500000000fbffffff2477168056731b2545d3e3b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800001d4c088400000014000000bb7fca2277bbfeff00000002"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10)
r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast})
close(r5)

129.83201ms ago: executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10)
ioctl$TUNSETOFFLOAD(r0, 0x40086607, 0x20001412)

101.448355ms ago: executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
close(0x3)
bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x4, 0x4, 0x7f, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000010000e1850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4)
sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x800, 0x1ff, 0xff, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10)
r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0)
ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r9=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast})
close(r8)

0s ago: executing program 1:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfe, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, <r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@map=r0, 0x2e, 0x0, 0x40, &(0x7f00000001c0)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], <r2=>0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1c, 0x4, 0x0, @prog_id=r1, r2}, 0x20)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x16}, 0x48)
r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90)
bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r6, 0x5}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000))
perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3)

kernel console output (not intermixed with test programs):

[    3.989028][  T101] udevd[101]: starting version 3.2.11
[    4.048324][  T102] udevd[102]: starting eudev-3.2.11
[    5.075336][  T148] rm (148) used greatest stack depth: 22704 bytes left
[   13.267556][   T28] kauditd_printk_skb: 50 callbacks suppressed
[   13.267572][   T28] audit: type=1400 audit(1718977195.433:61): avc:  denied  { transition } for  pid=226 comm="sshd" path="/bin/sh" dev="sda1" ino=89 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   13.271951][   T28] audit: type=1400 audit(1718977195.433:62): avc:  denied  { noatsecure } for  pid=226 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   13.274905][   T28] audit: type=1400 audit(1718977195.433:63): avc:  denied  { write } for  pid=226 comm="sh" path="pipe:[11968]" dev="pipefs" ino=11968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1
[   13.278053][   T28] audit: type=1400 audit(1718977195.433:64): avc:  denied  { rlimitinh } for  pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   13.280918][   T28] audit: type=1400 audit(1718977195.433:65): avc:  denied  { siginh } for  pid=226 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   14.522054][  T230] sftp-server (230) used greatest stack depth: 22448 bytes left
Warning: Permanently added '10.128.0.69' (ED25519) to the list of known hosts.
2024/06/21 13:40:02 fuzzer started
2024/06/21 13:40:02 dialing manager at 10.128.0.163:30014
[   20.649795][   T28] audit: type=1400 audit(1718977202.813:66): avc:  denied  { node_bind } for  pid=284 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[   20.670343][   T28] audit: type=1400 audit(1718977202.813:67): avc:  denied  { name_bind } for  pid=284 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   20.697781][   T28] audit: type=1400 audit(1718977202.863:68): avc:  denied  { mounton } for  pid=294 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   20.726152][  T293] cgroup: Unknown subsys name 'net'
[   20.732135][   T28] audit: type=1400 audit(1718977202.863:69): avc:  denied  { mount } for  pid=294 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   20.732269][  T293] cgroup: Unknown subsys name 'devices'
[   20.761359][   T28] audit: type=1400 audit(1718977202.863:70): avc:  denied  { setattr } for  pid=295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   20.784944][   T28] audit: type=1400 audit(1718977202.883:71): avc:  denied  { mounton } for  pid=293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   20.791978][  T300] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   20.808092][   T28] audit: type=1400 audit(1718977202.883:72): avc:  denied  { mount } for  pid=293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   20.838392][   T28] audit: type=1400 audit(1718977202.893:73): avc:  denied  { unmount } for  pid=293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   20.858150][   T28] audit: type=1400 audit(1718977202.983:74): avc:  denied  { relabelto } for  pid=300 comm="mkswap" name="swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   20.883546][   T28] audit: type=1400 audit(1718977202.983:75): avc:  denied  { write } for  pid=300 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   20.887439][  T298] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   20.969068][  T293] cgroup: Unknown subsys name 'hugetlb'
[   20.974520][  T293] cgroup: Unknown subsys name 'rlimit'
2024/06/21 13:40:03 starting 5 executor processes
[   21.931494][  T310] bridge0: port 1(bridge_slave_0) entered blocking state
[   21.938400][  T310] bridge0: port 1(bridge_slave_0) entered disabled state
[   21.945495][  T310] device bridge_slave_0 entered promiscuous mode
[   21.968708][  T310] bridge0: port 2(bridge_slave_1) entered blocking state
[   21.975667][  T310] bridge0: port 2(bridge_slave_1) entered disabled state
[   21.982905][  T310] device bridge_slave_1 entered promiscuous mode
[   22.021291][  T311] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.028189][  T311] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.035311][  T311] device bridge_slave_0 entered promiscuous mode
[   22.048851][  T311] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.055708][  T311] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.063289][  T311] device bridge_slave_1 entered promiscuous mode
[   22.154726][  T315] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.161626][  T315] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.169198][  T315] device bridge_slave_0 entered promiscuous mode
[   22.191074][  T315] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.198074][  T315] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.205154][  T315] device bridge_slave_1 entered promiscuous mode
[   22.241277][  T317] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.248162][  T317] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.255402][  T317] device bridge_slave_0 entered promiscuous mode
[   22.263537][  T317] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.270425][  T317] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.277698][  T317] device bridge_slave_1 entered promiscuous mode
[   22.304134][  T316] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.311083][  T316] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.318314][  T316] device bridge_slave_0 entered promiscuous mode
[   22.324947][  T316] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.331867][  T316] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.339140][  T316] device bridge_slave_1 entered promiscuous mode
[   22.418457][  T311] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.425307][  T311] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.432441][  T311] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.439203][  T311] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.461699][  T310] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.468558][  T310] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.475639][  T310] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.482447][  T310] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.547677][  T315] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.554533][  T315] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.561665][  T315] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.568437][  T315] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.589571][   T65] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.596741][   T65] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.603720][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.610999][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.619163][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.628521][   T65] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.635508][   T65] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.642663][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.650421][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.685451][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.699329][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   22.707406][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   22.714547][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.721803][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.729722][    T6] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.736531][    T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.749107][  T311] device veth0_vlan entered promiscuous mode
[   22.758384][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   22.766029][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   22.773287][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   22.780583][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.788563][    T6] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.795380][    T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.802556][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.810474][    T6] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.817311][    T6] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.841627][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.849547][    T6] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.856264][    T6] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.873644][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.880832][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.888821][    T6] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.895649][    T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.910065][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.917711][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   22.929360][  T311] device veth1_macvtap entered promiscuous mode
[   22.938608][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.946357][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.954230][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   22.962157][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   22.969961][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.977753][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   22.985748][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.993723][   T40] bridge0: port 2(bridge_slave_1) entered blocking state
[   23.000570][   T40] bridge0: port 2(bridge_slave_1) entered forwarding state
[   23.007790][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.015596][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.035792][  T316] device veth0_vlan entered promiscuous mode
[   23.052910][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   23.061268][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   23.069358][    T6] bridge0: port 1(bridge_slave_0) entered blocking state
[   23.076309][    T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[   23.083591][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   23.091742][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   23.100543][    T6] bridge0: port 2(bridge_slave_1) entered blocking state
[   23.107400][    T6] bridge0: port 2(bridge_slave_1) entered forwarding state
[   23.114625][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.122619][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.130320][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.138204][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.145898][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.154072][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.162145][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.169850][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.177567][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.185566][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.193826][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.201835][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.210014][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.217844][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.225519][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.233513][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.244776][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   23.252424][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.259651][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.273028][  T316] device veth1_macvtap entered promiscuous mode
[   23.286761][  T317] device veth0_vlan entered promiscuous mode
[   23.298612][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.306709][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.315264][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.323523][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.331397][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.339128][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.347165][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.365188][  T315] device veth0_vlan entered promiscuous mode
[   23.378892][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.386891][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.399333][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.411519][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.419720][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.427826][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.435434][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.443282][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.451958][  T317] device veth1_macvtap entered promiscuous mode
[   23.461898][  T310] device veth0_vlan entered promiscuous mode
[   23.473757][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.481042][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.488444][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.496212][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.512785][  T315] device veth1_macvtap entered promiscuous mode
[   23.529051][  T310] device veth1_macvtap entered promiscuous mode
[   23.544439][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.547213][    C1] hrtimer: interrupt took 27245 ns
[   23.551864][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.564575][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.572689][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.580686][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.588957][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.597099][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.605415][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.614041][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.622220][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.630356][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   23.637949][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.646028][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.654361][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.662563][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.713165][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.738389][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.746545][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.754660][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.762896][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.771031][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.779217][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.787526][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   26.415878][   T28] kauditd_printk_skb: 33 callbacks suppressed
[   26.415894][   T28] audit: type=1400 audit(1718977208.573:109): avc:  denied  { create } for  pid=410 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1
[   26.720881][   T28] audit: type=1400 audit(1718977208.883:110): avc:  denied  { cpu } for  pid=417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   26.924328][   T28] audit: type=1400 audit(1718977208.953:111): avc:  denied  { write } for  pid=417 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   26.992529][  T432] bridge0: port 2(bridge_slave_1) entered disabled state
[   27.386180][  T423] syz-executor.4 (423) used greatest stack depth: 22232 bytes left
[   29.175568][  T466] syz-executor.2 (466) used greatest stack depth: 21528 bytes left
[   38.217390][  T754] syz-executor.3 (754) used greatest stack depth: 20520 bytes left
[   78.385144][ T1902] bridge0: port 2(bridge_slave_1) entered disabled state
[   80.066976][ T1939] bridge0: port 2(bridge_slave_1) entered disabled state
[   93.192983][ T2219] syz-executor.4[2219] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   93.193054][ T2219] syz-executor.4[2219] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   93.368512][   T28] audit: type=1400 audit(1718977275.533:112): avc:  denied  { relabelfrom } for  pid=2228 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[   93.400328][   T28] audit: type=1400 audit(1718977275.533:113): avc:  denied  { relabelto } for  pid=2228 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[   94.148792][ T2271] Illegal XDP return value 4294967274 on prog  (id 889) dev N/A, expect packet loss!
[   97.072474][   T28] audit: type=1400 audit(1718977279.233:114): avc:  denied  { create } for  pid=2387 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[   97.443285][   T28] audit: type=1400 audit(1718977279.603:115): avc:  denied  { create } for  pid=2416 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1
[   97.617486][ T2424] syz-executor.3[2424] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   97.617563][ T2424] syz-executor.3[2424] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   97.667865][ T2424] syz-executor.3[2424] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   97.711564][ T2424] syz-executor.3[2424] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   97.856373][ T2443] bridge0: port 3(team_slave_1) entered blocking state
[   97.940754][ T2443] bridge0: port 3(team_slave_1) entered disabled state
[   97.997863][ T2443] device team_slave_1 entered promiscuous mode
[   98.208655][ T2467] device veth0_vlan left promiscuous mode
[   98.220570][ T2467] device veth0_vlan entered promiscuous mode
[   98.251257][   T28] audit: type=1400 audit(1718977280.413:116): avc:  denied  { create } for  pid=2466 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[   98.324923][   T28] audit: type=1400 audit(1718977280.433:117): avc:  denied  { write } for  pid=2475 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   98.372019][ T2483] device macsec0 entered promiscuous mode
[   99.473857][ T2554] syz-executor.2[2554] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   99.473925][ T2554] syz-executor.2[2554] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  100.624066][ T2606] device pim6reg1 entered promiscuous mode
[  101.613931][ T2649] syz-executor.4[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  101.614011][ T2649] syz-executor.4[2649] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.630060][ T2678] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  104.513181][   T28] audit: type=1400 audit(1718977286.673:118): avc:  denied  { create } for  pid=2746 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  104.780420][ T2756] syz-executor.3[2756] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  104.780492][ T2756] syz-executor.3[2756] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  104.986777][ T2765] device pim6reg1 entered promiscuous mode
[  105.079103][   T28] audit: type=1400 audit(1718977287.243:119): avc:  denied  { create } for  pid=2764 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[  105.192895][ T2782] device syzkaller0 entered promiscuous mode
[  106.361264][ T2837] bridge0: port 2(bridge_slave_1) entered disabled state
[  106.477679][ T2837] device bridge_slave_0 left promiscuous mode
[  106.483649][ T2837] bridge0: port 1(bridge_slave_0) entered disabled state
[  106.499315][ T2837] device veth1_macvtap left promiscuous mode
[  106.505181][ T2837] device veth0_vlan left promiscuous mode
[  106.761046][ T2862] bridge0: port 1(bridge_slave_0) entered blocking state
[  106.780614][ T2862] bridge0: port 1(bridge_slave_0) entered disabled state
[  106.808489][ T2862] device bridge_slave_0 entered promiscuous mode
[  106.821765][ T2862] bridge0: port 2(bridge_slave_1) entered blocking state
[  106.828856][ T2862] bridge0: port 2(bridge_slave_1) entered disabled state
[  106.836228][ T2862] device bridge_slave_1 entered promiscuous mode
[  106.979542][ T2934] device veth0_vlan left promiscuous mode
[  106.996549][ T2934] device veth0_vlan entered promiscuous mode
[  107.211852][ T2949] device pim6reg1 entered promiscuous mode
[  107.358672][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  107.379512][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  107.438002][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  107.446330][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  107.454611][ T2922] bridge0: port 1(bridge_slave_0) entered blocking state
[  107.461469][ T2922] bridge0: port 1(bridge_slave_0) entered forwarding state
[  107.469561][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  107.477788][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  107.485863][ T2922] bridge0: port 2(bridge_slave_1) entered blocking state
[  107.492713][ T2922] bridge0: port 2(bridge_slave_1) entered forwarding state
[  107.500293][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  107.508243][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  107.516103][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  107.524348][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  107.540387][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  107.547987][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  107.556140][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  107.564614][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  107.572811][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  107.581408][ T2862] device veth0_vlan entered promiscuous mode
[  107.603487][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  107.611951][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  107.643493][ T2862] device veth1_macvtap entered promiscuous mode
[  107.664454][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  107.678170][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  107.688851][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  107.768491][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  107.808390][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  107.895807][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  107.957862][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  108.299571][ T3025] bridge0: port 1(bridge_slave_0) entered disabled state
[  108.325080][ T3025] bridge0: port 1(bridge_slave_0) entered blocking state
[  108.331987][ T3025] bridge0: port 1(bridge_slave_0) entered forwarding state
[  108.340082][   T28] audit: type=1400 audit(1718977290.503:120): avc:  denied  { ioctl } for  pid=3028 comm="syz-executor.0" path="cgroup:[4026532470]" dev="nsfs" ino=4026532470 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  108.365261][ T3025] device bridge0 entered promiscuous mode
[  109.385272][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  111.588084][ T3197] syz-executor.2[3197] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  111.588169][ T3197] syz-executor.2[3197] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  111.901403][   T28] audit: type=1400 audit(1718977294.063:121): avc:  denied  { create } for  pid=3218 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[  112.138332][ T3228] syz-executor.4[3228] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  112.138394][ T3228] syz-executor.4[3228] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  113.637402][ T3291] bridge0: port 2(bridge_slave_1) entered disabled state
[  114.851258][   T28] audit: type=1400 audit(1718977297.013:122): avc:  denied  { create } for  pid=3337 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  114.875459][   T28] audit: type=1400 audit(1718977297.033:123): avc:  denied  { read } for  pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  115.112275][   T28] audit: type=1400 audit(1718977297.263:124): avc:  denied  { create } for  pid=3346 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  116.149148][ T3387] device sit0 entered promiscuous mode
[  116.287259][ T3401] bridge0: port 2(bridge_slave_1) entered disabled state
[  116.294300][ T3401] bridge0: port 1(bridge_slave_0) entered disabled state
[  116.412849][ T3412] device pim6reg1 entered promiscuous mode
[  117.035939][   T28] audit: type=1400 audit(1718977299.193:125): avc:  denied  { read } for  pid=3436 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  117.132954][   T28] audit: type=1400 audit(1718977299.243:126): avc:  denied  { write } for  pid=3436 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  117.329190][   T28] audit: type=1400 audit(1718977299.333:127): avc:  denied  { setopt } for  pid=3436 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[  118.782516][ T3514] device syzkaller0 entered promiscuous mode
[  119.015873][ T3538] device veth1_macvtap left promiscuous mode
[  119.143228][ T3539] device veth1_macvtap entered promiscuous mode
[  119.248723][ T3539] device macsec0 entered promiscuous mode
[  119.390831][   T28] audit: type=1400 audit(1718977301.553:128): avc:  denied  { create } for  pid=3552 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1
[  120.261206][ T3595] device syzkaller0 entered promiscuous mode
[  120.997021][ T3647] bridge0: port 2(bridge_slave_1) entered disabled state
[  121.625623][ T3661] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  121.710142][ T3671] syz-executor.3[3671] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  121.710211][ T3671] syz-executor.3[3671] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  124.634665][ T3889] syz-executor.3[3889] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  124.702809][ T3889] syz-executor.3[3889] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  125.843927][ T3933] device syzkaller0 entered promiscuous mode
[  125.962454][ T3961] device pim6reg1 entered promiscuous mode
[  125.984516][ T3958] device pim6reg1 entered promiscuous mode
[  128.002448][   T28] audit: type=1400 audit(1718977310.163:129): avc:  denied  { create } for  pid=4059 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  130.049500][ T4144] device syzkaller0 entered promiscuous mode
[  130.309432][ T4158] device veth1_macvtap left promiscuous mode
[  130.332084][ T4158] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (74)
[  130.701118][   T28] audit: type=1400 audit(1718977312.863:130): avc:  denied  { create } for  pid=4179 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1
[  131.111536][ T4195] device pim6reg1 entered promiscuous mode
[  131.715283][ T4220] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  132.688178][ T4250] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further
[  133.744967][ T4283] device syzkaller0 entered promiscuous mode
[  135.115353][ T4344] device pim6reg1 entered promiscuous mode
[  135.406296][ T4357] device syzkaller0 entered promiscuous mode
[  139.217930][   T28] audit: type=1400 audit(1718977321.383:131): avc:  denied  { create } for  pid=4555 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  139.634029][ T4571] device sit0 entered promiscuous mode
[  142.419890][ T4660] syz-executor.2[4660] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  142.430018][ T4660] syz-executor.2[4660] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  145.064231][ T4750] device syzkaller0 entered promiscuous mode
[  146.931474][ T4848] syz-executor.4[4848] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  146.931552][ T4848] syz-executor.4[4848] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  147.014335][ T4851] syz-executor.4[4851] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  147.057964][ T4851] syz-executor.4[4851] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  147.977919][ T4880] device pim6reg1 entered promiscuous mode
[  148.165109][ T4900] bridge0: port 1(bridge_slave_0) entered disabled state
[  148.227645][ T4900] device bridge0 left promiscuous mode
[  148.298365][ T4900] bridge0: port 1(bridge_slave_0) entered blocking state
[  148.305219][ T4900] bridge0: port 1(bridge_slave_0) entered forwarding state
[  148.391020][ T4900] device bridge0 entered promiscuous mode
[  148.713324][ T4920] device pim6reg1 entered promiscuous mode
[  149.256617][ T4949] device syzkaller0 entered promiscuous mode
[  149.271777][ T4949] EXT4-fs (sda1): Can't modify superblock whileperforming online resize
[  153.153974][ T5134] device pim6reg1 entered promiscuous mode
[  153.269793][ T5147] syz-executor.2[5147] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  153.269866][ T5147] syz-executor.2[5147] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  153.364109][ T5147] syz-executor.2[5147] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  153.402527][ T5147] syz-executor.2[5147] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  153.699325][ T5170] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  154.156693][ T5185] device syzkaller0 entered promiscuous mode
[  155.284588][ T5228] bridge0: port 1(bridge_slave_0) entered disabled state
[  155.301911][ T5228] bridge0: port 2(bridge_slave_1) entered disabled state
[  155.357834][ T5228] device bridge_slave_0 left promiscuous mode
[  155.378281][ T5228] bridge0: port 1(bridge_slave_0) entered disabled state
[  155.480961][ T5242] device pim6reg1 entered promiscuous mode
[  155.665051][ T5263] syz-executor.2[5263] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  155.665124][ T5263] syz-executor.2[5263] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  155.678989][ T5263] syz-executor.2[5263] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  155.691232][ T5263] syz-executor.2[5263] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  156.508516][   T28] audit: type=1400 audit(1718977338.673:132): avc:  denied  { create } for  pid=5360 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1
[  158.322366][ T5514] bridge0: port 3(veth1_macvtap) entered blocking state
[  158.329330][ T5514] bridge0: port 3(veth1_macvtap) entered disabled state
[  159.205781][ T5578] device veth0_vlan left promiscuous mode
[  159.219644][ T5578] device veth0_vlan entered promiscuous mode
[  160.126825][ T5626] device veth0_vlan left promiscuous mode
[  160.139388][ T5648] syz-executor.1[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  160.139456][ T5648] syz-executor.1[5648] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  160.140637][ T5626] device veth0_vlan entered promiscuous mode
[  160.187925][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  160.196418][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  160.203929][   T40] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  160.332734][ T5661] tap0: tun_chr_ioctl cmd 1074025677
[  160.338081][ T5661] tap0: linktype set to 778
[  160.345602][   T28] audit: type=1400 audit(1718977342.503:133): avc:  denied  { create } for  pid=5660 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1
[  162.285906][   T28] audit: type=1400 audit(1718977344.443:134): avc:  denied  { create } for  pid=5794 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[  162.384332][ T5800] device pim6reg1 entered promiscuous mode
[  164.001309][ T5846] device veth0_vlan left promiscuous mode
[  164.029599][ T5846] device veth0_vlan entered promiscuous mode
[  166.197527][ T5973] syz-executor.1[5973] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  166.197595][ T5973] syz-executor.1[5973] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  166.282694][ T5974] syz-executor.1[5974] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  166.622213][ T6005] syz-executor.0[6005] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  166.688053][ T6005] syz-executor.0[6005] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  168.369039][ T6079] device pim6reg1 entered promiscuous mode
[  169.408562][ T6103] device veth0_vlan left promiscuous mode
[  169.466652][ T6103] device veth0_vlan entered promiscuous mode
[  170.301161][ T6161] device pim6reg1 entered promiscuous mode
[  170.588345][ T6170] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  173.686935][ T6339] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  174.024800][ T6377] syz-executor.0[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  174.024871][ T6377] syz-executor.0[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  176.140624][ T6457] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further
[  179.621372][ T6582] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  179.733661][ T6585] �: renamed from pim6reg1
[  180.795217][ T6630] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  181.965054][ T6674] syz-executor.3[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  181.965129][ T6674] syz-executor.3[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  182.358396][ T6691] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  184.180385][ T6735] EXT4-fs (sda1): Can't modify superblock whileperforming online resize
[  184.648603][ T6755] device macsec0 entered promiscuous mode
[  185.191402][ T6768] device syzkaller0 entered promiscuous mode
[  185.201931][   T28] audit: type=1400 audit(1718977367.363:135): avc:  denied  { create } for  pid=6776 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  190.638518][ T6949] syz-executor.1[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  190.641508][ T6949] syz-executor.1[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  190.683149][ T6949] syz-executor.1[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  190.700883][ T6949] syz-executor.1[6949] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  192.242923][ T7017] �: renamed from pim6reg1
[  195.052289][ T7108] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further
[  195.555331][   T28] audit: type=1400 audit(1718977377.713:136): avc:  denied  { create } for  pid=7127 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1
[  195.891027][ T7137] device pim6reg1 entered promiscuous mode
[  196.044580][ T7144] device pim6reg1 entered promiscuous mode
[  196.118990][   T28] audit: type=1400 audit(1718977378.283:137): avc:  denied  { create } for  pid=7155 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1
[  196.195090][   T28] audit: type=1400 audit(1718977378.313:138): avc:  denied  { create } for  pid=7155 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[  196.760530][ T7168] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.795620][ T7168] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.857851][ T7168] device bridge_slave_0 entered promiscuous mode
[  196.907661][ T7168] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.916282][ T7168] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.969145][ T7168] device bridge_slave_1 entered promiscuous mode
[  197.158014][ T2835] bridge0: port 2(bridge_slave_1) entered disabled state
[  197.185616][ T2835] device bridge_slave_0 left promiscuous mode
[  197.207329][ T2835] bridge0: port 1(bridge_slave_0) entered disabled state
[  197.235779][ T2835] device veth0_vlan left promiscuous mode
[  197.688706][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  197.696044][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  197.745449][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  197.753952][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  197.792568][ T2921] bridge0: port 1(bridge_slave_0) entered blocking state
[  197.799536][ T2921] bridge0: port 1(bridge_slave_0) entered forwarding state
[  197.852326][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  197.884088][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  197.916740][ T2921] bridge0: port 2(bridge_slave_1) entered blocking state
[  197.923893][ T2921] bridge0: port 2(bridge_slave_1) entered forwarding state
[  197.971717][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  198.002526][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  198.072931][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  198.092948][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  198.101248][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  198.159154][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  198.166998][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  198.227738][ T7168] device veth0_vlan entered promiscuous mode
[  198.268105][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  198.296548][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  198.327054][ T7168] device veth1_macvtap entered promiscuous mode
[  198.353523][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  198.361243][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  198.407832][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  198.446519][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  198.476768][ T2921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  198.492889][   T28] audit: type=1400 audit(1718977380.653:139): avc:  denied  { mounton } for  pid=7168 comm="syz-executor.3" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  199.345068][ T7195] device pim6reg1 entered promiscuous mode
[  199.373558][ T7202] device syzkaller0 entered promiscuous mode
[  200.528037][ T7255] device sit0 entered promiscuous mode
[  201.436866][   T28] audit: type=1400 audit(1718977383.593:140): avc:  denied  { create } for  pid=7275 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  202.340164][ T7284] device syzkaller0 entered promiscuous mode
[  202.450970][ T7300] syz-executor.4[7300] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  202.451041][ T7300] syz-executor.4[7300] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  203.577165][   T28] audit: type=1400 audit(1718977385.733:141): avc:  denied  { create } for  pid=7332 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  203.919427][ T7364] bridge0: port 1(bridge_slave_0) entered disabled state
[  205.463979][ T7425] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  205.949461][ T7445] syz-executor.0[7445] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  205.949532][ T7445] syz-executor.0[7445] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  206.522337][ T7461] syz-executor.3[7461] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  206.578723][ T7461] syz-executor.3[7461] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  207.410545][ T2834] device veth0_vlan left promiscuous mode
[  208.044181][ T7502] bridge0: port 1(bridge_slave_0) entered blocking state
[  208.115838][ T7502] bridge0: port 1(bridge_slave_0) entered disabled state
[  208.201258][ T7502] device bridge_slave_0 entered promiscuous mode
[  208.267286][ T7502] bridge0: port 2(bridge_slave_1) entered blocking state
[  208.307136][ T7502] bridge0: port 2(bridge_slave_1) entered disabled state
[  208.322792][ T7502] device bridge_slave_1 entered promiscuous mode
[  208.439066][ T7523] device syzkaller0 entered promiscuous mode
[  208.571673][ T7502] bridge0: port 2(bridge_slave_1) entered blocking state
[  208.579101][ T7502] bridge0: port 2(bridge_slave_1) entered forwarding state
[  208.587087][ T7502] bridge0: port 1(bridge_slave_0) entered blocking state
[  208.594736][ T7502] bridge0: port 1(bridge_slave_0) entered forwarding state
[  208.649359][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  208.658936][  T344] bridge0: port 1(bridge_slave_0) entered disabled state
[  208.687477][  T344] bridge0: port 2(bridge_slave_1) entered disabled state
[  208.720049][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  208.749929][  T313] bridge0: port 1(bridge_slave_0) entered blocking state
[  208.757136][  T313] bridge0: port 1(bridge_slave_0) entered forwarding state
[  208.836782][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  208.873968][  T313] bridge0: port 2(bridge_slave_1) entered blocking state
[  208.881364][  T313] bridge0: port 2(bridge_slave_1) entered forwarding state
[  208.954336][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  208.982564][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  209.060035][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  209.088891][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  209.137742][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  209.180266][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  209.229633][ T7502] device veth0_vlan entered promiscuous mode
[  209.247931][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  209.264564][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  209.313017][ T7552] device pim6reg1 entered promiscuous mode
[  209.356072][ T7502] device veth1_macvtap entered promiscuous mode
[  209.376746][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  209.392881][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  209.444301][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  209.520011][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  209.531716][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  209.559284][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  209.569532][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  209.726461][ T7574] device sit0 left promiscuous mode
[  210.047895][ T7581] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.067235][ T7581] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.083980][ T7581] device bridge_slave_0 entered promiscuous mode
[  210.120865][ T7581] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.149875][ T7581] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.187804][ T7581] device bridge_slave_1 entered promiscuous mode
[  210.487705][ T7581] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.494615][ T7581] bridge0: port 2(bridge_slave_1) entered forwarding state
[  210.502603][ T7581] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.509825][ T7581] bridge0: port 1(bridge_slave_0) entered forwarding state
[  210.581825][ T2834] device bridge_slave_1 left promiscuous mode
[  210.591636][ T2834] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.645185][ T2834] device bridge_slave_0 left promiscuous mode
[  210.710840][ T2834] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.753245][ T2834] device veth1_macvtap left promiscuous mode
[  210.767461][ T2834] device veth0_vlan left promiscuous mode
[  211.129887][ T2920] bridge0: port 1(bridge_slave_0) entered disabled state
[  211.159114][ T2920] bridge0: port 2(bridge_slave_1) entered disabled state
[  211.241097][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  211.267937][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  211.298099][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  211.312797][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  211.384794][    T6] bridge0: port 1(bridge_slave_0) entered blocking state
[  211.392336][    T6] bridge0: port 1(bridge_slave_0) entered forwarding state
[  211.467729][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  211.505046][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  211.542291][    T6] bridge0: port 2(bridge_slave_1) entered blocking state
[  211.550032][    T6] bridge0: port 2(bridge_slave_1) entered forwarding state
[  211.617281][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  211.633823][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  211.643778][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  211.654207][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  211.704888][ T7581] device veth0_vlan entered promiscuous mode
[  211.712574][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  211.722055][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  211.731783][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  211.740163][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  211.755529][ T7581] device veth1_macvtap entered promiscuous mode
[  211.780313][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  211.792915][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  211.816739][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  211.927732][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  211.973892][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  212.036382][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  212.058857][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  212.162364][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  212.204774][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  212.947742][ T2834] device bridge_slave_1 left promiscuous mode
[  212.974646][ T2834] bridge0: port 2(bridge_slave_1) entered disabled state
[  213.067435][ T2834] device bridge_slave_0 left promiscuous mode
[  213.147327][ T2834] bridge0: port 1(bridge_slave_0) entered disabled state
[  213.206524][ T2834] device veth1_macvtap left promiscuous mode
[  213.246425][ T2834] device veth0_vlan left promiscuous mode
[  213.660290][ T7667] device lo entered promiscuous mode
[  213.736124][ T7660] bridge0: port 1(bridge_slave_0) entered blocking state
[  213.772487][ T7660] bridge0: port 1(bridge_slave_0) entered disabled state
[  213.829387][ T7660] device bridge_slave_0 entered promiscuous mode
[  213.890842][ T7660] bridge0: port 2(bridge_slave_1) entered blocking state
[  213.982461][ T7660] bridge0: port 2(bridge_slave_1) entered disabled state
[  214.107679][ T7660] device bridge_slave_1 entered promiscuous mode
[  215.038665][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  215.071243][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  215.147481][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  215.158437][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  215.175385][ T2920] bridge0: port 1(bridge_slave_0) entered blocking state
[  215.182965][ T2920] bridge0: port 1(bridge_slave_0) entered forwarding state
[  215.279011][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  215.324411][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  215.368198][ T2920] bridge0: port 2(bridge_slave_1) entered blocking state
[  215.375259][ T2920] bridge0: port 2(bridge_slave_1) entered forwarding state
[  215.456639][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  215.483349][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  215.514847][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  215.548612][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  215.598579][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  215.611897][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  215.619320][ T7708] syz-executor.1[7708] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  215.619387][ T7708] syz-executor.1[7708] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  215.677517][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  215.717644][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  215.737867][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  215.746557][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  215.762043][ T7660] device veth0_vlan entered promiscuous mode
[  215.783028][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  215.791749][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  215.802745][ T7660] device veth1_macvtap entered promiscuous mode
[  215.829027][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  215.841971][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  215.850507][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  215.897425][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  215.905705][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  216.578535][ T7736] bridge0: port 1(bridge_slave_0) entered blocking state
[  216.614238][ T7736] bridge0: port 1(bridge_slave_0) entered disabled state
[  216.655125][ T7736] device bridge_slave_0 entered promiscuous mode
[  216.699524][ T7692] device bridge_slave_1 left promiscuous mode
[  216.706651][ T7692] bridge0: port 2(bridge_slave_1) entered disabled state
[  216.745433][ T7692] device bridge_slave_0 left promiscuous mode
[  216.779562][ T7692] bridge0: port 1(bridge_slave_0) entered disabled state
[  216.804428][ T7692] device veth1_macvtap left promiscuous mode
[  216.821733][ T7692] device veth0_vlan left promiscuous mode
[  216.904618][ T7742] syz-executor.1[7742] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  216.905829][ T7742] syz-executor.1[7742] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  217.029044][ T7736] bridge0: port 2(bridge_slave_1) entered blocking state
[  217.073759][ T7736] bridge0: port 2(bridge_slave_1) entered disabled state
[  217.137771][ T7736] device bridge_slave_1 entered promiscuous mode
[  217.788509][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  217.838564][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  217.888042][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  217.938117][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  217.957617][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  217.967928][   T19] bridge0: port 1(bridge_slave_0) entered blocking state
[  217.974949][   T19] bridge0: port 1(bridge_slave_0) entered forwarding state
[  217.997388][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  218.015892][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  218.035950][   T19] bridge0: port 2(bridge_slave_1) entered blocking state
[  218.042872][   T19] bridge0: port 2(bridge_slave_1) entered forwarding state
[  218.081156][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  218.111112][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  218.163721][ T7736] device veth0_vlan entered promiscuous mode
[  218.185938][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  218.237339][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  218.345317][ T7736] device veth1_macvtap entered promiscuous mode
[  218.390942][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  218.411381][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  218.461127][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  218.523624][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  218.584422][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  218.670383][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  218.709319][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  218.787987][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  218.854336][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  219.518465][ T7692] device bridge_slave_1 left promiscuous mode
[  219.527377][ T7692] bridge0: port 2(bridge_slave_1) entered disabled state
[  219.605395][ T7692] device bridge_slave_0 left promiscuous mode
[  219.639308][ T7692] bridge0: port 1(bridge_slave_0) entered disabled state
[  219.699741][ T7692] device veth1_macvtap left promiscuous mode
[  219.758586][ T7692] device veth0_vlan left promiscuous mode
[  220.492323][ T7800] bridge0: port 1(bridge_slave_0) entered blocking state
[  220.587884][ T7800] bridge0: port 1(bridge_slave_0) entered disabled state
[  220.652996][ T7800] device bridge_slave_0 entered promiscuous mode
[  220.689587][ T7800] bridge0: port 2(bridge_slave_1) entered blocking state
[  220.732925][ T7800] bridge0: port 2(bridge_slave_1) entered disabled state
[  220.779683][ T7800] device bridge_slave_1 entered promiscuous mode
[  221.056669][ T7800] bridge0: port 2(bridge_slave_1) entered blocking state
[  221.064071][ T7800] bridge0: port 2(bridge_slave_1) entered forwarding state
[  221.071630][ T7800] bridge0: port 1(bridge_slave_0) entered blocking state
[  221.078647][ T7800] bridge0: port 1(bridge_slave_0) entered forwarding state
[  221.206482][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  221.214546][ T2922] bridge0: port 1(bridge_slave_0) entered disabled state
[  221.232978][ T2922] bridge0: port 2(bridge_slave_1) entered disabled state
[  221.264843][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  221.327932][ T2922] bridge0: port 1(bridge_slave_0) entered blocking state
[  221.335457][ T2922] bridge0: port 1(bridge_slave_0) entered forwarding state
[  221.427511][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  221.436415][ T2922] bridge0: port 2(bridge_slave_1) entered blocking state
[  221.443845][ T2922] bridge0: port 2(bridge_slave_1) entered forwarding state
[  221.462015][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  221.471084][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  221.529840][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  221.576991][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  221.614681][ T7800] device veth0_vlan entered promiscuous mode
[  221.664399][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  221.675835][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  221.684610][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  221.692582][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  221.716404][ T7800] device veth1_macvtap entered promiscuous mode
[  221.756989][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  221.779426][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  221.794918][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  221.806865][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  222.091890][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  222.106856][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  222.115569][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  222.126459][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  222.135825][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  222.733041][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state
[  222.832822][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state
[  222.916577][ T7874] device bridge_slave_0 entered promiscuous mode
[  223.021330][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state
[  223.068570][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state
[  223.076714][ T7874] device bridge_slave_1 entered promiscuous mode
[  223.155486][ T7889] �: renamed from syzkaller0
[  223.196731][ T7691] device bridge_slave_1 left promiscuous mode
[  223.202858][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state
[  223.217713][ T7691] device bridge_slave_0 left promiscuous mode
[  223.231930][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state
[  223.258719][ T7691] device veth1_macvtap left promiscuous mode
[  223.274505][ T7691] device veth0_vlan left promiscuous mode
[  223.434862][ T7900] syz-executor.1[7900] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  223.434933][ T7900] syz-executor.1[7900] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  223.819539][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  223.907589][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  224.028581][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  224.038637][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  224.127677][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  224.135628][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  224.257948][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  224.303463][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  224.356457][  T313] bridge0: port 1(bridge_slave_0) entered blocking state
[  224.363444][  T313] bridge0: port 1(bridge_slave_0) entered forwarding state
[  224.449181][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  224.527665][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  224.536397][  T313] bridge0: port 2(bridge_slave_1) entered blocking state
[  224.543367][  T313] bridge0: port 2(bridge_slave_1) entered forwarding state
[  224.590077][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  224.598815][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  224.608176][ T7874] device veth0_vlan entered promiscuous mode
[  224.621411][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  224.633070][ T7874] device veth1_macvtap entered promiscuous mode
[  224.662640][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  224.678020][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  224.697581][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  224.721386][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  224.732868][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  224.741914][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  224.750355][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  224.815699][ T7939] device pim6reg1 entered promiscuous mode
[  225.398876][ T7691] device bridge_slave_1 left promiscuous mode
[  225.408422][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state
[  225.534234][ T7691] device bridge_slave_0 left promiscuous mode
[  225.576499][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state
[  225.635172][ T7691] device veth1_macvtap left promiscuous mode
[  225.675897][ T7691] device veth0_vlan left promiscuous mode
[  226.259626][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state
[  226.266673][ T7959] bridge0: port 1(bridge_slave_0) entered disabled state
[  226.274309][ T7959] device bridge_slave_0 entered promiscuous mode
[  226.281868][ T7959] bridge0: port 2(bridge_slave_1) entered blocking state
[  226.288937][ T7959] bridge0: port 2(bridge_slave_1) entered disabled state
[  226.296537][ T7959] device bridge_slave_1 entered promiscuous mode
[  226.345550][ T7974] device pim6reg1 entered promiscuous mode
[  226.712350][ T7959] bridge0: port 2(bridge_slave_1) entered blocking state
[  226.719363][ T7959] bridge0: port 2(bridge_slave_1) entered forwarding state
[  226.726508][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state
[  226.733440][ T7959] bridge0: port 1(bridge_slave_0) entered forwarding state
[  226.842997][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  226.862150][   T19] bridge0: port 1(bridge_slave_0) entered disabled state
[  226.967908][   T19] bridge0: port 2(bridge_slave_1) entered disabled state
[  227.001949][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  227.010689][   T19] bridge0: port 1(bridge_slave_0) entered blocking state
[  227.017660][   T19] bridge0: port 1(bridge_slave_0) entered forwarding state
[  227.163051][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  227.207529][   T19] bridge0: port 2(bridge_slave_1) entered blocking state
[  227.214518][   T19] bridge0: port 2(bridge_slave_1) entered forwarding state
[  227.287371][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  227.351765][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  227.499403][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  227.527720][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  227.610008][ T7959] device veth0_vlan entered promiscuous mode
[  227.639756][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  227.650809][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  227.672331][ T7959] device veth1_macvtap entered promiscuous mode
[  227.730198][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  227.748332][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  227.816703][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  227.898357][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  227.972392][   T65] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  228.096601][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  228.109354][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  228.128886][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  228.143586][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  228.708086][ T7691] device bridge_slave_1 left promiscuous mode
[  228.715159][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state
[  228.785712][ T7691] device bridge_slave_0 left promiscuous mode
[  228.837074][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state
[  228.897337][ T7691] device veth1_macvtap left promiscuous mode
[  228.937867][ T7691] device veth0_vlan left promiscuous mode
[  229.257958][ T8077] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups)
[  229.370126][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state
[  229.377435][ T8074] bridge0: port 1(bridge_slave_0) entered disabled state
[  229.385151][ T8074] device bridge_slave_0 entered promiscuous mode
[  229.393767][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state
[  229.401008][ T8074] bridge0: port 2(bridge_slave_1) entered disabled state
[  229.410203][ T8074] device bridge_slave_1 entered promiscuous mode
[  229.765339][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  229.776947][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  229.805276][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  229.846648][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  229.914635][ T2922] bridge0: port 1(bridge_slave_0) entered blocking state
[  229.921968][ T2922] bridge0: port 1(bridge_slave_0) entered forwarding state
[  230.038910][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  230.115567][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  230.166762][ T2922] bridge0: port 2(bridge_slave_1) entered blocking state
[  230.174266][ T2922] bridge0: port 2(bridge_slave_1) entered forwarding state
[  230.265711][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  230.316720][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  230.386558][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  230.429789][ T8119] syz-executor.1[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  230.429865][ T8119] syz-executor.1[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  230.440620][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  230.464045][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  230.473048][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  230.483242][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  230.493752][ T8074] device veth0_vlan entered promiscuous mode
[  230.530349][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  230.546520][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  230.571401][ T8074] device veth1_macvtap entered promiscuous mode
[  230.616377][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  230.642358][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  230.748307][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  230.901722][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  230.920614][ T2920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[  231.672359][ T7691] device bridge_slave_1 left promiscuous mode
[  231.678435][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state
[  231.690023][ T7691] device bridge_slave_0 left promiscuous mode
[  231.696149][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state
[  231.764015][ T7691] device veth1_macvtap left promiscuous mode
[  231.790699][ T7691] device veth0_vlan left promiscuous mode
[  231.954284][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state
[  231.961730][ T8154] bridge0: port 1(bridge_slave_0) entered disabled state
[  231.970081][ T8154] device bridge_slave_0 entered promiscuous mode
[  231.978358][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state
[  231.985204][ T8154] bridge0: port 2(bridge_slave_1) entered disabled state
[  231.995517][ T8154] device bridge_slave_1 entered promiscuous mode
[  232.104139][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state
[  232.111211][ T8154] bridge0: port 2(bridge_slave_1) entered forwarding state
[  232.118905][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.125773][ T8154] bridge0: port 1(bridge_slave_0) entered forwarding state
[  232.417826][ T2922] bridge0: port 1(bridge_slave_0) entered disabled state
[  232.445748][ T2922] bridge0: port 2(bridge_slave_1) entered disabled state
[  232.537257][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  232.544865][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  232.679059][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  232.760616][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  232.810935][   T19] bridge0: port 1(bridge_slave_0) entered blocking state
[  232.818166][   T19] bridge0: port 1(bridge_slave_0) entered forwarding state
[  232.912357][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  232.971537][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  232.998124][   T19] bridge0: port 2(bridge_slave_1) entered blocking state
[  233.005937][   T19] bridge0: port 2(bridge_slave_1) entered forwarding state
[  233.034799][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  233.073383][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  233.106331][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  233.114502][  T344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  233.138737][ T8204] device pim6reg1 entered promiscuous mode
[  233.186063][ T8154] device veth0_vlan entered promiscuous mode
[  233.237611][ T8207] device pim6reg1 entered promiscuous mode
[  233.251670][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  233.252850][ T8191] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  233.267600][ T8191] #PF: supervisor instruction fetch in kernel mode
[  233.273973][ T8191] #PF: error_code(0x0010) - not-present page
[  233.280489][ T8191] PGD 10a1a7067 P4D 10a1a7067 PUD 1114c2067 PMD 0 
[  233.281895][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  233.287088][ T8191] Oops: 0010 [#1] PREEMPT SMP KASAN
[  233.287106][ T8191] CPU: 1 PID: 8191 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00020-gcd89d4fa0722 #0
[  233.310211][ T8191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  233.320191][ T8191] RIP: 0010:0x0
[  233.323489][ T8191] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[  233.331213][ T8191] RSP: 0018:ffffc9000078f908 EFLAGS: 00010246
[  233.337677][ T8191] RAX: 1ffff1102dcba417 RBX: ffff88816e5d20b8 RCX: 0000000000040000
[  233.345741][ T8191] RDX: ffffc90009752000 RSI: 000000000001f662 RDI: ffff88811c86f480
[  233.353858][ T8191] RBP: ffffc9000078f930 R08: ffffffff841d8447 R09: ffff8881002afc80
[  233.361821][ T8191] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004
[  233.369616][ T8191] R13: dffffc0000000000 R14: ffff88811c86f480 R15: dffffc0000000000
[  233.377514][ T8191] FS:  00007fd58b9f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  233.386483][ T8191] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  233.392906][ T8191] CR2: ffffffffffffffd6 CR3: 0000000121d4b000 CR4: 00000000003506a0
[  233.400717][ T8191] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000
[  233.401721][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  233.408526][ T8191] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  233.408542][ T8191] Call Trace:
[  233.408547][ T8191]  <TASK>
[  233.408555][ T8191]  ? __die_body+0x62/0xb0
[  233.408577][ T8191]  ? __die+0x7e/0x90
[  233.408592][ T8191]  ? page_fault_oops+0x7f9/0xa90
[  233.442755][ T8191]  ? kernelmode_fixup_or_oops+0x270/0x270
[  233.448889][ T8191]  ? kmem_cache_free+0x291/0x510
[  233.454359][ T8191]  ? kfree_skbmem+0x104/0x170
[  233.459164][ T8191]  ? preempt_schedule_notrace+0x140/0x140
[  233.464961][ T8191]  ? is_errata93+0xc7/0x240
[  233.469317][ T8191]  ? exc_page_fault+0x537/0x700
[  233.473991][ T8191]  ? asm_exc_page_fault+0x27/0x30
[  233.474981][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  233.478853][ T8191]  ? sk_psock_verdict_data_ready+0xf7/0x160
[  233.478884][ T8191]  sk_psock_verdict_data_ready+0x129/0x160
[  233.478904][ T8191]  unix_stream_sendmsg+0x8fd/0x1070
[  233.503761][ T8191]  ? unix_stream_sendmsg+0x8b1/0x1070
[  233.509059][ T8191]  ? unix_show_fdinfo+0x2f0/0x2f0
[  233.514036][ T8191]  ? unix_show_fdinfo+0x2f0/0x2f0
[  233.518971][ T8191]  ____sys_sendmsg+0x5d3/0x9a0
[  233.523741][ T8191]  ? __sys_sendmsg_sock+0x40/0x40
[  233.529293][ T8191]  __sys_sendmsg+0x2a9/0x390
[  233.533829][ T8191]  ? ____sys_sendmsg+0x9a0/0x9a0
[  233.538572][ T8191]  ? __hrtimer_run_queues+0xa72/0xad0
[  233.543782][ T8191]  ? restore_fpregs_from_fpstate+0xfc/0x230
[  233.551034][ T8191]  ? __kasan_check_write+0x14/0x20
[  233.556523][ T8191]  ? fpregs_restore_userregs+0x130/0x290
[  233.562175][ T8191]  __x64_sys_sendmsg+0x7f/0x90
[  233.567052][ T8191]  do_syscall_64+0x3d/0xb0
[  233.571274][ T8191]  ? sysvec_apic_timer_interrupt+0x55/0xc0
[  233.577000][ T8191]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  233.582755][ T8191] RIP: 0033:0x7fd58c67cf29
[  233.587018][ T8191] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  233.606518][ T8191] RSP: 002b:00007fd58b9f70c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  233.614754][ T8191] RAX: ffffffffffffffda RBX: 00007fd58c7b3f80 RCX: 00007fd58c67cf29
[  233.622749][ T8191] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000005
[  233.630566][ T8191] RBP: 00007fd58c6ec074 R08: 0000000000000000 R09: 0000000000000000
[  233.638363][ T8191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  233.646260][ T8191] R13: 000000000000000b R14: 00007fd58c7b3f80 R15: 00007ffca0f83378
[  233.654080][ T8191]  </TASK>
[  233.656934][ T8191] Modules linked in:
[  233.660684][ T8191] CR2: 0000000000000000
[  233.664664][ T8191] ---[ end trace 0000000000000000 ]---
[  233.669955][ T8191] RIP: 0010:0x0
[  233.673346][ T8191] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[  233.680849][ T8191] RSP: 0018:ffffc9000078f908 EFLAGS: 00010246
[  233.686894][ T8191] RAX: 1ffff1102dcba417 RBX: ffff88816e5d20b8 RCX: 0000000000040000
[  233.695395][ T8191] RDX: ffffc90009752000 RSI: 000000000001f662 RDI: ffff88811c86f480
[  233.703590][ T8191] RBP: ffffc9000078f930 R08: ffffffff841d8447 R09: ffff8881002afc80
[  233.711758][ T8191] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004
[  233.719691][ T8191] R13: dffffc0000000000 R14: ffff88811c86f480 R15: dffffc0000000000
[  233.728010][ T8191] FS:  00007fd58b9f76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  233.736793][ T8191] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  233.743458][ T8191] CR2: ffffffffffffffd6 CR3: 0000000121d4b000 CR4: 00000000003506a0
[  233.751454][ T8191] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000
[  233.759519][ T8191] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
[  233.767340][ T8191] Kernel panic - not syncing: Fatal exception
[  233.773497][ T8191] Kernel Offset: disabled
[  233.777749][ T8191] Rebooting in 86400 seconds..