last executing test programs: 2.365164416s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) 1.529795905s ago: executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda100000000000047010000f8ffffffb702004008000000b703000000000000850000006c0000009500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001483) ioctl$TUNSETOFFLOAD(r1, 0x4004743c, 0x0) socketpair(0x24, 0x0, 0x0, &(0x7f0000000000)) 1.458750636s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.416215702s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r0}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 1.367556309s ago: executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) close(0x4) 1.36547851s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1, &(0x7f0000000200)=@raw=[@func], &(0x7f00000002c0)='GPL\x00', 0xfffffffa, 0x9d, &(0x7f0000000580)=""/157, 0x40f00, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 1.344209863s ago: executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180300002020702500000000002020207b650f8ac1bf954174a100000000000007010000f8fa0f786c7189c1d989fcf7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x17, 0x18, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x4, 0x7, 0x18, 0x1}, @alu={0x4, 0x1, 0x1, 0x7, 0x4, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x65, '\x00', r0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0xc, 0x4, 0x7}, 0x10, 0x0, r4, 0x0, &(0x7f0000000940)=[r1, r3, 0xffffffffffffffff, r1, r6, r1, r1], 0x0, 0x10, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="1e030800dd5c980128856306008e024000"], 0xffdd) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r8, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9a, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x34, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000300000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r9, &(0x7f0000000140), 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x5, &(0x7f0000000cc0)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf36, 0x0, 0xffffffffffffffff, 0x0, '\x00', r11, 0xffffffffffffffff, 0x400004, 0x2}, 0x43) 1.336385574s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)=0x80000) 1.305637469s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf081000000000000000000081"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 1.23129041s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r2}, 0x10) 1.123421587s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@generic={&(0x7f0000000cc0)='./file0\x00'}, 0x18) 1.036540561s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000005c0)='qdisc_destroy\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r1) 970.056121ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x42400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 895.002902ms ago: executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000b00)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x3, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)={[{0x0, 'perf_event'}, {0x0, 'rdma'}]}, 0x12) 873.650115ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x200000}, 0x1f00) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000004fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000040), 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) 859.913028ms ago: executing program 0: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) close(0x4) 853.257858ms ago: executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000b70200007f000000b703000000b200008500000083000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000140)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x0, 0x0, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000280), &(0x7f0000000300), 0x8, 0x5d, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0xe, 0x0, &(0x7f0000001e80)="b8e2615772691f00000000000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_virt_wifi\x00', @random="7c726367cc47"}) 836.310232ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)=0x80000) 833.780542ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='ext4_ext_rm_idx\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a07, 0x1700) 830.872292ms ago: executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 769.381682ms ago: executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 764.064632ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf081000000000000000000081"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 652.6784ms ago: executing program 1: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x4}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180300002020702500000000002020207b650f8ac1bf954174a100000000000007010000f8fa0f786c7189c1d989fcf7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x17, 0x18, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x4, 0x7, 0x18, 0x1}, @alu={0x4, 0x1, 0x1, 0x7, 0x4, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000005c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x65, '\x00', r0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0xc, 0x4, 0x7}, 0x10, 0x0, r4, 0x0, &(0x7f0000000940)=[r1, r3, 0xffffffffffffffff, r1, r6, r1, r1], 0x0, 0x10, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="1e030800dd5c980128856306008e024000"], 0xffdd) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r8, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9a, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x34, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000300000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r9, &(0x7f0000000140), 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x5, &(0x7f0000000cc0)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0xb8}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)={0x1b, 0x0, 0x0, 0xf36, 0x0, 0xffffffffffffffff, 0x0, '\x00', r11, 0xffffffffffffffff, 0x400004, 0x2}, 0x43) 404.030708ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x1ff}, 0x8) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x12, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0x0, 0x4, 0x9}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x618, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b0f, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240), 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, &(0x7f0000000200), 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x4100, 0x0) 318.796721ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x200000}, 0x1f00) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000900)=[{0x0}], 0x1}, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) 307.459703ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1, &(0x7f0000000200)=@raw=[@func], &(0x7f00000002c0)='GPL\x00', 0xfffffffa, 0x9d, &(0x7f0000000580)=""/157, 0x40f00, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 209.193458ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000005c0)='qdisc_destroy\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) close(r1) 138.314589ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x42400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 43.660203ms ago: executing program 4: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) close(0x4) 0s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xa, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008230000b7040000000000008500000001000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000060ff850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.189' (ED25519) to the list of known hosts. 2024/06/04 05:48:30 fuzzer started 2024/06/04 05:48:30 dialing manager at 10.128.0.163:30010 [ 19.306378][ T30] audit: type=1400 audit(1717480110.438:66): avc: denied { node_bind } for pid=281 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 19.313626][ T30] audit: type=1400 audit(1717480110.438:67): avc: denied { name_bind } for pid=281 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 19.340528][ T30] audit: type=1400 audit(1717480110.478:68): avc: denied { setattr } for pid=290 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.364598][ T30] audit: type=1400 audit(1717480110.488:69): avc: denied { integrity } for pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.368094][ T289] cgroup: Unknown subsys name 'net' [ 19.387225][ T30] audit: type=1400 audit(1717480110.498:70): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.414390][ T289] cgroup: Unknown subsys name 'devices' [ 19.414836][ T30] audit: type=1400 audit(1717480110.498:71): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.442109][ T30] audit: type=1400 audit(1717480110.528:72): avc: denied { mounton } for pid=295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.466767][ T30] audit: type=1400 audit(1717480110.528:73): avc: denied { mount } for pid=295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.474033][ T297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.498161][ T30] audit: type=1400 audit(1717480110.528:74): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.517904][ T30] audit: type=1400 audit(1717480110.628:75): avc: denied { relabelto } for pid=297 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.547145][ T296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.631800][ T289] cgroup: Unknown subsys name 'hugetlb' [ 19.637368][ T289] cgroup: Unknown subsys name 'rlimit' 2024/06/04 05:48:30 starting 5 executor processes [ 20.311438][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.318298][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.325723][ T308] device bridge_slave_0 entered promiscuous mode [ 20.348491][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.355476][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.362994][ T308] device bridge_slave_1 entered promiscuous mode [ 20.401266][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.408110][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.415387][ T307] device bridge_slave_0 entered promiscuous mode [ 20.437299][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.444257][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.451428][ T307] device bridge_slave_1 entered promiscuous mode [ 20.464192][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.471091][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.478369][ T306] device bridge_slave_0 entered promiscuous mode [ 20.497684][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.504566][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.511856][ T306] device bridge_slave_1 entered promiscuous mode [ 20.518210][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.525209][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.532433][ T310] device bridge_slave_0 entered promiscuous mode [ 20.539099][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.545984][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.553189][ T310] device bridge_slave_1 entered promiscuous mode [ 20.615284][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.622180][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.629310][ T309] device bridge_slave_0 entered promiscuous mode [ 20.651107][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.657958][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.665323][ T309] device bridge_slave_1 entered promiscuous mode [ 20.791177][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.798029][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.805172][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.811938][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.840332][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.847178][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.854327][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.861185][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.876076][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.882951][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.890050][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.896815][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.905123][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.911979][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.919051][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.925876][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.960921][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.967769][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.974900][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.981678][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.009822][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.018076][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.026727][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.033793][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.041244][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.048386][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.055395][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.062393][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.069407][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.076411][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.084067][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.091610][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.114570][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.122462][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.159557][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.169217][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.177262][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.185632][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.193434][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.200712][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.207869][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.215884][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.222725][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.230083][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.238021][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.244864][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.252024][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.259944][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.266763][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.274025][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.281749][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.289409][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.296708][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.304709][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.311547][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.318697][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.326734][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.333569][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.340777][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.360385][ T308] device veth0_vlan entered promiscuous mode [ 21.372694][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.380918][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.388055][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.396296][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.404224][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.411065][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.418191][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.426219][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.434234][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.441078][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.448185][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.455963][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.463667][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.471512][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.479232][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.487118][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.494839][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.502995][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.510934][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.517752][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.537900][ T308] device veth1_macvtap entered promiscuous mode [ 21.551859][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.560088][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.567980][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.575539][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.583956][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.592660][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.600852][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.608891][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.616832][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.624664][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.632859][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.645030][ T306] device veth0_vlan entered promiscuous mode [ 21.654878][ T307] device veth0_vlan entered promiscuous mode [ 21.661663][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.669363][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.677218][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.685131][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.693078][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.700338][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.707498][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.714804][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.725326][ T310] device veth0_vlan entered promiscuous mode [ 21.735086][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.743193][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.751133][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.758799][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.766974][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.774633][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.783198][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.791348][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.803190][ T310] device veth1_macvtap entered promiscuous mode [ 21.816441][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.824584][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.832714][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.840150][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.848082][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.856123][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.864139][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.872312][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.880230][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.888679][ T307] device veth1_macvtap entered promiscuous mode [ 21.897721][ T306] device veth1_macvtap entered promiscuous mode [ 21.914181][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.924428][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.931965][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.940103][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.948156][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.956327][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.985456][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.993932][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.002931][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.011069][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.024871][ T309] device veth0_vlan entered promiscuous mode [ 22.042655][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.058174][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.066805][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.074825][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.085615][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.105672][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.114098][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.122365][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.143297][ C0] hrtimer: interrupt took 26705 ns [ 22.193279][ T342] syz-executor.4 (342) used obsolete PPPIOCDETACH ioctl [ 22.200192][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.207492][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.232499][ T309] device veth1_macvtap entered promiscuous mode [ 22.247890][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.256976][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.297849][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.313083][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.331408][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.372806][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.318431][ T940] syz-executor.1 (940) used greatest stack depth: 21720 bytes left [ 48.357769][ T1237] syz-executor.0 (1237) used greatest stack depth: 21528 bytes left [ 51.470666][ T307] syz-executor.0 (307) used greatest stack depth: 20912 bytes left [ 51.707950][ T1371] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.731261][ T1371] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.756904][ T1371] device bridge_slave_0 entered promiscuous mode [ 51.806540][ T1371] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.845279][ T1371] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.855395][ T1371] device bridge_slave_1 entered promiscuous mode [ 52.595344][ T1371] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.602376][ T1371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.609497][ T1371] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.616424][ T1371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.645901][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.653862][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.661444][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.683214][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.692557][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.701169][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.708049][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.715507][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.723794][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.732178][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.739054][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.757511][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.765526][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.773680][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.782346][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.828062][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.837526][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.847519][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.855955][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.864495][ T1371] device veth0_vlan entered promiscuous mode [ 52.872452][ T45] device bridge_slave_1 left promiscuous mode [ 52.878675][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.886581][ T45] device bridge_slave_0 left promiscuous mode [ 52.892689][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.901181][ T45] device veth1_macvtap left promiscuous mode [ 52.907126][ T45] device veth0_vlan left promiscuous mode [ 53.283943][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 53.296959][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 53.435513][ T1371] device veth1_macvtap entered promiscuous mode [ 53.471367][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 53.486058][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 53.524835][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.601879][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 53.610644][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 53.657278][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 53.707441][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 59.380430][ T1625] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.387449][ T1625] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.395165][ T1625] device bridge_slave_0 entered promiscuous mode [ 59.408552][ T1628] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.415868][ T1628] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.423371][ T1628] device bridge_slave_0 entered promiscuous mode [ 59.430267][ T1625] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.437460][ T1625] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.444979][ T1625] device bridge_slave_1 entered promiscuous mode [ 59.451413][ T1628] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.458384][ T1628] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.466067][ T1628] device bridge_slave_1 entered promiscuous mode [ 59.653001][ T1625] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.659876][ T1625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.666963][ T1625] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.673775][ T1625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.920809][ T1628] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.927667][ T1628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.934797][ T1628] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.941580][ T1628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.200825][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.340117][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.369866][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.399674][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.439878][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.508053][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.546988][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.553880][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.631548][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.639698][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.646544][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.726403][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.746943][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.783491][ T1288] device bridge_slave_1 left promiscuous mode [ 60.790382][ T1288] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.799749][ T1288] device bridge_slave_0 left promiscuous mode [ 60.814981][ T1288] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.842037][ T1288] device veth1_macvtap left promiscuous mode [ 60.847995][ T1288] device veth0_vlan left promiscuous mode [ 61.572540][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.583444][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.607773][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.635790][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.661710][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.668577][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.708442][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.735911][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.762804][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.769781][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.802549][ T1625] device veth0_vlan entered promiscuous mode [ 61.819047][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.828073][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.843418][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.851479][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.859872][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.867152][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.893358][ T1625] device veth1_macvtap entered promiscuous mode [ 61.900683][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.908675][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.917718][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.941935][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.951089][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.970549][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.984131][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.005671][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.021577][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.030458][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.067900][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.107074][ T1628] device veth0_vlan entered promiscuous mode [ 62.160503][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.168762][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.187976][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.198727][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.207348][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.214839][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.303095][ T1628] device veth1_macvtap entered promiscuous mode [ 62.342406][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.365804][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.418587][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.494216][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.506515][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.518280][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.629843][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.551730][ T1288] device bridge_slave_1 left promiscuous mode [ 63.557893][ T1288] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.650788][ T1288] device bridge_slave_0 left promiscuous mode [ 63.719548][ T1288] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.790403][ T1288] device veth1_macvtap left promiscuous mode [ 63.796257][ T1288] device veth0_vlan left promiscuous mode [ 104.306939][ T3124] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.314042][ T3124] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.327494][ T3124] device bridge_slave_0 entered promiscuous mode [ 104.340901][ T3124] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.348734][ T3124] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.356088][ T3124] device bridge_slave_1 entered promiscuous mode [ 104.421401][ T3124] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.428298][ T3124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.435411][ T3124] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.442179][ T3124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.454338][ T1521] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.461544][ T1521] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.485873][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.493745][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.508978][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 104.518281][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.526338][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.533199][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.540482][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.550854][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.558954][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.565821][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.603910][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.617895][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.691640][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.753199][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.768785][ T3124] device veth0_vlan entered promiscuous mode [ 104.779858][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 104.788076][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.802880][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 104.898672][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.955891][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.966536][ T408] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.980340][ T3124] device veth1_macvtap entered promiscuous mode [ 104.988053][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 104.996428][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.004576][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.035567][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.054764][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.070549][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.085572][ T2016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.480902][ T10] device bridge_slave_1 left promiscuous mode [ 105.486889][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.562561][ T10] device bridge_slave_0 left promiscuous mode [ 105.603339][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.653916][ T10] device veth1_macvtap left promiscuous mode [ 105.707638][ T10] device veth0_vlan left promiscuous mode [ 122.976669][ T3626] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.083380][ T3626] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.097333][ T3626] device bridge_slave_0 entered promiscuous mode [ 123.132902][ T3626] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.164319][ T3626] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.195172][ T3626] device bridge_slave_1 entered promiscuous mode [ 123.544371][ T3626] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.551315][ T3626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.558376][ T3626] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.565192][ T3626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.610912][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.173793][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.211203][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.245745][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.309719][ T315] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.316616][ T315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.396541][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 124.451313][ T315] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.458195][ T315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 124.544482][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 124.561539][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.706547][ T3626] device veth0_vlan entered promiscuous mode [ 124.738510][ T10] device bridge_slave_1 left promiscuous mode [ 124.744740][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.772830][ T10] device bridge_slave_0 left promiscuous mode [ 124.793028][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.821981][ T10] device veth1_macvtap left promiscuous mode [ 124.847819][ T10] device veth0_vlan left promiscuous mode [ 125.118162][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.129763][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.137620][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.146262][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.156896][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 125.165175][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.199496][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.383058][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.505670][ T3626] device veth1_macvtap entered promiscuous mode [ 125.545381][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.553610][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.563566][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.580569][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.588691][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.596958][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.609881][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.596776][ T4072] syz-executor.3[4072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.596849][ T4072] syz-executor.3[4072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.251713][ T4106] syz-executor.2[4106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.279510][ T4106] syz-executor.2[4106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.928095][ T4147] syz-executor.3[4147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.020104][ T4147] syz-executor.3[4147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.674710][ T4185] syz-executor.0[4185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.704868][ T4185] syz-executor.0[4185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.967305][ T4221] syz-executor.0[4221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.992916][ T4221] syz-executor.0[4221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.681064][ T4260] syz-executor.1[4260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.729918][ T4260] syz-executor.1[4260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.435386][ T4293] syz-executor.0[4293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.460168][ T4293] syz-executor.0[4293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.652090][ T1628] syz-executor.4 (1628) used greatest stack depth: 20880 bytes left [ 157.730432][ T4316] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.782554][ T4316] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.832017][ T4316] device bridge_slave_0 entered promiscuous mode [ 157.852034][ T4316] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.861682][ T4316] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.868981][ T4316] device bridge_slave_1 entered promiscuous mode [ 158.069027][ T4316] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.075933][ T4316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.083167][ T4316] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.089936][ T4316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.271107][ T4316] device veth0_vlan entered promiscuous mode [ 158.285312][ T4316] device veth1_macvtap entered promiscuous mode [ 158.544969][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.554214][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.562974][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.609094][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.648958][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 158.701861][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.747520][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.782032][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.836990][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.878303][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.887783][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.896348][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.527198][ T4339] syz-executor.4[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.527276][ T4339] syz-executor.4[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.181798][ T345] device bridge_slave_1 left promiscuous mode [ 160.216993][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.270085][ T345] device bridge_slave_0 left promiscuous mode [ 160.301869][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.493177][ T345] device veth1_macvtap left promiscuous mode [ 160.499025][ T345] device veth0_vlan left promiscuous mode [ 160.658061][ T4369] syz-executor.0[4369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.658133][ T4369] syz-executor.0[4369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.000634][ T4399] syz-executor.2[4399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.029517][ T4399] syz-executor.2[4399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.365545][ T4439] syz-executor.2[4439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.389565][ T4439] syz-executor.2[4439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.564848][ T4472] syz-executor.2[4472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.605987][ T4472] syz-executor.2[4472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.019361][ C0] sched: RT throttling activated [ 225.798147][ T5625] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.834201][ T5625] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.866430][ T5625] device bridge_slave_0 entered promiscuous mode [ 225.943158][ T5625] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.059274][ T5625] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.085938][ T5625] device bridge_slave_1 entered promiscuous mode [ 226.170228][ T1428] device bridge_slave_1 left promiscuous mode [ 226.177702][ T1428] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.206366][ T1428] device bridge_slave_0 left promiscuous mode [ 226.228328][ T1428] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.260626][ T1428] device veth1_macvtap left promiscuous mode [ 226.281296][ T1428] device veth0_vlan left promiscuous mode [ 227.262960][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.270536][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.289971][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.298365][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.307156][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.314033][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.321501][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.330921][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.338977][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.345849][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.354792][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.362726][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.388968][ T5625] device veth0_vlan entered promiscuous mode [ 227.403045][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.458798][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.469939][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 227.477355][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.485029][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.498986][ T5625] device veth1_macvtap entered promiscuous mode [ 227.520894][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 227.563631][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.611306][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.648574][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.800702][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 284.800719][ T30] audit: type=1400 audit(1717480375.938:113): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 284.936475][ T30] audit: type=1400 audit(1717480375.938:114): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 304.906279][ T6943] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.935231][ T6943] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.961364][ T6943] device bridge_slave_0 entered promiscuous mode [ 305.026355][ T6943] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.056631][ T6943] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.073054][ T6943] device bridge_slave_1 entered promiscuous mode [ 305.305754][ T345] device bridge_slave_1 left promiscuous mode [ 305.311791][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.339804][ T345] device bridge_slave_0 left promiscuous mode [ 305.345786][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.385489][ T345] device veth1_macvtap left promiscuous mode [ 305.476294][ T345] device veth0_vlan left promiscuous mode [ 306.260174][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.275534][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.426653][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.479743][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.488065][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.494949][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.513377][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.539232][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.608991][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.615887][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.733892][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 306.806541][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.899810][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.907309][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.009806][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.023024][ T6943] device veth0_vlan entered promiscuous mode [ 307.056211][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 307.088780][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.157675][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.218124][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.309618][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.358935][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.397091][ T6943] device veth1_macvtap entered promiscuous mode [ 307.441652][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.479755][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.567075][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.603606][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.623323][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.688721][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.739575][ T2794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 474.413872][ T9120] syz-executor.2[9120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.413947][ T9120] syz-executor.2[9120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.959412][ T9157] syz-executor.2[9157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.971031][ T9157] syz-executor.2[9157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.971618][ T9193] syz-executor.0[9193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.997424][ T9193] syz-executor.0[9193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.827632][ T9832] syz-executor.4[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.848081][ T9832] syz-executor.4[9832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.987126][ T9836] syz-executor.0[9836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.006399][ T9836] syz-executor.0[9836] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 536.472207][ T30] audit: type=1400 audit(1717480627.608:115): avc: denied { cpu } for pid=9868 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 536.581269][ T30] audit: type=1400 audit(1717480627.718:116): avc: denied { tracepoint } for pid=9884 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 537.041162][ T9927] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 539.741474][T10014] syz-executor.4[10014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.741548][T10014] syz-executor.4[10014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.777740][ T30] audit: type=1400 audit(1717480630.908:117): avc: denied { write } for pid=10013 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 540.708429][T10048] syz-executor.3[10048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.714318][T10048] syz-executor.3[10048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.277747][T10081] syz-executor.4[10081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.313057][T10081] syz-executor.4[10081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.376661][T10086] syz-executor.1[10086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.453286][T10086] syz-executor.1[10086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.742218][ T30] audit: type=1400 audit(1717480634.878:118): avc: denied { create } for pid=10113 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 543.842268][T10122] syz-executor.1[10122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.849132][T10122] syz-executor.1[10122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.368244][T10166] syz-executor.1[10166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.476602][T10166] syz-executor.1[10166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.326588][T10210] syz-executor.2[10210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.356417][T10210] syz-executor.2[10210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.904869][T10300] device pim6reg1 entered promiscuous mode [ 547.964054][T10307] ------------[ cut here ]------------ [ 547.998904][T10307] trace type BPF program uses run-time allocation [ 548.034357][T10307] WARNING: CPU: 0 PID: 10307 at kernel/bpf/verifier.c:11656 check_map_prog_compatibility+0x6f1/0x890 [ 548.108720][T10307] Modules linked in: [ 548.150138][T10307] CPU: 0 PID: 10307 Comm: syz-executor.2 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 548.225224][T10307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 548.236819][T10307] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 548.243576][T10307] Code: db e9 f9 fc ff ff e8 fe 39 ed ff 31 db e9 ed fc ff ff e8 f2 39 ed ff c6 05 bd 7f 80 05 01 48 c7 c7 a0 be 67 85 e8 0f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 548.263910][T10307] RSP: 0018:ffffc90000d2f348 EFLAGS: 00010246 [ 548.269942][T10307] RAX: 302b0b3bbf19ca00 RBX: 0000000000000001 RCX: 0000000000040000 [ 548.296686][T10307] RDX: ffffc90002335000 RSI: 0000000000000976 RDI: 0000000000000977 [ 548.310099][T10307] RBP: ffffc90000d2f390 R08: ffffffff815760e5 R09: ffffed103ee065e8 [ 548.328582][T10307] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 548.339448][T10307] R13: ffff8881206d0000 R14: ffffc900000c9000 R15: dffffc0000000000 [ 548.352978][T10307] FS: 00007f6a302876c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 548.363332][T10307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 548.378709][T10307] CR2: 00007fbb55a0bf78 CR3: 0000000110098000 CR4: 00000000003506b0 [ 548.387056][T10307] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 548.437794][T10307] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 548.451657][T10307] Call Trace: [ 548.454985][T10307] [ 548.457898][T10307] ? show_regs+0x58/0x60 [ 548.506440][T10307] ? __warn+0x160/0x2f0 [ 548.550658][T10307] ? check_map_prog_compatibility+0x6f1/0x890 [ 548.612766][T10307] ? report_bug+0x3d9/0x5b0 [ 548.663419][T10307] ? check_map_prog_compatibility+0x6f1/0x890 [ 548.684146][T10338] device pim6reg1 entered promiscuous mode [ 548.716588][T10307] ? handle_bug+0x41/0x70 [ 548.770759][T10307] ? exc_invalid_op+0x1b/0x50 [ 548.841857][T10307] ? asm_exc_invalid_op+0x1b/0x20 [ 548.898162][T10307] ? __wake_up_klogd+0xd5/0x110 [ 548.903005][T10307] ? check_map_prog_compatibility+0x6f1/0x890 [ 548.909191][T10307] ? check_map_prog_compatibility+0x6f1/0x890 [ 548.916981][T10307] resolve_pseudo_ldimm64+0x671/0x1240 [ 548.923119][T10307] ? check_attach_btf_id+0xef0/0xef0 [ 548.928418][T10307] ? __mark_reg_known+0x1b0/0x1b0 [ 548.933396][T10307] ? security_capable+0x87/0xb0 [ 548.938180][T10307] bpf_check+0x3174/0x12bf0 [ 548.943273][T10307] ? is_bpf_text_address+0x172/0x190 [ 548.949039][T10307] ? stack_trace_save+0x1c0/0x1c0 [ 548.954122][T10307] ? __kernel_text_address+0x9b/0x110 [ 548.961491][T10307] ? unwind_get_return_address+0x4d/0x90 [ 548.967053][T10307] ? bpf_get_btf_vmlinux+0x60/0x60 [ 548.972737][T10307] ? arch_stack_walk+0xf3/0x140 [ 548.998088][T10307] ? stack_trace_save+0x113/0x1c0 [ 549.007319][T10307] ? stack_trace_snprint+0xf0/0xf0 [ 549.014516][T10307] ? stack_trace_snprint+0xf0/0xf0 [ 549.020464][T10307] ? __stack_depot_save+0x34/0x470 [ 549.035401][T10307] ? ____kasan_kmalloc+0xed/0x110 [ 549.043635][T10307] ? ____kasan_kmalloc+0xdb/0x110 [ 549.078091][T10307] ? __kasan_kmalloc+0x9/0x10 [ 549.117672][T10307] ? kmem_cache_alloc_trace+0x115/0x210 [ 549.163332][T10307] ? selinux_bpf_prog_alloc+0x51/0x140 [ 549.206213][T10307] ? security_bpf_prog_alloc+0x62/0x90 [ 549.226556][T10307] ? bpf_prog_load+0x9ee/0x1b50 [ 549.231354][T10307] ? __sys_bpf+0x4bc/0x760 [ 549.235884][T10307] ? __x64_sys_bpf+0x7c/0x90 [ 549.240364][T10307] ? do_syscall_64+0x3d/0xb0 [ 549.242343][T10356] device vxcan1 entered promiscuous mode [ 549.244766][T10307] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 549.256143][T10307] ? __kasan_kmalloc+0x9/0x10 [ 549.260672][T10307] ? memset+0x35/0x40 [ 549.358199][T10307] ? bpf_obj_name_cpy+0x196/0x1e0 [ 549.399355][T10307] bpf_prog_load+0x12ac/0x1b50 [ 549.404037][T10307] ? map_freeze+0x370/0x370 [ 549.408373][T10307] ? selinux_bpf+0xcb/0x100 [ 549.412792][T10307] ? security_bpf+0x82/0xb0 [ 549.417174][T10307] __sys_bpf+0x4bc/0x760 [ 549.421300][T10307] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 549.426486][T10307] ? __kasan_check_read+0x11/0x20 [ 549.431430][T10307] __x64_sys_bpf+0x7c/0x90 [ 549.435734][T10307] do_syscall_64+0x3d/0xb0 [ 549.442838][T10307] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 549.449547][T10307] RIP: 0033:0x7f6a30f0cf69 [ 549.454175][T10307] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 549.473782][T10307] RSP: 002b:00007f6a302870c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 549.482506][T10307] RAX: ffffffffffffffda RBX: 00007f6a31043fa0 RCX: 00007f6a30f0cf69 [ 549.490433][T10307] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 549.498279][T10307] RBP: 00007f6a30f6a706 R08: 0000000000000000 R09: 0000000000000000 [ 549.508977][T10307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 549.516927][T10307] R13: 000000000000000b R14: 00007f6a31043fa0 R15: 00007ffe0b6fa268 [ 549.550762][T10307] [ 549.553693][T10307] ---[ end trace 6e3def33fa8a1589 ]--- [ 549.617697][T10372] device pim6reg1 entered promiscuous mode [ 549.872933][T10389] device vxcan1 entered promiscuous mode [ 550.538367][T10435] device vxcan1 entered promiscuous mode [ 550.726695][T10436] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.733721][T10436] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.741223][T10436] device bridge_slave_0 entered promiscuous mode [ 550.751430][T10436] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.758375][T10436] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.765952][T10436] device bridge_slave_1 entered promiscuous mode [ 551.125107][T10457] BUG: unable to handle page fault for address: ffffffffff600000 [ 551.132770][T10457] #PF: supervisor read access in kernel mode [ 551.138558][T10457] #PF: error_code(0x0001) - permissions violation [ 551.144807][T10457] PGD 6812067 P4D 6812067 PUD 6814067 PMD 6816067 PTE 8000000006809165 [ 551.152878][T10457] Oops: 0001 [#1] PREEMPT SMP KASAN [ 551.157915][T10457] CPU: 0 PID: 10457 Comm: syz-executor.4 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 551.169461][T10457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 551.179357][T10457] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 551.185425][T10457] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 cb 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 551.204870][T10457] RSP: 0018:ffffc90000d2f030 EFLAGS: 00010292 [ 551.210773][T10457] RAX: 0000000000000002 RBX: 00007ffffffff000 RCX: ffff888119120000 [ 551.218581][T10457] RDX: ffff888119120b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 551.226394][T10457] RBP: ffffc90000d2f068 R08: ffffffff8199a795 R09: ffffed1023224001 [ 551.234207][T10457] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 551.242016][T10457] R13: 0000000000000000 R14: ffffc90000d2f0c8 R15: ffffc90000d2f0d0 [ 551.249830][T10457] FS: 00007fb5dd7fa6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 551.258589][T10457] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 551.265011][T10457] CR2: ffffffffff600000 CR3: 00000001145e6000 CR4: 00000000003506b0 [ 551.272828][T10457] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 551.280637][T10457] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 551.288451][T10457] Call Trace: [ 551.291577][T10457] [ 551.294354][T10457] ? __die_body+0x62/0xb0 [ 551.298520][T10457] ? __die+0x7e/0x90 [ 551.302252][T10457] ? page_fault_oops+0x7f9/0xa90 [ 551.307025][T10457] ? kernelmode_fixup_or_oops+0x270/0x270 [ 551.312577][T10457] ? 0xffffffffa0026904 [ 551.316569][T10457] ? is_bpf_text_address+0x172/0x190 [ 551.321730][T10457] ? __kernel_text_address+0x9b/0x110 [ 551.326899][T10457] ? exc_page_fault+0x521/0x830 [ 551.331594][T10457] ? asm_exc_page_fault+0x27/0x30 [ 551.336448][T10457] ? copy_from_kernel_nofault+0x75/0x2e0 [ 551.341918][T10457] ? copy_from_kernel_nofault+0x86/0x2e0 [ 551.347384][T10457] bpf_probe_read_compat+0x112/0x180 [ 551.352506][T10457] bpf_prog_baa065642a502c00+0x64/0x6fc [ 551.357884][T10457] bpf_trace_run6+0x18d/0x2c0 [ 551.362399][T10457] ? bpf_trace_run5+0x290/0x290 [ 551.367090][T10457] ? ext4_ext_check_inode+0x80/0x80 [ 551.372122][T10457] __bpf_trace_ext4_ext_remove_space_done+0x4a/0x60 [ 551.378547][T10457] ext4_ext_remove_space+0x48b4/0x4a60 [ 551.383839][T10457] ? __kasan_check_write+0x14/0x20 [ 551.388866][T10457] ? ext4_es_insert_extent+0x2ff0/0x2ff0 [ 551.394355][T10457] ? _raw_write_lock+0xa4/0x170 [ 551.399028][T10457] ? __ext4_mark_inode_dirty+0x53c/0x7a0 [ 551.404501][T10457] ? ext4_ext_index_trans_blocks+0x120/0x120 [ 551.410304][T10457] ? ext4_es_remove_extent+0x297/0x460 [ 551.415603][T10457] ? ext4_es_lookup_extent+0x940/0x940 [ 551.420895][T10457] ext4_ext_truncate+0x19a/0x240 [ 551.425679][T10457] ext4_truncate+0x96c/0xfa0 [ 551.430095][T10457] ? __ext4_mark_inode_dirty+0x7a0/0x7a0 [ 551.435570][T10457] ext4_setattr+0xf84/0x1940 [ 551.440072][T10457] ? current_time+0x1af/0x2f0 [ 551.444590][T10457] ? ext4_write_inode+0x730/0x730 [ 551.449462][T10457] notify_change+0xc7a/0xf30 [ 551.453873][T10457] ? cap_inode_need_killpriv+0x51/0x60 [ 551.459170][T10457] do_truncate+0x21c/0x300 [ 551.463435][T10457] ? put_page_bootmem+0x190/0x190 [ 551.468286][T10457] path_openat+0x28ed/0x2f40 [ 551.472714][T10457] ? kmem_cache_free+0x116/0x2e0 [ 551.477482][T10457] ? __kasan_slab_alloc+0xb1/0xe0 [ 551.482340][T10457] ? kmem_cache_alloc+0xf5/0x200 [ 551.487115][T10457] ? getname_flags+0xba/0x520 [ 551.491627][T10457] ? __x64_sys_openat+0x243/0x290 [ 551.496493][T10457] ? do_filp_open+0x460/0x460 [ 551.501020][T10457] do_filp_open+0x21c/0x460 [ 551.505342][T10457] ? vfs_tmpfile+0x2c0/0x2c0 [ 551.509815][T10457] do_sys_openat2+0x13f/0x830 [ 551.514368][T10457] ? do_sys_open+0x220/0x220 [ 551.518791][T10457] ? security_bpf+0x82/0xb0 [ 551.523137][T10457] __x64_sys_openat+0x243/0x290 [ 551.527819][T10457] ? __ia32_sys_open+0x270/0x270 [ 551.532593][T10457] ? __kasan_check_read+0x11/0x20 [ 551.537456][T10457] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 551.542923][T10457] do_syscall_64+0x3d/0xb0 [ 551.547177][T10457] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 551.552904][T10457] RIP: 0033:0x7fb5de47ff69 [ 551.557159][T10457] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 551.576598][T10457] RSP: 002b:00007fb5dd7fa0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 551.584936][T10457] RAX: ffffffffffffffda RBX: 00007fb5de5b6fa0 RCX: 00007fb5de47ff69 [ 551.592752][T10457] RDX: 0000000000007a05 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 551.600564][T10457] RBP: 00007fb5de4dd706 R08: 0000000000000000 R09: 0000000000000000 [ 551.608373][T10457] R10: 0000000000001700 R11: 0000000000000246 R12: 0000000000000000 [ 551.616181][T10457] R13: 000000000000000b R14: 00007fb5de5b6fa0 R15: 00007ffdd3814a48 [ 551.623999][T10457] [ 551.626858][T10457] Modules linked in: [ 551.630609][T10457] CR2: ffffffffff600000 [ 551.634602][T10457] ---[ end trace 6e3def33fa8a158a ]--- [ 551.639878][T10457] RIP: 0010:copy_from_kernel_nofault+0x86/0x2e0 [ 551.645954][T10457] Code: 48 89 55 d0 0f 85 ea 01 00 00 ff 02 bf 07 00 00 00 4c 89 ee e8 cb 92 d6 ff 49 83 fd 07 76 5c 4d 89 fe 49 83 c5 f8 49 83 c7 08 <49> 8b 1c 24 4c 89 f0 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 [ 551.665602][T10457] RSP: 0018:ffffc90000d2f030 EFLAGS: 00010292 [ 551.671509][T10457] RAX: 0000000000000002 RBX: 00007ffffffff000 RCX: ffff888119120000 [ 551.679321][T10457] RDX: ffff888119120b90 RSI: 0000000000000008 RDI: 0000000000000007 [ 551.687257][T10457] RBP: ffffc90000d2f068 R08: ffffffff8199a795 R09: ffffed1023224001 [ 551.695186][T10457] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffffff600000 [ 551.703064][T10457] R13: 0000000000000000 R14: ffffc90000d2f0c8 R15: ffffc90000d2f0d0 [ 551.710876][T10457] FS: 00007fb5dd7fa6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 551.719642][T10457] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 551.726068][T10457] CR2: ffffffffff600000 CR3: 00000001145e6000 CR4: 00000000003506b0 [ 551.733877][T10457] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 551.741697][T10457] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 551.749508][T10457] Kernel panic - not syncing: Fatal exception [ 551.755664][T10457] Kernel Offset: disabled [ 551.759791][T10457] Rebooting in 86400 seconds..