last executing test programs: 1.918905286s ago: executing program 0 (id=4064): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x6, 0x4, 0x4, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000300)="fc15dbf72f1502ba9f177ab53f627d7274ae1d0c11e4a2d17ffa4183412fba241e375f7d3749f66b5661fb838d0bd1ac8c2bc39d85629f1f1d256b11122c7fe58834751410330b1167ecb09245cc859b52c048add767840d952349af565b0141cf5070230865ab4b1a88d4fb5547b624c2ce06feab11f82f7241b6f97108d97d1c", 0x81}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000f8ffffffb7030000084458000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40286608, &(0x7f0000000540)) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x9c, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x65, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095", @ANYRES16=r5], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffe27) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r8}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 1.867634828s ago: executing program 0 (id=4066): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000000000000000000003b810000850000006d0000000700000000", @ANYRESDEC], &(0x7f0000000040)='syzkaller\x00', 0xbf9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000240)='ext4_allocate_blocks\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/13, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x11, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x0, 0x0, 0x2}, 0x48) 1.843902279s ago: executing program 0 (id=4067): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000600)='f2fs_shrink_extent_tree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000005c0)={'macvtap0\x00', @multicast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xc, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), 0x0, 0x0, 0x33, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7, 0xa, 0x10001, 0x9, r5, 0x5, '\x00', r7, 0xffffffffffffffff, 0x2, 0x1, 0x6, 0xc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x20000141, &(0x7f00000007c0)=ANY=[], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0xffffffffffffff9c, 0x10, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mb_release_inode_pa\x00', r9}, 0x10) write$cgroup_subtree(r6, 0x0, 0x32600) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x0, 0x1000, 0xc3, &(0x7f0000000b00)="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", &(0x7f00000002c0)=""/195, 0x271e, 0x0, 0xce, 0x9d, &(0x7f00000004c0)="64773108e5eacd8c0764dffce115df9bfe453297e982737956843fb13781e45852a2bbb17c32c6388c02ff0d8d6eab0d269aec4ef4a3d23138a311b7f9ae320d2215f040c23375dbdee82f1c2655d291ca72f6abe96a79ad871fc25a12e902e8a1844c069b0331e6b4e7ce55cb5551cf647bfc397b5ed4e6921f351a034527006ef8b9428f497e3cba4b9d751adc520d46244e73c38aec5855f8f07a3d3db55309aa936d2ed7619326fb04afba877246ca0cdcf604bbcc5a86fb8d0793b66890a2c1ecab0f45fa672e6d77a38205", &(0x7f00000006c0)="810d41e4b17c561f5f5494f10e4894115aecfa63ab28d332958253f5ca987de154391dac98ea42d2457dce3ab8dfeded2c639a13dde84e06ecafd488f23b56f6d7ca6f9f79d3e571d35e9ac1a15dbd0f57e54314f911f9129a368eb63509083c83c296d0fd33625835e6cfac798f10aac4aa2f544552a5e2efc2ab38d63ca857897ae86a84efc5a28f81ce019df9e4ed78ea20e8d25b4e955e6572578b", 0x2, 0x0, 0xffffff01}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='ext4_sync_file_exit\x00'}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r10 = openat$cgroup(r0, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r10, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 1.779685932s ago: executing program 0 (id=4070): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x11, 0x5, 0x0, 0x0, 0x1, r4, 0x0, '\x00', 0x0, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000200000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x5, 0x0, 0x0, 0x1}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r8}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r6, &(0x7f00000013c0), 0xfffffdef) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r7}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x19, 0x2, 0x1, 0x7, 0x540, 0x1, 0x0, '\x00', 0x0, r9, 0x0, 0x2, 0x3}, 0x48) 1.746758553s ago: executing program 4 (id=4071): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r2, @ANYRES32=r2], 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r5) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYRES16=0x0], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 1.603531568s ago: executing program 4 (id=4073): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x69, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xc3, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x10, 0x12, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x41ec7785, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffe}, @ldst={0x1, 0x0, 0x0, 0x2, 0x8, 0xfffffffffffffff8, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1000, &(0x7f0000001400)=""/4096, 0x100, 0x3b, '\x00', r1, 0x1d, r0, 0x8, &(0x7f0000000640)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x5, 0x6, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)=[r0, r0], &(0x7f0000000700)=[{0x2, 0x5, 0x1, 0xa}, {0x5, 0x5, 0xd}, {0x5, 0x4, 0xe, 0xb}, {0x3, 0x2, 0x6, 0x3}, {0x4, 0x3, 0x4, 0x6}, {0x0, 0x1, 0xc, 0x9}, {0x4, 0x4, 0x1, 0x2}, {0x1, 0x5}], 0x10, 0x80}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, &(0x7f00000013c0), 0xfffffdef) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000018500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000000), 0x20000015) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b70300005e63458f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='ext4_es_insert_delayed_block\x00', r7}, 0x10) 1.55188563s ago: executing program 3 (id=4076): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0], &(0x7f00000001c0)='syzkaller\x00', 0x44, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x102, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000000), 0x400000) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='net_prio.prioidx\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) 866.046916ms ago: executing program 0 (id=4078): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x53, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000003c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0xc3}}, 0x10, &(0x7f0000000a00)=[{&(0x7f00000005c0)="6b6a0f8973c000fa5becb7aa5ba40ff4c2ec24efa4e4516e2394372580e3fe9298d4e48cf506633c3df6b6afcabb7493c2e4d26974032162d6995d45de9a830d1c6ca81449b792d9afd790ed99d5fb8d2d2ff508873dd6885004d63e45bc38be92111e769bcc6c3acfa6f721571c98d674b256c7a42d243775fc99386fbe73b7eba062d0", 0x84}, {&(0x7f00000007c0)="a6a01d28548ae1141fed87d73c8445e5bdcd2b593eb508f58cd77dc5d64873b2cfa6d86b78ffcc6ac46cca64421d4636dcffa61e179c507c6ffad88e4784ea03b402418b72cc77d2cdbd5bc3b96c1325ed7368f3224f7cdc8b313de346f26d836df061432c9eaee087e3390d4f5b48a2eeb7148701a03dfec8340b883746bda40564184f313e3e5bf45064b276c8e25b896c09e347624b97a45cac5427f9dae903eb7b86c59391704a", 0xa9}, {&(0x7f0000000680)="1cee9d6b82b9cd7ac0a1e5d790dc0f61ef8d106487ab70cd4834108a1e89dfe91ff910dab8509d68e32d91c593f1e4d94f299c87c07300ba852cc6e133b7f481acc0518153deed130d5ac30d710bc5", 0x4f}, {&(0x7f0000000880)="1b54b429d17b162aa12b65141d1955a7b86ca8a4e6192f4dae67e2118ab484ee774fe089fb4eb2c13e8de093ed3071a5f1e64d0b0bf520d166f2e4bb495d3de6300e6ad92f2483056b92926c48c182916c22e24c5ab89ff6efaa1c5da4aa0f59519d52d5ebcb4387dd97443f632b76beedfe08d39cf40824ba9b88bec306fc9f25a0057a3ab300f2a9cd1956c96d9802ef30678a2d55bd92594cb7682cbc0e3490", 0xa1}, {&(0x7f0000000940)="7ef36a3ffea6aecc10493f2dc09cfa1c23ef686a1eb20132aecca6b74b305f8d26512462c94c04dd8b52c255d0406868d9fafff14794f68898685ddff90a36a40847c3873d86888015d37e347a0aaa54aa253a692a5979079c8077b3238ebf4a949ddec8ce56d056dd2f634dc37d2b4d86165ab0aeaf47d2bc31630c39911b8035d3b204483c951106933bc1c4ffa0e45f39946ef9fc20f2b263cb3e112cb6f3022d4d3c6a3c66961210", 0xaa}], 0x5, 0x0, 0x0, 0x24000000}, 0x8000) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x6, 0x8, 0xfc, 0x8, 0x0, 0x7, 0x4004, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x1, 0x6d63}, 0xc00, 0x3, 0x1, 0x8, 0x4, 0xb5, 0x7da5, 0x0, 0x9, 0x0, 0x80000000}, 0xffffffffffffffff, 0xe, r3, 0x2) r8 = perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x4, 0x6, 0xdf, 0xae, 0x0, 0x8, 0x99480, 0x16, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x0, @perf_config_ext={0x7, 0x1}, 0xc80, 0x7ff, 0x7b, 0x6, 0x100000001, 0x6, 0x2, 0x0, 0x8001, 0x0, 0x1}, 0xffffffffffffffff, 0x0, r5, 0x5) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 699.311813ms ago: executing program 2 (id=4079): socketpair(0x6, 0x80000, 0x5, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000000000b7080000080000007b8af8ff00000000bfa200000000000087020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000605222327b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYRESOCT=r0, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85100000010000009500000000000000850000007600000095"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xa6, &(0x7f0000000340)=""/166}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x2, 0x4, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800800040000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="00000000e3bc0000b7ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000900)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000004c0)={0x0, 0x7, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote, @remote, @remote, @multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}, @empty]}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0cb97907081175f37538e486dd"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[], 0xffbf) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 697.861753ms ago: executing program 3 (id=4080): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000ec0)=ANY=[@ANYRESOCT=r0, @ANYRES64=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fb000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x5004a391f6992b6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)=ANY=[]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000340)='ext4_discard_blocks\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="b7000000001a0000bfa30000000000000703000000feffff620af0fff8ffffff71a4f0ff00000000ae04020000000000be400300000000006504030001ed00007b130000000000004d44000000000000620a00fe000000007933000000000000b5030000000000009500000000000000023bc065b7a379d17cf9333379fc05000000912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50bec919bc461e91a7168c5181554d1b583c587e436fe275daf51efd601b6bf01c8e8b1b526375ec5dd6fcd82e4fee5bef7af9a0200000000000000e3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f645679c294392cf538b07ce2646cb7798b3e6440c2fbdb00a3e35208b0bb1d2cd871c5548930be3835f2554b4a28610643a98d9ec21ead2ed51b104d4d91af25b84550a7925c3109b151b8b9f75d80000000eda88c658d42ecbf28bf7076c15b463bebc72f526d8e4a9e231d512381e7a78afcb913466aae7f6df70252e79166d858fc152b659da074e1320060d0b11008e59a5923906f88b53987ad1714e72ba7a5b74f0c33d39000d06a59ff61622cfd9aa58fe8d485ae2c0cc65c2a36aaec2477584b6a89adaf17b0a6041bde4cc3ed54d27f777e92b87496e6649cf728d236619074d6ebdf098bc908c423d228a40f9411fe7226a40409d6e37c4f46756d31cb46761bade70063e5291569b33d21dae356e1c51f03fb8a63e089679216da18de0ae564162a27afea62d84f3a10746443d64364f56e24e6d21053d901204a1deeed41556175cbd4041b7d301bcb72652d950ad31928b0b093778b68e2e9853c02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f98928d5e9b94ff9ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cff538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595bcf50ab32d710b651f898ba749e40bc6980fe78683ac5c0c31030699ddd71063b59261b2e1aab1675b34a220488c126aeef5f510a8f1aded94a129e4aec6f8c3a13596c2ea3e2e04cfdce669e51731b2875353193f82ade69d0540059fe6c7fe7c00fb7502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abd47b64a1b304502dda787343ce3c95300000000010000003baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022af46667cf25c5d3038816106dec28eaeb88343261a48a18f562ae00003ea96d10f172c0374d6eed82641687f3b3a70bfeff59d54d1f92ecc4e95dd2d18383117c03987d198899b212c55318294270a1ad10d30fef7c24b78b29d83238273f4fc87afce829ba0f85da6d888f18ea40ab959f6074ab2a4009b9e5f07ab513cdc6c0e57fb1c1ca571380d7b4ead8eaf68b0c5dda0467d35a3807000000b702396df7e0cbe02b6e4114f244a9bf93f04beb72f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ea1e717d29135753208165b9cdbae037f315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d7012c1b45f6ada1ee7baa5b6a686b50f09b7f778af083e055f6138a757ebd0ed91114a6b244f9acf41ac4d73a008364e0602a594817031fc2ff2c32a1989e00f52f8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323a3c3e6e4fd2e016820f78b796a825b3dad9ce7b37507e0b83c3ecd01549bca6a016b3e18a00c748894dc3bfe5efda8b0a477d6a6562fdee45eb16e276dee992094ba9830f6c164179e7d532d86060bea930118d3cae1b8f916b9671b7000000000040f4bee5ad2dea2d14e195265504c05bba38b095e1679f96ddef65ba5de9c8cfb6465ae4165c0689a314a6eb6b36aa705b957edef3035e14b879d4e7dc00624708042e00bf9a7f7ae5f308744770759558e4fcb99c0dc957521ef255362bf2f3966f3754e81fb9bdef22c19f5a49147b85343f9f36bcda9f64b7a5c5b2f5452f5b1de02e6f15c5640bf89d4a74d51dc233dee628c1dfbb5566b98478c174b34eb234481547e484c6af101396b6977dd668b401391c1dc54f2edccf1cabe6be9868d383eb937efdfd9ade018106f544f04fc07ad525497f65fbad3cf145396acf3b0d38e6b46e28d86880fd6f62c373000000000000000000005d194c27cd4d8f6727de79be80fb4493a0ee2e85f59c71dc84311c0f1fb6c87081c7be9355288610c32c2d8c18bf2027212182903687f48262aea54c5f8a315c9aa4a5af1aa2c4007d1baae38c270012b7eb9411ae451204dba30f8321b07a18db97c3e0cf6a15170e515b1cc463a67a5b2b23ec5662ccfa898b8d5075647bdfb390cde56efb8fd42df12c5c8f66bdc58449ec2b38bf12f5f0a49dcbcf4e6f11c47d23fa34793a0000a1cbb1e06e9a8d2449451d7a05ec0a0d3c9716f505ddeba488c60ebf44cac05c2739694359c925148137376dd3f1330ed0e9211f73ee279cc0b5c298422395ce438f48a39ff569375e609f9e904aacc3d8011326d5e4d654c74501cf16bbf72d3984f9b4ef000000003a8a3d49fc837001e4622e58e3a4ef6b55a8dd0680d951cdb6e54ed92a9a6a0e5e494b7b7b0ef4b4bafc5d964551b2a22bfd12b0761ef07a103e51e84917ee44f860b9785e264343f6a80e9318edecf73df6940856cd56c56eb3831445833c701044aaa49439a44a624267580b3c0980d7f87437bf498f6e1915450400000000000000564a02552c0a5fedbcf4da0db6ed03b9dbc224ee76d20aaf1ac74bcb7eb6f202209e64cc4d130dcf6ab3df8ae4911deb4bb5c7df97fc348d151e834be73915f854272f69d88123f666448b6a8e73322b04fffea9cc05e4129debf311c73b4d1a244b1e5b9943028745a0b6477686740ab877315e35624d791e6f71adb1acd3e22cf472ff7e048b16c11c84da9a3b16b92665912132a4dba680052919c20e191311d8092a09f3c609823fed1bd651ce1c34de105790ba2ca3afa26647f66efbf97b109e7226c74e32beb14ff3fd6918e255fc9b42f86b0188cf885afcc9bb77a7fc3ca7ec1015af494add960f8a11422ca005f24006867cd156e0350022943e301b2c07f4d37d07b05ac2fa1f1d5a0d6eb7e992b076bd77509c26034d2a740d578476410b413591884136259693effaf27e7bcfb58efa92625fb9bd68ecca42047f6e7d24b0446ea16a310073c163d1c6aa3ba1fe76b4e88d5f98cc05c6d033e2c28b4990892230d6b4e5c083a601a25145eb22f4f77313117f8147810d95c64fb78b0a000000000000000000000000e92ba8b066e4bd82bb6003d5da8791d838bcd6eefb13000000000000000000000000000000b652ff6fbad82da75114742bc6a27cba894ef490531be709a3a3c81b267dfafa55e6f855200b4e7518682c30f40808cd5bb8f00beb63b4989cc01d8e75a182337b9f9e08430ccec9bda0134d07a9f54b60033182f5d2bb61fd130d65e68bf148d26470060c707a8cf750ca954ee63c78cd975c7f565783383f02edcb7ce4a9ed0c511d18fe32352276d72eefe0d566f97ccae16b3492f60b96574aac4f1862fb6e4932c181dbf8c68ca16b765de9edba0bf5bfb9c4950d19c0bc31db02f374ce62141160436639d4b6cb0033a47ffdc54d55f1136743b1b26946f200000000000000007590ab8f29c7accd9d11786c4ca1271cd2293b572f14a3dfcaa3467f2783fc09e3eee3fa4b82b7b6ce904e05fa797a2f7ff63e4f874bd870821f6460904e05d7a3f8295a9a5fd21e3587b9d9e878c86ba9b66c"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffdbb}, 0x48) 697.345903ms ago: executing program 4 (id=4081): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000fc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x4f}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000014c0)=@bpf_ext={0x1c, 0x1c, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000001100)='GPL\x00', 0x7af6, 0x57, &(0x7f0000001280)=""/87, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001300)={0x5, 0x8, 0xffff, 0x2}, 0x10, 0x3091f, r7, 0x3, 0x0, &(0x7f0000001340)=[{0x2, 0x5, 0x0, 0x1}, {0x1, 0x1, 0x0, 0x9}, {0x1, 0x4, 0x2, 0x7}], 0x10, 0x2}, 0x90) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r9, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) recvmsg(r9, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 550.228129ms ago: executing program 3 (id=4082): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_pid(r1, &(0x7f00000001c0), 0xffbf) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xb8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2009) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @local}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 456.655942ms ago: executing program 1 (id=4083): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x7ff, 0x0, 0x8000, 0x0, 0x1}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)=""/200, 0xe2, 0xc8, 0x0, 0x7fff}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='ext4_evict_inode\x00', r2}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') 447.634663ms ago: executing program 2 (id=4084): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="ed94286f877902162f9bb45f9ab994a3645382387f8c987d5942bed2c11b90e0a67bf60c232c77c80094d1b89bc258d2e404b7c47ec509984ccf5c3e879c209107c5563878dfa819b08e181ff5e811873f63b8144b1f74953b2cfd28603d15c3b72009f25def63e2e706dfba435aa8449bdceb0b9ffcf9adf8dd320018ec429905805fe5c720e8be694f3e3ae51a12f2ede6b322fea6c8abba90b282ebf7da3e4ff3af651052167bc9af12b028096fe56f3092758b2e6030acc01ce599c3bbec529870c639fbb8b79000a546b045b7325fbb8d868830e8c6df04b4160fb6efe34b3231e334", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x0, 0x2, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x0, 0x0}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, 0x0, 0x0) syz_clone(0x84a08040, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000240)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000200), 0x8}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 329.328857ms ago: executing program 1 (id=4085): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000ff0000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000340)=""/234}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000002e00), &(0x7f0000000000), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0x66, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x9, 0x8000, 0xfffffffe, 0x4, r2, 0x8e0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4, 0xc}, 0x48) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xe, 0xf, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000000000000000000000007f400a75e0000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000004b7030000000000008500004e0e2cda00bf0900000000000055090100000000009500000000000000bf91000000000000b70200007c0400008500000084000000b700000000abb2c3186900000095a5e4fa75c895e732a6f51c8da8f3828a06da76bf8910d54bf400d03585368288b278f7edeb5c505eeddf7e15022c2dace2696957c0f6436f0073870fe7cdb3e19f4845f9c8a44137ecf44a71310fc9bf9d5e375b9433228c98c3419f886ac8ef27b67be2e66a0885fa1b93b4eb77345ec56d1bcce468be11c6826a87f737a1840351e700"/235], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='mm_page_free_batched\x00', r4}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="9e", 0x1}], 0x1}, 0x0) recvmsg$unix(r5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00), 0x45}, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5106e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x4, &(0x7f00000001c0)=ANY=[@ANYRES64], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xfffffffffffffe67, &(0x7f0000000800)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfff}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x2, 0x1, 0xffffffffffffffc0}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0x2, 0x0, &(0x7f0000000380)='v8', 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80150, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_bp={&(0x7f0000000280), 0x2}, 0x8016, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe9}, 0x0, 0xfff0000000000003, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 328.724637ms ago: executing program 4 (id=4086): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x0, 0x1009, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r0, &(0x7f0000000000), 0x0}, 0x20) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r2}, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x0, 0x0, 0x0, 0x0, 0x1104, 0x1, 0x8}, 0x48) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000500)="b958945d8ae49c4f19be14f06558", 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) close(r6) sendmsg$unix(r6, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000780)="51eda09b3eb518e85c7a1c008aae37b8e0915181d96a9325287234e4005e7bc5e9baa91c9e25bc875eba85fa7541aaf0a47ada941b3b2abc66d159803ee461bc43bef037f57a7c009b5844077f49a7e8a4d8fe6442c0dc5ec9c6494d5182028d3044ceaf8d7c505b09971134a23ff2c60186e66ed8d6e7e7f1222c4c7df8e5fcef718a5613ed49ded73057f4ae56dae7a914680acee9f0093ef61a71a57a86", 0x9f}, {&(0x7f0000000140)="a96ae92eb0d5f9821861cf43f20f5239bb5649a51d0b9698a96861f32cfd0c4a45419f67452995738486d992f0dc95278b95076524ca4b14", 0x38}, {&(0x7f00000008c0)="7ce8356ae0616209e351279dc3815d8060deb041fb2710271eeb64c2e3a0408cf9fbfb4154030a6c422bcba0500c3a209c742950306a6f4510c2d978d81ed7a1f735ea2133c2a697295c1d37523e43a0952d2c083885895ed71403a841f5147f087b62e5728a2a5b931a32080c557ba52717f17e8a197ee9451369ca4dd4bba7d08e62ba2844cc941a4ac07ab1204a3c066306588473b3aa134aa62aea3b80dd09f9a6ee020301e58e5157a7364929b214a9ec932bccb3351e412a633a4392e2c5ce35f247bd81f589e5bbd5b6768c131b8f497f4d6f31d63f7cc9953f621d26553db41b18353acec2c7b9c1c333f9a9a096a55435de0d8e9d8cee6d4f9003f1e87bc611438899fb9ad7d1458f8a24c6147f6ee932aae7d42649f17c95c8eecf29b2f1e72ce60a138331e17ca074421097232ccf06394fb521d6fea354ac3eeea68b9691ac4a7db5719b7242d61744ebcff5cf358bfd9addf99bd8b81fe7e87eb816f255121e30e00114f62a692932815708dac5740378fb43728e523e906ba117c768df1f255734012e70e4e64d5f6adf896ef40ca91d3627407232af9521a9b7cc4cc101a111d9679aa861afe4b1c188fa9e20c9971f3d104bb82900b6870e14d0edaa8463c12eb11fdc83a841c3db8aae730df1abff42d2e7ae811e04c80e16a8bf8e4dfcfcae269a8661a773045c191c3e3b01860e10b5aab9dcee10b1f18e9d8516df8cf1fbd77c641ec5433f59cbd024db7a4d5783eca315c86000309e4c9050a6929d941585fc427494f79831c238052aa28230af318ec7792509d6363c9530761448d9b7fb4b6b7227da86d1de8320bd1d4251e3d93be6870ba201c1d3045fb096ed067e2f20399b397d68495c6958ee7c23454ecb65d6dacaa9b62b7c534a2ec97f6fba270e12de5e78b10715411899498f6a68f6dba64803beef579fcaaba2b6b24046924478c471f235b6d7e4d584478bffe9ed6a43e956c464b93deadf10abf3f2b2584254c47e7b5caf26064f77c4034c06411be9295863e8946aed689b51bd3f1a8c92625fa26941cf711d01430200a70ff9cdc5709c27510e56bf0a413e036c9d620d51ef2517c3c59a7b31b1e292c1103c02e09e615726042800c26c98fb43e068a778cc3eec144c2e96109d16c473d3924e9281d6b21dee6e76531d60dc51f377ea4f8bad1fb276cde1e9655521d67744e9b8ba032acc6f4ca5946446b63eecbaab8175122f69164042ee925b7dc22dc7209cce64284c91fb4d5084d58736c87fade2774e0db94d4fa82251681835919025b2668a9d665892acd2c5e4c644dc03691e7d5f48a9be4c6fff369f518f39e26bfd97ac5a70eecdca39e7a3776b01fde495ac138845bcc217b0531323ef3524e6959255e91d74768fe56e9c1c374e34b100d077b8cdc81dd8e174456ff4675afec511f5c313f99bbede02e414d90eaaa12f75554ee9d908f4e0d4d85d407ce81a3651a6ad26d7968825b515a4c0722f188588e02533b0b29b0eb417983d15c7162897d107fb2bf4ed255d991372996d18af39f5db0e360aadb155a46eed069d30c73e9c5e10411453f8c8f1471caef3a9087dfe4284983f71810eb29d3a2a90d073e17642ceb5a790e9802fef9347290a9431c6fd590fca0078f30705376757472708802444f6e2801f369a42d031dcfc98d941116e45dbb36af00736a91e18e9f0291f61097dc3ac209524a5cfbe5a1b06371415a3cc5725b9b60ae8c63767d3be5f56c9b4c10f0d4679d383dd174436c4f40a07f033b58f282efd07842d29dbf9038e660f6d92c87a982786b686acd3c237042b7aeadd7042268ee4fdc779ee8b8539b90826c3e7048bc8ca0f98bf3cdfb4cd025d4cdde5ffeab861ab018d1942ddebc8b99d9d1b37607157b2caa82a76cb0012d66d48f531275e41226b6733894c6147ea64f615eeef58100b5014ee20ed565f24abbc4504db5ab35759b0d4476ad52447ac9902dd190af67da2d2099cb2ce8b8efc4cb72eff45a2c22595bb8c6be3e3ebc8851e1ed8cf58f8ae52a7d3d427339b11d8cce6755870b9141b95b79b030d81baeb6f17b0a6462264c9995f025888784ac0b13e7b13e6d397dff7ea6b5f61a69e19a8aa8e3d40b146e5494b0c6d1017036a315faf9209146e3cf69d4e91715f83df88540cf542e388974758594c38255cdc91fe19e9b7c098f1a96a6f91741948b41757e59dfae5faab0f9b9f0e7e76ca3d733b18afb700347e54ce359dea77d4dbc3549b06f0b0dfb38de9b995b991d6767f8f7ccf65bf0dc86e3b6b8e140b712b27f8163b384fcd0d96a8de9a4b20f358d6e9c64d988df36b4a40c69a7c37ba33e2fb197f1b258771365c288f08d5fa48a7b6f5b1470b45b9fba06dbacab683ea7114c712b83c303e45f58247f21af6753773c347bd5f96df19e570333875af64d095d8bc741fadbd2313b5de87a5c02b6c7eca4de170b2343d7bd545273e1fdba9326e6ba62dfca17429b069b870719f929bb19475a8088e0c52cc31b106fa838a67f9f1623af16ad5d0df60ffb73b3649785c439e60fb71877178ba56b6e808fd2722bfb8761ab4f8e07f843441716d6ecd62ce63324cce6a6ef168c24085d884ed0f9b8dce456b4249d83c8e1e2c6304f151a28b1dd9bbac917820a526239ff117b70285ec6be08ba5409609fee9e26e4d86fb39ffc9bb991ce198a371e4da5d62b1915c314c304afe0ec9f8c915a032cdb47b2a1cb3a1b41448f149a672157f07284c6411b46f2fc6a1809038fe791c9873093523a463c79257c93157100b6327ccd3530d7385ff063bd058e432f469acef8b14cdd082058ee9d925343ec3088688c0cb8443bcd0f04a61d4238ad609a877112eccc3b82de00d945580f68fbd6a6b098d24faaf61e17affcdc2dec66affbf6aab7756872171d3ece1b9a2aa4efa1fa265022a95d08aca0132a0769947793a08924f55129e643fe12bd25b1917fc0ba37fa917961977dc0180c6abb637337f18b0fb0b3c0891da4a9c11feb4b711e6938613b5211306deb1450203b49e0a006ec21ede144bfa36b4b051b3003a54eb81e033abd856382b600f6eaf58167511699291afa1fe809bf940cca4d8f4ced3a42b0acf418b6eaa02821f1cf2a5fbd78e0c71da22ab9b54b58b0263267232d4ab5903313b0ba62da2e924b0e7f52a7464614778bdc5c6a1b807131814ef832b0bb09c3f06df2d1df1ae1f7ce67afd38d0cc113d3e5d3eaa1417570efbebd1bb2f4d5e0a08aeaf27ffae4bf62d0381b2286923031495d214b3757c27ae5b42bb34895934799ad64f5b92a2e50f291947001318376811a6d0f140527b1fcbb6e4e1358ff1ca3b4fcdf8529c72edb4c991804b883723e9e5a98d077a4a351e3024e153a166e10ce7f2da01d748472c145485f482853d938cc034672d0b00dcc0cab9e4ddd2d6f5ca7e6af621be21ce9c234fb32d01154748a0eea19446334526109f38d7fcf2ead7bc29176d2fa8ca46715fc205c67cd3038e4f28a5bf0d095dfe5c7a775165c8eb315db474e4d273f92d0dab22bfca57ed3fd013ceff0e49a6bbd196ae77c3bbd39099811db34ae2a4ff5627643df41a271e67972135fceea34a9ce280806d04febe3b4c16d12a945edaf153f2c1d19a05795857bf575954cf540536dca8031ad1a26c97a771915b4bcdd00259db3a0883b07590d166ee95b1d9128456d507585b07a415ca2884c843c712adf8481eaa48e32279492c305820d21ea44638990463e57650e540b434de9bd058a9288752e0d4d394a38297414cb6ba881e1855c75d8df3d5ddc7527916c95d093aef703b34aca93d513ad61ed940a2f9cac41b8d234921b44c4b7e67c43ec19a44130583c521593b1521e7b9b1d9f7727727d982b1b4d3522b5a5d180acbc07b588c9c60fea0e1ae67751e275f7a0e4056fb1603834d4e3ec32615835b104d62454f754357ccd16525f6a819b6482b61f7a5c862c42aa087b413dbf7c531560dbca32c0859b44a3db03c435c680a33f4852dcd78c7a7627d07a64c83c934b64caf9a6ecabc89aa7fafbc611587567e6c425fba6726755f950db7e0ebcd82a523c294324603701efc23c6135584731471b701f6ced148916e6f7730b10a483c42a85acd6b19175af277949cf6f01324298d23c35ea13c677679b2abb0894ccad3bf8629fc984fcd4550fd92085ef7ffedfa042bbf082dff46af3eefa0b05a8b2b31eead0136b1519bff816aaf8ba69262002520ed769f2330845d4efc0e37cd7af7b4ba6643e51c015d2c361ee2c3b09e4d2f8167de6896036d8943bb4aae2d3c426c435ea471eee285f76b3c94fa48245e373a4c0081e43f95cec0ee8a150a30277478ccf014524646c11d38f622abce5e226b183ab669be2183b03c8a75b556b35085bab798ba317c15f0f33e9aca64c37255425b550ac833fa9e0514dd7ee2aa367ae2868d0d80ca09a58336696426a42f9931043ebc35cd4d5a723075c60732899cfb472a9f50c5c8cbff060f7f18ebab749e0e86af016409efe8c4c0157e04c72b470f16cc38dc67485d8a9cd120a8c7de84043c64986ed5c5d6d071a4f83519af73a22ba64872df970f73cfffd263caf311e7ac0137dcb4b6494a5cff3b8b887700c14933c6b21b9f9ab2c8bfec924d7c17f437bbf9c8b0a54ce740cdeb8ebe6ab51388a5e73d44a81dfbeda7f8005ef967a8c5263b2e035e307a55958d3863bbff6e5abdfa607d8872c88288815701f72a81c4667ea0a3da2704b79d045afb8269b81b65d13440aa0fb799b60b52c953080806d67e5792994b038cfc10b339b6ad0e2cbb30bedb14544d403f768873993f0c2714c294a6016bb58d7720c9d137f2e54e7b6d7111aac37c63694b34000164a2aaa7a7f7124c9534bc5b2eb259763127b8065ebec61e773f422c58debe2f51bc6eabdaf0bd5316df30c093b5da0de1f42338885f822b4949e4e25cfa2ce780bc349a15bfa290a158af11a72c30360c28419f79cc79aba65c6e858c5f4ee7193d29bfac795ecc29e77d9b7f72bb4a1466c27c0bf65bb90444e72dc7f0b97d73e213ce55262de458788718d8e6ae5f3018f96025bc98b2ead60db896b35851319e918a4157af7996a996fc803511673a0f9dc5c4aad6c1bdebb455ea33db6261d24f1ed35a77fbf4bde4d5f9789528f779f7e95c75c3ce2e464cb15b48ed86b72ef36b51fe7fca9e6a587067ea003f89545e6d5a83b1def78d615bd64235e971a94f0d9df0214d353932b91c9cb9bbb9fc5ddb24bde7058b2fff201fa0089bd187318039595ccb3355be25d78f58a1b6decaee76e395408a7f435665c24e0b1220b15806d6b9f45bbe0fec15e596272fab5b8560de8ba296b0d7c7fc53a1ce4593d7430382bb616f6672ed89548a95f63009619c14c2bb56c5b89d444651404e50cb5aeae1bc318975e9df63e09f2d209e895b4134be3d572777597ba3d9bf46dc19303cd973e1fc46d549431f2a59137bd1583d5df74a2c5f69828ecdb1295c71ca978d745023a9fdb99fe3a89e9176e978375c180295f6e265dcd55772fcd0bc9f32175fd3f44984dbd9e9bf04edf411ecedccce87f19221f2dac868e12ac14dbadc0dfd5ed9e2ae2b65b5d1c59ea28d0f2041dd9b3004cef03e0ce6efc1c3bfd2db33b6573208172c0fd35857b5aafe42623f156eb119739434ad4a2898adddf28c831ce401f617f7632036fa40f1619b1ec917817d71be285b2015e7facad952037c722a20d7520c057a55c9d2f6fd993601c9a0", 0x1000}, {&(0x7f00000018c0)="93cacb4883dc5264dbe3525968d89a86854b521e543335718954b96c0c067a6e5745d98fc820e955399e1ae3c55f9507381e85abdae6e8887c93fcb585193e6bcb62a8910644963c3b7ed29b292031a9fae8f44a18c6901eeed68ee82e5467902b808f9d26117489b8cd5e8afd5a0e7dfa3ec383b6a215ca1dc5efb012becb563c728c4210368b859c2d457c471d9b281d720fdad01c3a5e127f86e4bf1bc59703159990332671f1ace27ab9d990eee9a4e9", 0xb2}], 0x4, 0x0, 0x0, 0x4810}, 0x4000800) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001980)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x1) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000340), &(0x7f0000000540)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="18020000000000000000000000000100850000005500000085"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000300)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2b80af"], 0xfdef) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)=@generic={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r7, r3, 0x4, r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x1d) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) 323.432307ms ago: executing program 4 (id=4087): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b70300001d0000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000de3295"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_allocate_inode\x00', r3}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@map, 0xffffffffffffffff, 0x22, 0x0, 0x0, @prog_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 310.674848ms ago: executing program 1 (id=4088): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010027cf081000000000000000000081"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, 0x0, 0x2000000e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) 260.68972ms ago: executing program 3 (id=4089): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYRES32=r0, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000080)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x22, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x46, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x1, 0x0, r3, 0x28, '\x00', r4, r5, 0x0, 0x3}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='ext4_allocate_inode\x00', r6}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) 259.881559ms ago: executing program 2 (id=4090): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x3}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="0069109c0000000000040000000000000095000000000000003748803405c6dcee4a6b5cef4bc149004fb3bd1cdf696498dc7cd6bc517e7ced684ab0144f3e4aa2111117ebcb5544c3355598c39a52392819417fd825f7459bc5ac1e33d4311167a8573e96cac9472cde166c73dc8936dfe1bef6fd27261096f97ad9352d87cb90d69a38d80070d761827487d6f637dc1a6bbb954a2204b800905a26bf56dfadac581d8807d553a62e7dade7900e1bb6bc8dca53c72033d1cf84dde9e56d287143da8fdb18c9dee42dba65e982535ca089e2b8b2360ca251abfac66567803da64a2e05866120595090fc"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18001a0000000000000000000000000061120c00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000800000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000001db685000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 258.67671ms ago: executing program 1 (id=4091): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8a07020000f8ffffffb703000008000000b70400000300000095000000000000000000000000000000000000000000000000000000000040288f420a8e0e2c1fedd0264e13199929d673dc0a50d705b85d85ad5b510e6acd12b79d79feacf43971250ec60e97659455ec940a8877f339cc292f766e48265a7625523b9a93485ee8d23086b657a76b330b9e63ab667053d8f475d3fc22a57c6361d569720f3f6174804ff3f154bca466b7b7a40d2ef43b8f70de2964971f17617078d0bc2845a3e4925e01be0415979927e98f6cd1c2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000240), &(0x7f00000002c0)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r3) 182.889803ms ago: executing program 3 (id=4092): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000ec0)=ANY=[@ANYRESOCT=r0, @ANYRES64=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fb000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x5004a391f6992b6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)=ANY=[]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000340)='ext4_discard_blocks\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r9, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffdbb}, 0x48) 182.147483ms ago: executing program 2 (id=4093): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={@map, 0xffffffffffffffff, 0x3f, 0x10}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000080)='./cgroup\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x8, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r5) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0031000000000000b4a518110000", @ANYRES32=r8], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000340)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 171.007483ms ago: executing program 0 (id=4094): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x7, 0x10001, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1d, 0x6, &(0x7f0000000200)=ANY=[@ANYRES32], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, 0x0, 0x0, 0x2677f, 0xffffffffffffffff, 0x3, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000004c0)=[{}, {}, {}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1b, &(0x7f0000000040), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600001785"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00'}, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 162.219653ms ago: executing program 4 (id=4095): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x48}, [@ldst={0x3, 0x3, 0x3, 0xa, 0x0, 0xff00}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f0000000380)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d0000"], 0x0}, 0x90) gettid() r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x46, 0x1, 0x145b, 0x40, r7, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3f, 0x0, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r8, &(0x7f0000000200), 0x42400) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 110.706655ms ago: executing program 1 (id=4096): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x13, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000040000000000000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001830000005000000000000000000000018210000", @ANYRES32=r2, @ANYBLOB="0300000001050000bf9100ff00000000b7020000000000008500000084000019b72200000008000095bccc3974df31a6aa7ce82d6dc0380100a6d7000000"], &(0x7f0000000300)='GPL\x00', 0x3, 0x9c, &(0x7f0000000580)=""/156, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x9, 0x7, 0x26e}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000400)=[{0x1, 0x3, 0x40000010, 0x3}, {0x3, 0x5, 0xe, 0x1}, {0x0, 0x2, 0x7, 0x9}], 0x10, 0xa383}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='ext4_ext_convert_to_initialized_enter\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r9, &(0x7f0000000200), 0x42400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40305829, &(0x7f0000000440)) 110.205485ms ago: executing program 2 (id=4097): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x73) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f00000008c0)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000700)='mm_lru_insertion\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x2, 0x8000, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r8, &(0x7f0000000040), 0x0}, 0x20) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x2000) 79.813547ms ago: executing program 3 (id=4098): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='jbd2_write_superblock\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r7, &(0x7f0000000080), 0x5c43dad4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b70300000000000085000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x4}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x9}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x6}, {0x7, 0x0, 0x0, 0x9}, {}, {0x18, 0x6, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r9}, &(0x7f0000000280), &(0x7f0000000380)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 66.694257ms ago: executing program 1 (id=4099): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x48) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8911, &(0x7f0000000680)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000002000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYRES64=r3, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES64=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008088100b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r8, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454da, &(0x7f0000000340)={'pimreg\x00', 0x400}) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r10}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x5) 0s ago: executing program 2 (id=4100): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x84, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x6d, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdc, &(0x7f00000005c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='blkio.bfq.dequeue\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x14, 0x3, 0x9, 0xfffffffc, 0x80, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000009c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000940), &(0x7f0000000980)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000a00), &(0x7f0000000a40)='%ps \x00'}, 0x20) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x13, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x3, 0xb, 0x7, 0xffffffffffffffc0, 0x8}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @jmp={0x5, 0x0, 0xa, 0x3, 0x4, 0xffffffffffffffc0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000480)='syzkaller\x00', 0xfffffff9, 0x18, &(0x7f00000004c0)=""/24, 0x41100, 0xc, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000840)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x4, 0x8001, 0x74}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000ac0)=[r5, r6, r7], &(0x7f0000000b00)=[{0x0, 0x3, 0xa, 0x6}, {0x1, 0x5, 0xb, 0x2}, {0x2, 0x5, 0xe, 0xa}, {0x4, 0x2, 0x10, 0x8}, {0x0, 0x1, 0xf, 0x9}, {0x1, 0x5, 0x10, 0x1}, {0x4, 0x1, 0x2, 0x3}, {0x0, 0x5, 0xd, 0x3}], 0x10, 0x7ff}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000c80)=@generic={&(0x7f0000000c40)='./file0\x00', r1}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000cc0)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r4, 0x1, 0x0, 0x3}, 0x48) write$cgroup_freezer_state(r4, &(0x7f0000000d40)='THAWED\x00', 0x7) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000d80)={'veth0\x00', 0x400}) unlink(&(0x7f0000000dc0)='./file0\x00') mkdir(&(0x7f0000000e00)='\x00', 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xe, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x6a}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000ec0)='GPL\x00', 0x80, 0xd3, &(0x7f0000000f00)=""/211, 0x40f00, 0x4, '\x00', 0x0, 0x1c, r4, 0x8, &(0x7f0000001000)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001040)={0x3, 0xf, 0x5, 0x2}, 0x10, 0x0, r8, 0x0, &(0x7f0000001080)=[r1, r6, 0xffffffffffffffff, r9], 0x0, 0x10, 0x4}, 0x90) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000011c0)=@generic={&(0x7f0000001180)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000012c0)={r10, &(0x7f0000001200)="14c74ed2f914dd4e15749c405f6a446ba89a0d82888705bcf9adfd5676fcd4ee54ac623b3c0a4245eb4d831ef30cf979c1476427b4e083c68662aee7b2f9beacbdd53bc99380b605ad746d28c43822219ace5a16d9a7", &(0x7f0000001280)=""/25}, 0x20) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001340)={&(0x7f0000001300)='rxrpc_retransmit\x00', r8}, 0x10) r12 = perf_event_open(&(0x7f0000001380)={0x3, 0x80, 0x1, 0x2, 0x5, 0x2, 0x0, 0x1, 0x8, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x100000001, 0x400}, 0x200, 0x1, 0x79b4, 0x6, 0x2, 0xfffffff8, 0x0, 0x0, 0x5}, 0x0, 0xd, r11, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x40082404, &(0x7f0000001400)) r13 = openat$cgroup_int(r4, &(0x7f0000001440)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r13, &(0x7f0000001480)=0x3, 0x12) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0x9, &(0x7f00000014c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x54}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @generic={0x84, 0x5, 0x2, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f0000001540)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41100, 0x3, '\x00', r3, 0x18, r4, 0x8, &(0x7f0000001580)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0x0, 0x1f, 0x6}, 0x10, 0x2a2f9, 0xffffffffffffffff, 0x4, &(0x7f0000001600)=[r4], &(0x7f0000001640)=[{0x3, 0x3, 0xf, 0x7}, {0x5, 0x1, 0x10}, {0x3, 0x1, 0x4, 0x2}, {0x4, 0x3, 0xc, 0x9}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001840)={@map=r7, 0x31, 0x0, 0x1, &(0x7f0000001740)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000001780)=[0x0], &(0x7f00000017c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001800)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001880)={@cgroup=r4, r14, 0x1d, 0x2002, r8, @prog_id=r2, r15}, 0x20) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000018c0)={0xffffffffffffffff, 0x0, 0x10}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001ac0)={r16, &(0x7f0000001900)="498f4d5f78ca3135b84ebfe848edbeb50cffca99fb311915ca2ef5ed9feedb0e9538d051bcec526197e1e6eb320d88ed1478f91e835fd5beef42719254258b10cc832ae00acfc6def474cd00748abf6cc48f3bf06e4d090baf79179718ddca7b74d62f052539d1b560b1529a0294dfb12812b98443643972c09fd4270c26e2ecb4983b9ec73694c08914757cd5f3bf1d15775fd1a79d4b9e154838bb091bda9604fab984016d9fbff26459fbef", &(0x7f00000019c0)=""/194}, 0x20) openat$cgroup_freezer_state(r4, &(0x7f0000001b00), 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b40)={0x2, 0x4, 0x8, 0x1, 0x80, r16, 0x4, '\x00', 0x0, r4, 0x1, 0x5, 0x1}, 0x48) gettid() kernel console output (not intermixed with test programs): [ 11.789535][ T24] audit: type=1400 audit(1719816966.249:62): avc: denied { noatsecure } for pid=217 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.792004][ T24] audit: type=1400 audit(1719816966.249:63): avc: denied { write } for pid=217 comm="sh" path="pipe:[13624]" dev="pipefs" ino=13624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 11.794874][ T24] audit: type=1400 audit(1719816966.249:64): avc: denied { rlimitinh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.797684][ T24] audit: type=1400 audit(1719816966.249:65): avc: denied { siginh } for pid=217 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.147' (ED25519) to the list of known hosts. [ 17.770656][ T24] audit: type=1400 audit(1719816972.229:66): avc: denied { mounton } for pid=271 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 17.771560][ T271] cgroup: Unknown subsys name 'net' [ 17.773679][ T24] audit: type=1400 audit(1719816972.229:67): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.777335][ T24] audit: type=1400 audit(1719816972.229:68): avc: denied { unmount } for pid=271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.777451][ T271] cgroup: Unknown subsys name 'devices' [ 17.866518][ T271] cgroup: Unknown subsys name 'hugetlb' [ 17.871890][ T271] cgroup: Unknown subsys name 'rlimit' [ 18.063331][ T24] audit: type=1400 audit(1719816972.519:69): avc: denied { setattr } for pid=271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.086311][ T24] audit: type=1400 audit(1719816972.519:70): avc: denied { mounton } for pid=271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.090819][ T273] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.110741][ T24] audit: type=1400 audit(1719816972.519:71): avc: denied { mount } for pid=271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.142095][ T24] audit: type=1400 audit(1719816972.579:72): avc: denied { relabelto } for pid=273 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.167358][ T24] audit: type=1400 audit(1719816972.579:73): avc: denied { write } for pid=273 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.194864][ T24] audit: type=1400 audit(1719816972.659:74): avc: denied { read } for pid=271 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.220153][ T24] audit: type=1400 audit(1719816972.659:75): avc: denied { open } for pid=271 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.245923][ T271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.517416][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.524250][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.531614][ T283] device bridge_slave_0 entered promiscuous mode [ 18.546724][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.553543][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.560716][ T279] device bridge_slave_0 entered promiscuous mode [ 18.568979][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.575860][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.582956][ T279] device bridge_slave_1 entered promiscuous mode [ 18.592534][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.599466][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.606493][ T283] device bridge_slave_1 entered promiscuous mode [ 18.614360][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.621259][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.628252][ T281] device bridge_slave_0 entered promiscuous mode [ 18.648323][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.655145][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.662300][ T280] device bridge_slave_0 entered promiscuous mode [ 18.668717][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.675700][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.682719][ T281] device bridge_slave_1 entered promiscuous mode [ 18.697079][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.703897][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.711098][ T280] device bridge_slave_1 entered promiscuous mode [ 18.739592][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.746483][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.753459][ T282] device bridge_slave_0 entered promiscuous mode [ 18.761547][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.768447][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.775552][ T282] device bridge_slave_1 entered promiscuous mode [ 18.852655][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.859498][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.866590][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.873372][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.924844][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.931693][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.938768][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.945577][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.953967][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.960805][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.967882][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.974680][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.994711][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.001554][ T280] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.008652][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.015437][ T280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.036936][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.043762][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.050862][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.057655][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.066244][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.073536][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.080746][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.087660][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.095703][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.102615][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.110569][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.117637][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.124520][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.131542][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.138460][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.155664][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.163281][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.180777][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.188246][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.200696][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.208240][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.216325][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.223131][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.231136][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.239074][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.245899][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.255586][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.277448][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.285874][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.293494][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.301253][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.309238][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.316058][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.323137][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.331037][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.337854][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.344938][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.352867][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.359687][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.373185][ T283] device veth0_vlan entered promiscuous mode [ 19.379362][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.387619][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.395276][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.402374][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.410297][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.429714][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.437652][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.444458][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.451682][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.459833][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.466656][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.473737][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.481626][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.489422][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.497368][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.504176][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.514148][ T280] device veth0_vlan entered promiscuous mode [ 19.523676][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.531753][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.538929][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.547008][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.558815][ T280] device veth1_macvtap entered promiscuous mode [ 19.582307][ T283] device veth1_macvtap entered promiscuous mode [ 19.589224][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.597374][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.605158][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.612451][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.620239][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.628233][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 19.636046][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.643639][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.651442][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.659153][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.667228][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.675176][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.683220][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.691269][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.699260][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.707218][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.715021][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.722839][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.730253][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.738142][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.745826][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.753005][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.764523][ T279] device veth0_vlan entered promiscuous mode [ 19.773375][ T281] device veth0_vlan entered promiscuous mode [ 19.780186][ T282] device veth0_vlan entered promiscuous mode [ 19.787169][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.795053][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.803735][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.811396][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.819162][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.827194][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.835159][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.842792][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.850561][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.857893][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.865045][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.872240][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.885404][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.893369][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.901542][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.909665][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.920482][ T282] device veth1_macvtap entered promiscuous mode [ 19.933747][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.941710][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.949642][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.957743][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.965823][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.973594][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.981484][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.991520][ T279] device veth1_macvtap entered promiscuous mode [ 20.007002][ T281] device veth1_macvtap entered promiscuous mode [ 20.016855][ T280] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.027541][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.034840][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.042344][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.054314][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.062925][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.071278][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.079453][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.087775][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.096125][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.104085][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.134555][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.144441][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.152776][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.161779][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.455545][ C1] hrtimer: interrupt took 36991 ns [ 20.772489][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.779383][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.786845][ T345] device bridge_slave_0 entered promiscuous mode [ 20.794603][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.801592][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.808935][ T345] device bridge_slave_1 entered promiscuous mode [ 20.874019][ T345] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.880897][ T345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.887962][ T345] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.894746][ T345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.917366][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.925145][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.933022][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.960559][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.968476][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.975228][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.982512][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.991046][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.997908][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.005477][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.013221][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.030137][ T345] device veth0_vlan entered promiscuous mode [ 21.040518][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.049144][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.057162][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.064371][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.085706][ T345] device veth1_macvtap entered promiscuous mode [ 21.092815][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.116237][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.126065][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.166234][ T373] device sit0 entered promiscuous mode [ 21.333942][ T386] device syzkaller0 entered promiscuous mode [ 21.351944][ T390] device sit0 left promiscuous mode [ 21.390770][ T390] device sit0 entered promiscuous mode [ 21.591389][ T425] syz.4.45[425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 21.591430][ T425] syz.4.45[425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 21.662991][ T417] device syzkaller0 entered promiscuous mode [ 21.925682][ T431] device syzkaller0 entered promiscuous mode [ 22.554303][ T9] device bridge_slave_1 left promiscuous mode [ 22.583872][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.593573][ T9] device bridge_slave_0 left promiscuous mode [ 22.612089][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.627604][ T9] device veth1_macvtap left promiscuous mode [ 22.642958][ T9] device veth0_vlan left promiscuous mode [ 22.936770][ T462] ¯Ê®¸}p: renamed from pim6reg1 [ 22.964443][ T24] kauditd_printk_skb: 34 callbacks suppressed [ 22.964453][ T24] audit: type=1400 audit(1719816977.419:110): avc: denied { relabelfrom } for pid=453 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 23.056775][ T24] audit: type=1400 audit(1719816977.419:111): avc: denied { relabelto } for pid=453 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 23.429993][ T24] audit: type=1400 audit(1719816977.889:112): avc: denied { setopt } for pid=487 comm="syz.3.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 23.528881][ T491] device syzkaller0 entered promiscuous mode [ 23.992777][ T507] device wg2 entered promiscuous mode [ 24.055293][ T24] audit: type=1400 audit(1719816978.509:113): avc: denied { cpu } for pid=505 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 24.318608][ T543] device syzkaller0 entered promiscuous mode [ 24.429423][ T561] device syzkaller0 entered promiscuous mode [ 24.468874][ T567] device pim6reg1 entered promiscuous mode [ 24.497232][ T24] audit: type=1400 audit(1719816978.959:114): avc: denied { create } for pid=560 comm="syz.2.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 24.569995][ T573] cgroup: syz.4.102 (573) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.587291][ T573] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.614048][ T93] udevd[93]: worker [305] terminated by signal 33 (Unknown signal 33) [ 24.625151][ T93] udevd[93]: worker [305] failed while handling '/devices/virtual/block/loop4' [ 24.644821][ T24] audit: type=1400 audit(1719816979.099:115): avc: denied { create } for pid=578 comm="syz.4.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 24.726868][ T583] syz.0.107[583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.727620][ T583] syz.0.107[583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.760752][ T24] audit: type=1400 audit(1719816979.219:116): avc: denied { create } for pid=593 comm="syz.3.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 24.826916][ T599] device syzkaller0 entered promiscuous mode [ 24.943610][ T607] device pim6reg1 entered promiscuous mode [ 25.574482][ T658] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.655807][ T658] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.662663][ T658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.836181][ T669] ------------[ cut here ]------------ [ 25.846306][ T669] trace type BPF program uses run-time allocation [ 25.882824][ T669] WARNING: CPU: 0 PID: 669 at kernel/bpf/verifier.c:10480 check_map_prog_compatibility+0x65b/0x7c0 [ 25.912090][ T669] Modules linked in: [ 25.920546][ T669] CPU: 0 PID: 669 Comm: syz.3.144 Not tainted 5.10.216-syzkaller-00510-ga4a2b7a82ee4 #0 [ 25.933286][ T669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 25.948683][ T669] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 25.955971][ T669] Code: c8 e9 84 fe ff ff e8 44 f5 ee ff 31 db e9 85 fe ff ff e8 38 f5 ee ff c6 05 0e ee 64 05 01 48 c7 c7 80 6e 45 85 e8 55 7f c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 25.988584][ T669] RSP: 0018:ffffc90000d76f90 EFLAGS: 00010246 [ 26.063118][ T669] RAX: 32bc770e93cfeb00 RBX: ffff88810b90f800 RCX: 0000000000040000 [ 26.081203][ T669] RDX: ffffc90002525000 RSI: 00000000000007c9 RDI: 00000000000007ca [ 26.089067][ T669] RBP: ffffc90000d76fd0 R08: ffffffff81521e68 R09: ffffed103ee0a5f8 [ 26.314376][ T669] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 26.347114][ T690] device syzkaller0 entered promiscuous mode [ 26.353515][ T669] R13: 1ffff92000015604 R14: ffff888116f2c000 R15: ffffc900000ab020 [ 26.372218][ T669] FS: 00007f020d0e76c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 26.382407][ T669] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.397500][ T669] CR2: 00000000200029c0 CR3: 000000011a96f000 CR4: 00000000003506a0 [ 26.405383][ T669] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.413237][ T669] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.423392][ T669] Call Trace: [ 26.426821][ T669] ? show_regs+0x58/0x60 [ 26.432976][ T669] ? __warn+0x160/0x2f0 [ 26.438662][ T669] ? check_map_prog_compatibility+0x65b/0x7c0 [ 26.444587][ T669] ? report_bug+0x3d9/0x5b0 [ 26.454671][ T669] ? check_map_prog_compatibility+0x65b/0x7c0 [ 26.461458][ T669] ? handle_bug+0x41/0x70 [ 26.467561][ T669] ? exc_invalid_op+0x1b/0x50 [ 26.472435][ T669] ? asm_exc_invalid_op+0x12/0x20 [ 26.544329][ T669] ? wake_up_klogd+0xb8/0xf0 [ 26.568777][ T24] audit: type=1400 audit(1719816981.029:117): avc: denied { create } for pid=699 comm="syz.0.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 26.608354][ T669] ? check_map_prog_compatibility+0x65b/0x7c0 [ 26.617303][ T669] ? __fdget+0x1bc/0x240 [ 26.621606][ T669] resolve_pseudo_ldimm64+0x586/0x1020 [ 26.627605][ T669] ? bpf_check+0xf2b0/0xf2b0 [ 26.632409][ T669] ? kvmalloc_node+0x82/0x130 [ 26.637949][ T669] bpf_check+0xaf21/0xf2b0 [ 26.716616][ T669] ? stack_depot_save+0xe/0x10 [ 26.763599][ T669] ? __se_sys_bpf+0x9856/0x11cb0 [ 26.835371][ T669] ? sched_clock+0x3a/0x40 [ 26.839620][ T669] ? bpf_get_btf_vmlinux+0x60/0x60 [ 26.841265][ T24] audit: type=1400 audit(1719816981.299:118): avc: denied { create } for pid=710 comm="syz.2.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 26.844560][ T669] ? __kernel_text_address+0x9b/0x110 [ 26.868991][ T669] ? unwind_get_return_address+0x4d/0x90 [ 26.874425][ T669] ? arch_stack_walk+0xf3/0x140 [ 26.879193][ T669] ? stack_trace_save+0x113/0x1c0 [ 26.883970][ T669] ? stack_trace_snprint+0xf0/0xf0 [ 26.888930][ T669] ? stack_trace_snprint+0xf0/0xf0 [ 26.894882][ T669] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.915703][ T669] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.962801][ T669] ? ____kasan_kmalloc+0xed/0x110 [ 26.967976][ T669] ? ____kasan_kmalloc+0xdb/0x110 [ 26.973324][ T669] ? __kasan_kmalloc+0x9/0x10 [ 27.017075][ T669] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 27.025713][ T669] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.049122][ T669] ? security_bpf_prog_alloc+0x62/0x90 [ 27.090390][ T669] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 27.102178][ T669] ? __x64_sys_bpf+0x7b/0x90 [ 27.107755][ T669] ? do_syscall_64+0x34/0x70 [ 27.112424][ T669] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 27.158860][ T669] ? __kasan_kmalloc+0x9/0x10 [ 27.171819][ T669] __se_sys_bpf+0x107a2/0x11cb0 [ 27.201215][ T669] ? futex_wait+0x6a0/0x7c0 [ 27.207324][ T669] ? __x64_sys_bpf+0x90/0x90 [ 27.220063][ T669] ? do_futex+0x17b0/0x17b0 [ 27.224442][ T669] ? do_futex+0x139a/0x17b0 [ 27.230133][ T669] ? __kasan_check_write+0x14/0x20 [ 27.235104][ T669] ? put_vma+0x8f/0xb0 [ 27.243542][ T24] audit: type=1400 audit(1719816981.699:119): avc: denied { create } for pid=738 comm="syz.2.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.278395][ T669] ? __handle_speculative_fault+0x102e/0x1ec0 [ 27.284309][ T669] ? futex_exit_release+0x1e0/0x1e0 [ 27.289455][ T669] ? finish_fault+0xaf0/0xaf0 [ 27.295306][ T669] ? __kasan_check_write+0x14/0x20 [ 27.300234][ T669] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 27.306743][ T669] ? __se_sys_futex+0x355/0x470 [ 27.311608][ T669] ? __fget_files+0x31e/0x380 [ 27.316132][ T669] ? fpu__clear_all+0x20/0x20 [ 27.320653][ T669] ? __kasan_check_read+0x11/0x20 [ 27.328239][ T669] __x64_sys_bpf+0x7b/0x90 [ 27.336057][ T669] do_syscall_64+0x34/0x70 [ 27.340342][ T669] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 27.351408][ T669] RIP: 0033:0x7f020de65b99 [ 27.355937][ T669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 27.399544][ T669] RSP: 002b:00007f020d0e7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.413692][ T669] RAX: ffffffffffffffda RBX: 00007f020dff3fa0 RCX: 00007f020de65b99 [ 27.424657][ T669] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 27.433217][ T755] device veth1_macvtap left promiscuous mode [ 27.439212][ T755] device macsec0 entered promiscuous mode [ 27.448578][ T669] RBP: 00007f020dee677e R08: 0000000000000000 R09: 0000000000000000 [ 27.458583][ T755] device veth1_macvtap entered promiscuous mode [ 27.464735][ T669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.492140][ T669] R13: 000000000000000b R14: 00007f020dff3fa0 R15: 00007ffcff8713a8 [ 27.509918][ T669] ---[ end trace bd246d899e9016bd ]--- [ 27.629814][ T770] device syzkaller0 entered promiscuous mode [ 28.606530][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.606559][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.636634][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.657826][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.682519][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.699821][ T826] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 28.742154][ T824] syz.4.211[824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 28.824580][ T24] audit: type=1400 audit(1719816983.279:120): avc: denied { create } for pid=843 comm="syz.3.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 28.875269][ T24] audit: type=1400 audit(1719816983.279:121): avc: denied { create } for pid=845 comm="syz.3.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 29.282258][ T878] device pim6reg1 entered promiscuous mode [ 29.580006][ T885] device syzkaller0 entered promiscuous mode [ 29.586664][ T890] syz.2.239[890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.586713][ T890] syz.2.239[890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.618083][ T890] device pim6reg1 entered promiscuous mode [ 29.705899][ T24] audit: type=1400 audit(1719816984.169:122): avc: denied { sys_admin } for pid=895 comm="syz.1.241" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 29.778499][ T909] €Â: renamed from pim6reg1 [ 29.811987][ T24] audit: type=1400 audit(1719816984.269:123): avc: denied { ioctl } for pid=910 comm="syz.3.248" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 30.142508][ T945] device syzkaller0 entered promiscuous mode [ 30.212095][ T24] audit: type=1400 audit(1719816984.669:124): avc: denied { create } for pid=946 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 30.393898][ T958] device syzkaller0 entered promiscuous mode [ 30.677173][ T966] device syzkaller0 entered promiscuous mode [ 30.695418][ T24] audit: type=1400 audit(1719816985.159:125): avc: denied { read } for pid=75 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.760308][ T24] audit: type=1400 audit(1719816985.189:126): avc: denied { create } for pid=965 comm="syz.4.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 30.810706][ T24] audit: type=1400 audit(1719816985.269:127): avc: denied { create } for pid=965 comm="syz.4.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.883509][ T24] audit: type=1400 audit(1719816985.339:128): avc: denied { attach_queue } for pid=974 comm="syz.2.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.978253][ T24] audit: type=1400 audit(1719816985.439:129): avc: denied { read } for pid=983 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.596225][ T1023] device pim6reg1 entered promiscuous mode [ 32.132905][ T1075] device syzkaller0 entered promiscuous mode [ 32.323944][ T1086] device syzkaller0 entered promiscuous mode [ 32.378128][ T1090] ªªªªªª: renamed from vlan0 [ 32.600489][ T1101] device pim6reg1 entered promiscuous mode [ 32.901817][ T1122] device syzkaller0 entered promiscuous mode [ 33.116250][ T1135] tap0: tun_chr_ioctl cmd 1074025677 [ 33.140536][ T1135] tap0: linktype set to 804 [ 33.218142][ T1143] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 33.313596][ T1153] syz.0.351[1153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.318061][ T1153] syz.0.351[1153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.157297][ T1185] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.175313][ T1185] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.207670][ T1185] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.214527][ T1185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.221650][ T1185] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.228409][ T1185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.242603][ T1185] device bridge0 entered promiscuous mode [ 35.570010][ T24] kauditd_printk_skb: 2 callbacks suppressed [ 35.570020][ T24] audit: type=1400 audit(1719816990.029:132): avc: denied { create } for pid=1243 comm="syz.1.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 35.907223][ T1267] device syzkaller0 entered promiscuous mode [ 35.918468][ T24] audit: type=1400 audit(1719816990.379:133): avc: denied { create } for pid=1264 comm="syz.3.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 35.992485][ T1281] syz.3.400[1281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.992534][ T1281] syz.3.400[1281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.107781][ T1279] device pim6reg1 entered promiscuous mode [ 36.601349][ T1294] device syzkaller0 entered promiscuous mode [ 37.253569][ T1333] syz.2.419[1333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.253620][ T1333] syz.2.419[1333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.406678][ T1336] device syzkaller0 entered promiscuous mode [ 37.601767][ T24] audit: type=1400 audit(1719816992.059:134): avc: denied { tracepoint } for pid=1344 comm="syz.2.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 37.757880][ T24] audit: type=1400 audit(1719816992.219:135): avc: denied { setopt } for pid=1348 comm="syz.3.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.102251][ T1383] device syzkaller0 entered promiscuous mode [ 38.301260][ T24] audit: type=1400 audit(1719816992.759:136): avc: denied { write } for pid=1388 comm="syz.3.442" name="cgroup.subtree_control" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 38.394269][ T24] audit: type=1400 audit(1719816992.759:137): avc: denied { open } for pid=1388 comm="syz.3.442" path="" dev="cgroup2" ino=197 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 38.432001][ T1409] device syzkaller0 entered promiscuous mode [ 38.594349][ T1411] device syzkaller0 entered promiscuous mode [ 38.735822][ T1420] syz.0.454 uses obsolete (PF_INET,SOCK_PACKET) [ 38.890494][ T1425] syz.4.456[1425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.890540][ T1425] syz.4.456[1425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.014273][ T1435] wlan0: tun_chr_ioctl cmd 1074025677 [ 39.045083][ T1435] wlan0: linktype set to 1 [ 39.087214][ T1443] device sit0 entered promiscuous mode [ 39.602908][ T1457] device sit0 left promiscuous mode [ 39.998731][ T1492] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 40.491032][ T24] audit: type=1400 audit(1719816994.949:138): avc: denied { create } for pid=1503 comm="syz.0.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 40.551327][ T24] audit: type=1400 audit(1719816994.949:139): avc: denied { create } for pid=1498 comm="syz.3.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.573069][ T1506] device syzkaller0 entered promiscuous mode [ 40.624092][ T1517] device vxcan1 entered promiscuous mode [ 40.689938][ T1519] syz.0.498[1519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.689978][ T1519] syz.0.498[1519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.824778][ T1524] syz.4.501[1524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.916414][ T24] audit: type=1400 audit(1719816995.379:140): avc: denied { create } for pid=1538 comm="syz.2.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 41.918923][ T1573] syz.4.519[1573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.894735][ T1629] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 43.151011][ T1641] device syzkaller0 entered promiscuous mode [ 43.265257][ T1641] geneve1: tun_chr_ioctl cmd 1074025677 [ 43.270808][ T1641] geneve1: linktype set to 1 [ 43.623367][ T1673] device sit0 entered promiscuous mode [ 44.134059][ T1705] device vxcan1 entered promiscuous mode [ 44.590270][ T1734] syz.4.586[1734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.590316][ T1734] syz.4.586[1734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.998370][ T24] audit: type=1400 audit(1719816999.459:141): avc: denied { create } for pid=1755 comm="syz.2.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 45.962904][ T1803] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 46.006176][ T1803] device syzkaller0 entered promiscuous mode [ 46.195781][ T1809] bridge0: port 3(veth0_vlan) entered blocking state [ 46.202453][ T1809] bridge0: port 3(veth0_vlan) entered disabled state [ 46.239791][ T1809] bridge0: port 3(veth0_vlan) entered blocking state [ 46.246330][ T1809] bridge0: port 3(veth0_vlan) entered forwarding state [ 46.262233][ T1807] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 46.798803][ T1842] device syzkaller0 entered promiscuous mode [ 47.582616][ T1858] device pim6reg1 entered promiscuous mode [ 47.695545][ T1868] device sit0 left promiscuous mode [ 48.195998][ T24] audit: type=1400 audit(1719817002.659:142): avc: denied { create } for pid=1887 comm="syz.4.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 49.554132][ T1932] syz.1.665[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.554177][ T1932] syz.1.665[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.635389][ T1932] syz.1.665[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.714418][ T1932] syz.1.665[1932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.857795][ T1978] tap0: tun_chr_ioctl cmd 1074025677 [ 50.896026][ T1978] tap0: linktype set to 780 [ 50.926772][ T1978] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 51.014212][ T24] audit: type=1400 audit(1719817005.469:143): avc: denied { create } for pid=1987 comm="syz.1.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 51.444073][ T2006] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 51.674060][ T24] audit: type=1400 audit(1719817006.129:144): avc: denied { create } for pid=2023 comm="syz.4.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 52.122597][ T2052] device veth0_vlan left promiscuous mode [ 52.175635][ T2052] device veth0_vlan entered promiscuous mode [ 52.535294][ T2088] device pim6reg1 entered promiscuous mode [ 53.298854][ T2111] syz.3.738[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.298903][ T2111] syz.3.738[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.536392][ T2111] syz.3.738[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.555394][ T2111] syz.3.738[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.661499][ T2115] device pim6reg1 entered promiscuous mode [ 53.708890][ T2130] device syzkaller0 entered promiscuous mode [ 54.546361][ T2152] Â: renamed from pim6reg1 [ 55.925292][ T2209] syz.3.775[2209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.925337][ T2209] syz.3.775[2209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.958917][ T2216] syz.0.777[2216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.970233][ T2216] syz.0.777[2216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.016051][ T2216] syz.0.777[2216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.027554][ T2216] syz.0.777[2216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.127306][ T2231] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 67108864 (only 8 groups) [ 56.290117][ T2259] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.297100][ T2259] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.321696][ T93] udevd[93]: worker [588] terminated by signal 32 (Unknown signal 32) [ 56.331789][ T2259] device bridge_slave_1 left promiscuous mode [ 56.339963][ T93] udevd[93]: worker [588] failed while handling '/devices/virtual/block/loop1' [ 56.341858][ T2259] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.356723][ T2259] device bridge_slave_0 left promiscuous mode [ 56.362779][ T2259] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.424438][ T2271] device wlan0 entered promiscuous mode [ 57.475256][ T2313] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.482215][ T2313] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.592575][ T2313] device bridge_slave_1 left promiscuous mode [ 57.599009][ T2313] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.606679][ T2313] device bridge_slave_0 left promiscuous mode [ 57.612722][ T2313] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.939597][ T2356] device syzkaller0 entered promiscuous mode [ 59.179950][ T24] audit: type=1400 audit(1719817013.639:145): avc: denied { create } for pid=2427 comm="syz.2.869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 59.352140][ T24] audit: type=1400 audit(1719817013.809:146): avc: denied { create } for pid=2447 comm="syz.4.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 59.379367][ T2454] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 59.807662][ T2482] device syzkaller0 entered promiscuous mode [ 59.978579][ T2505] device dummy0 entered promiscuous mode [ 60.167347][ T2524] device syzkaller0 entered promiscuous mode [ 60.278261][ T24] audit: type=1400 audit(1719817014.739:147): avc: denied { create } for pid=2536 comm="syz.2.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 60.438164][ T24] audit: type=1400 audit(1719817014.899:148): avc: denied { create } for pid=2540 comm="syz.1.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 61.983686][ T2645] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 62.070756][ T2654] device sit0 left promiscuous mode [ 62.134984][ T2645] device sit0 entered promiscuous mode [ 62.880103][ T24] audit: type=1400 audit(1719817017.339:149): avc: denied { create } for pid=2675 comm="syz.2.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 63.040648][ T2688] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.047832][ T2688] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.205655][ T2688] device bridge0 left promiscuous mode [ 63.259321][ T2688] ÿÿÿÿÿÿ: renamed from bridge0 [ 64.029458][ T2724] device wg2 entered promiscuous mode [ 64.389143][ T2753] device pim6reg1 entered promiscuous mode [ 64.537335][ T2760] device syzkaller0 entered promiscuous mode [ 65.407810][ T2818] syz.0.1027[2818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.407855][ T2818] syz.0.1027[2818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.462627][ T2861] syz.4.1045[2861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.558855][ T2861] syz.4.1045[2861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.586963][ T2862] device syzkaller0 entered promiscuous mode [ 66.722274][ T2862] syz.1.1046[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.722328][ T2862] syz.1.1046[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.753977][ T2862] syz.1.1046[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.765942][ T2862] syz.1.1046[2862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.876083][ T2896] device syzkaller0 entered promiscuous mode [ 66.896492][ T2889] device pim6reg1 entered promiscuous mode [ 67.122476][ T2912] device pim6reg1 entered promiscuous mode [ 67.175031][ T2927] bridge0: port 3(veth0_vlan) entered disabled state [ 67.393547][ T2948] syz.0.1082[2948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.393596][ T2948] syz.0.1082[2948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.670102][ T2960] device sit0 entered promiscuous mode [ 69.124496][ T24] audit: type=1400 audit(1719817023.579:150): avc: denied { append } for pid=3003 comm="syz.2.1100" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 69.173505][ T3002] device syzkaller0 entered promiscuous mode [ 69.180823][ T3008] device wg2 left promiscuous mode [ 69.352774][ T3016] device vxcan1 entered promiscuous mode [ 69.387935][ T3018] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 70.693513][ T3065] macsec0: mtu greater than device maximum [ 71.086059][ T3102] syz.3.1140[3102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.086110][ T3102] syz.3.1140[3102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.114152][ T3120] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.202783][ T3120] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.210314][ T3120] device bridge_slave_0 entered promiscuous mode [ 72.246707][ T3120] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.336724][ T3120] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.370357][ T3120] device bridge_slave_1 entered promiscuous mode [ 72.427540][ T3120] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.434411][ T3120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.441496][ T3120] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.448276][ T3120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.510885][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.520413][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.536631][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.623480][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 72.649834][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.656714][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 72.685437][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 72.716262][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.723117][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 72.851669][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 72.865556][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 72.903696][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 72.933699][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 72.976462][ T3120] device veth0_vlan entered promiscuous mode [ 73.020340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 73.039922][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.083849][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 73.133802][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.198556][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.208364][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.225492][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 73.235899][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.246445][ T3120] device veth1_macvtap entered promiscuous mode [ 73.254964][ T3170] device wg2 left promiscuous mode [ 73.277086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 73.285977][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 73.293988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.375924][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 73.391135][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 73.476938][ T3185] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 73.654697][ T3197] device syzkaller0 entered promiscuous mode [ 73.663413][ T3201] device pim6reg1 entered promiscuous mode [ 73.950606][ T3212] device syzkaller0 entered promiscuous mode [ 73.985301][ T3207] device syzkaller0 entered promiscuous mode [ 74.221904][ T9] device veth1_macvtap left promiscuous mode [ 75.483250][ T3269] syz.3.1203[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.483294][ T3269] syz.3.1203[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.568324][ T3269] syz.3.1203[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.620337][ T3269] syz.3.1203[3269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.929424][ T3292] syz.2.1209[3292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.099639][ T3292] syz.2.1209[3292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.701229][ T3341] syz.4.1229[3341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.726648][ T3341] syz.4.1229[3341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.107814][ T3372] ªªªªªª: renamed from vlan0 [ 77.237916][ T3388] geneve1: tun_chr_ioctl cmd 1074025698 [ 77.326482][ T3393] device veth1_macvtap left promiscuous mode [ 77.858504][ T3410] syz.3.1257[3410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.858550][ T3410] syz.3.1257[3410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.191572][ T3483] device veth1_macvtap left promiscuous mode [ 80.268297][ T3497] syz.3.1291[3497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.268339][ T3497] syz.3.1291[3497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.488127][ T3525] syz.2.1301[3525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.501209][ T3525] syz.2.1301[3525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.520576][ T3525] device pim6reg1 entered promiscuous mode [ 80.856940][ T24] audit: type=1400 audit(1719817035.319:151): avc: denied { ioctl } for pid=3561 comm="syz.2.1319" path="socket:[25766]" dev="sockfs" ino=25766 ioctlcmd=0x54da scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 81.263597][ T3579] €Â: renamed from veth0_vlan [ 81.588501][ T3586] syz.3.1326[3586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.588554][ T3586] syz.3.1326[3586] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.686646][ T3587] syz.3.1326[3587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.698030][ T3587] syz.3.1326[3587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.760138][ T3596] device pim6reg1 entered promiscuous mode [ 83.102022][ T3686] syz.1.1371[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.102063][ T3686] syz.1.1371[3686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.140406][ T3692] syz.0.1372[3692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.152268][ T3692] syz.0.1372[3692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.217739][ T3695] syz.1.1374[3695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.230843][ T3695] syz.1.1374[3695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.456176][ T3708] device sit0 entered promiscuous mode [ 84.534049][ T3754] device syzkaller0 entered promiscuous mode [ 84.705091][ T3782] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 84.778102][ T3790] device pim6reg1 entered promiscuous mode [ 84.803643][ T3794] device veth1_macvtap left promiscuous mode [ 84.809956][ T3794] device macsec0 entered promiscuous mode [ 84.818626][ T3794] device veth1_macvtap entered promiscuous mode [ 86.780863][ T3928] device syzkaller0 entered promiscuous mode [ 87.138162][ T3953] device veth1_macvtap left promiscuous mode [ 87.197954][ T3956] device veth1_macvtap entered promiscuous mode [ 88.037303][ T3991] device pim6reg1 entered promiscuous mode [ 88.137177][ T3995] device syzkaller0 entered promiscuous mode [ 88.254513][ T3996] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.275531][ T3996] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.289776][ T3996] device bridge_slave_0 entered promiscuous mode [ 88.298887][ T3996] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.307719][ T3996] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.315020][ T3996] device bridge_slave_1 entered promiscuous mode [ 88.584915][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.592564][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.605580][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.613591][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.622041][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.628898][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.658743][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.667102][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.675316][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.682174][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.692530][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.704258][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.723883][ T4047] tap0: tun_chr_ioctl cmd 1074025677 [ 88.729217][ T4047] tap0: linktype set to 774 [ 88.733746][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.751026][ T3996] device veth0_vlan entered promiscuous mode [ 88.759593][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 88.768379][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.778812][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.787202][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.799857][ T3996] device veth1_macvtap entered promiscuous mode [ 88.806608][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.818708][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 88.829237][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.047006][ T4090] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 89.053229][ T4086] device vxcan1 entered promiscuous mode [ 89.167627][ T4099] bpf_get_probe_write_proto: 4 callbacks suppressed [ 89.167635][ T4099] syz.1.1540[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.174252][ T4099] syz.1.1540[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.245964][ T4099] syz.1.1540[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.262046][ T4099] syz.1.1540[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.314015][ T9] device bridge_slave_1 left promiscuous mode [ 89.372585][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.407347][ T9] device bridge_slave_0 left promiscuous mode [ 89.435781][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.494772][ T9] device veth1_macvtap left promiscuous mode [ 90.357033][ T4145] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.381495][ T4145] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.390672][ T4145] device bridge_slave_0 entered promiscuous mode [ 90.397541][ T4145] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.404460][ T4145] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.411877][ T4145] device bridge_slave_1 entered promiscuous mode [ 90.564502][ T4145] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.571378][ T4145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.578453][ T4145] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.585251][ T4145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.745690][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.753446][ T4031] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.760621][ T4031] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.776006][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.793727][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.800592][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.977124][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.985103][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.991948][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.999919][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.091233][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.138468][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 91.146879][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.169381][ T4145] device veth0_vlan entered promiscuous mode [ 91.188612][ T9] device bridge_slave_1 left promiscuous mode [ 91.194554][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.210571][ T9] device bridge_slave_0 left promiscuous mode [ 91.217938][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.225870][ T9] device veth1_macvtap left promiscuous mode [ 91.231680][ T9] device veth0_vlan left promiscuous mode [ 91.308039][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.315661][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.340035][ T4145] device veth1_macvtap entered promiscuous mode [ 91.346768][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.353967][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.361567][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.370855][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.379280][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.410457][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.422711][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.432488][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.441187][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.477797][ T4188] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.484641][ T4188] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.498651][ T4188] device bridge_slave_0 entered promiscuous mode [ 91.506011][ T4188] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.512844][ T4188] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.520226][ T4188] device bridge_slave_1 entered promiscuous mode [ 91.568280][ T4188] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.575146][ T4188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.582233][ T4188] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.589036][ T4188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.619441][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 91.637862][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.656187][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.667342][ T4214] syz.0.1583[4214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.692191][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 91.716808][ T412] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.723659][ T412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.731299][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.739568][ T412] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.746421][ T412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.753871][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.761888][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.785573][ T4188] device veth0_vlan entered promiscuous mode [ 91.799388][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.808185][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.816290][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.823627][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.881949][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.894147][ T4188] device veth1_macvtap entered promiscuous mode [ 91.953661][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.965340][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 92.284957][ T4239] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 92.398095][ T4248] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.405068][ T4248] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.414361][ T4248] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.421218][ T4248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.428326][ T4248] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.435084][ T4248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.442728][ T4248] device bridge0 entered promiscuous mode [ 92.597311][ T9] bridge0: port 3(veth0_vlan) entered disabled state [ 92.614961][ T9] device bridge_slave_1 left promiscuous mode [ 92.680694][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.732876][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.978299][ T4270] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 93.470618][ T4311] syz.1.1621[4311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.470821][ T4311] syz.1.1621[4311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.662419][ T4318] device pim6reg1 entered promiscuous mode [ 93.769725][ T4334] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.780145][ T4334] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.789439][ T4334] device bridge_slave_0 entered promiscuous mode [ 93.796151][ T24] audit: type=1400 audit(1719817048.259:152): avc: denied { remove_name } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 93.818405][ T24] audit: type=1400 audit(1719817048.259:153): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.859234][ T4334] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.867644][ T4334] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.874841][ T4334] device bridge_slave_1 entered promiscuous mode [ 93.884281][ T4342] device veth1_macvtap left promiscuous mode [ 93.939106][ T4334] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.945971][ T4334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.953027][ T4334] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.959860][ T4334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.980348][ T4352] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 94.121344][ T412] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.149386][ T412] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.280776][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.288251][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.300191][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.308792][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.321257][ T54] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.328135][ T54] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.342951][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.354069][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.362221][ T54] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.369084][ T54] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.398976][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.407583][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.415519][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.424686][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.438780][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.447052][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.456568][ T4334] device veth0_vlan entered promiscuous mode [ 94.468888][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.476771][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.492970][ T4334] device veth1_macvtap entered promiscuous mode [ 94.505851][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.514127][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.521579][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.530479][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.539544][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.566074][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.574125][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.582828][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.591491][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.774762][ T4405] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 94.790776][ T4405] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 94.805291][ T4405] syzkaller0: linktype set to 65535 [ 94.862883][ T24] audit: type=1400 audit(1719817049.319:154): avc: denied { create } for pid=4410 comm="syz.4.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 95.366412][ T9] device bridge_slave_1 left promiscuous mode [ 95.375436][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.386035][ T4436] syz.3.1671[4436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.386077][ T4436] syz.3.1671[4436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.436778][ T9] device bridge_slave_0 left promiscuous mode [ 95.497342][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.516103][ T9] device veth1_macvtap left promiscuous mode [ 95.521927][ T9] device veth0_vlan left promiscuous mode [ 96.131053][ T4458] IPv6: ¥: Disabled Multicast RS [ 96.313059][ T4470] device pim6reg1 entered promiscuous mode [ 97.352677][ T4519] syz.4.1703[4519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.352872][ T4519] syz.4.1703[4519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.808776][ T4523] device pim6reg1 entered promiscuous mode [ 98.198436][ T4536] device sit0 left promiscuous mode [ 98.218650][ T4536] device sit0 entered promiscuous mode [ 99.283346][ T4560] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 99.428987][ T4573] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 99.656954][ T4581] device syzkaller0 entered promiscuous mode [ 99.955843][ T4600] device syzkaller0 entered promiscuous mode [ 100.424457][ T4638] device syzkaller0 entered promiscuous mode [ 100.779999][ T4675] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 101.850477][ T4727] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 102.686916][ T4766] device pim6reg1 entered promiscuous mode [ 103.704587][ T4820] device pim6reg1 entered promiscuous mode [ 104.835310][ T4881] device vxcan1 entered promiscuous mode [ 104.883656][ T4880] device syzkaller0 entered promiscuous mode [ 104.969884][ T4890] device syzkaller0 entered promiscuous mode [ 105.101639][ T4899] syz.2.1853[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.101738][ T4899] syz.2.1853[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.231707][ T4905] device veth0_vlan left promiscuous mode [ 105.288772][ T4905] device veth0_vlan entered promiscuous mode [ 106.084672][ T4944] device syzkaller0 entered promiscuous mode [ 107.088597][ T4969] syz.4.1879[4969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.088648][ T4969] syz.4.1879[4969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.168677][ T4973] Â: renamed from pim6reg1 [ 107.277728][ T4987] device syzkaller0 entered promiscuous mode [ 107.288357][ T4988] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 107.426780][ T5004] device syzkaller0 entered promiscuous mode [ 108.135957][ T5040] device syz_tun entered promiscuous mode [ 108.775655][ T5067] device pim6reg1 entered promiscuous mode [ 109.480632][ T5095] device syzkaller0 entered promiscuous mode [ 109.607422][ T5112] device pim6reg1 entered promiscuous mode [ 110.478679][ T5140] device syzkaller0 entered promiscuous mode [ 110.659839][ T5146] syz.3.1948[5146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.659881][ T5146] syz.3.1948[5146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.700689][ T24] audit: type=1400 audit(1719817065.159:155): avc: denied { create } for pid=5153 comm="syz.1.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 111.101581][ T5195] device syzkaller0 entered promiscuous mode [ 111.359754][ T5212] device pim6reg1 entered promiscuous mode [ 112.142126][ T5260] syz.4.1997[5260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.142169][ T5260] syz.4.1997[5260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.275512][ T5270] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 112.307716][ T5273] device syzkaller0 entered promiscuous mode [ 112.711346][ T5319] device pim6reg1 entered promiscuous mode [ 112.997675][ T5361] syz.4.2043[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.997721][ T5361] syz.4.2043[5361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.189294][ T5430] device veth0_vlan left promiscuous mode [ 114.208237][ T5430] device veth0_vlan entered promiscuous mode [ 114.481077][ T5453] device syzkaller0 entered promiscuous mode [ 114.503631][ T5462] device wg2 entered promiscuous mode [ 114.677392][ T5482] syz.0.2091[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.677440][ T5482] syz.0.2091[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.699755][ T5482] syz.0.2091[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.721183][ T5482] syz.0.2091[5482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.858124][ T5484] device syzkaller0 entered promiscuous mode [ 115.265144][ T5530] device syzkaller0 entered promiscuous mode [ 115.285021][ T5540] device pim6reg1 entered promiscuous mode [ 116.847189][ T5640] device syzkaller0 entered promiscuous mode [ 117.728988][ T5708] device wg2 left promiscuous mode [ 117.734798][ T5710] device wg2 entered promiscuous mode [ 117.941787][ T5714] device syzkaller0 entered promiscuous mode [ 117.948587][ T1058] syzkaller0: tun_net_xmit 48 [ 117.953876][ T5714] syzkaller0: create flow: hash 2085391737 index 2 [ 117.962663][ T5714] syzkaller0: delete flow: hash 2085391737 index 2 [ 118.071417][ T5731] device syzkaller0 entered promiscuous mode [ 118.632140][ T5761] device syzkaller0 entered promiscuous mode [ 118.995474][ T5771] device syzkaller0 entered promiscuous mode [ 119.170441][ T5791] syz.3.2219[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.170540][ T5791] syz.3.2219[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.252471][ T5791] syz.3.2219[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.264352][ T5791] syz.3.2219[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.310947][ T5797] syz.0.2221[5797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.318366][ T5799] syz.3.2219[5799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.361503][ T5797] syz.0.2221[5797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.520338][ T5807] syz.3.2219[5807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.532804][ T5807] syz.3.2219[5807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.544700][ T5799] syz.3.2219[5799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.580347][ T24] audit: type=1400 audit(1719817074.039:156): avc: denied { create } for pid=5808 comm="syz.1.2225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 120.566681][ T5837] device veth1_macvtap entered promiscuous mode [ 120.595571][ T5837] device macsec0 entered promiscuous mode [ 120.601741][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.716447][ T5898] device macsec0 left promiscuous mode [ 122.250830][ T5947] device syzkaller0 entered promiscuous mode [ 122.283365][ T5951] device syzkaller0 entered promiscuous mode [ 122.393808][ T5962] ªªªªªªÿÿ: renamed from vlan0 [ 124.586928][ T6047] bpf_get_probe_write_proto: 2 callbacks suppressed [ 124.586936][ T6047] syz.1.2322[6047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.601657][ T6047] syz.1.2322[6047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.790337][ T6070] device pim6reg1 entered promiscuous mode [ 124.989331][ T6077] syz.2.2333[6077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.992374][ T6077] syz.2.2333[6077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.629285][ T6104] device pim6reg1 entered promiscuous mode [ 126.087476][ T6152] syz.2.2365[6152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.087525][ T6152] syz.2.2365[6152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.111383][ T6152] syz.2.2365[6152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.122818][ T6152] syz.2.2365[6152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.605714][ T6177] syz.1.2377[6177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.617997][ T6177] syz.1.2377[6177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.621011][ T6173] device syzkaller0 entered promiscuous mode [ 127.484888][ T6220] device syzkaller0 entered promiscuous mode [ 127.584760][ T24] audit: type=1400 audit(1719817082.039:157): avc: denied { write } for pid=6227 comm="syz.1.2397" name="net" dev="proc" ino=35720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 127.719807][ T24] audit: type=1400 audit(1719817082.039:158): avc: denied { add_name } for pid=6227 comm="syz.1.2397" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 127.741098][ T24] audit: type=1400 audit(1719817082.069:159): avc: denied { create } for pid=6227 comm="syz.1.2397" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 127.787443][ T24] audit: type=1400 audit(1719817082.069:160): avc: denied { associate } for pid=6227 comm="syz.1.2397" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 127.809418][ T24] audit: type=1400 audit(1719817082.129:161): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.843437][ T24] audit: type=1400 audit(1719817082.129:162): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.871769][ T24] audit: type=1400 audit(1719817082.129:163): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.892180][ T6237] device syzkaller0 entered promiscuous mode [ 127.928054][ T6242] device pim6reg1 entered promiscuous mode [ 127.967516][ T6246] device lo entered promiscuous mode [ 128.044578][ T6259] device wg2 entered promiscuous mode [ 128.236411][ T6272] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 128.349639][ T6282] device wg2 entered promiscuous mode [ 128.383030][ T6284] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 128.565985][ T6310] device sit0 entered promiscuous mode [ 129.040204][ T6355] device syzkaller0 entered promiscuous mode [ 129.878878][ T6393] bpf_get_probe_write_proto: 12 callbacks suppressed [ 129.878886][ T6393] syz.3.2469[6393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.907335][ T6385] device syzkaller0 entered promiscuous mode [ 129.912473][ T6393] syz.3.2469[6393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.239408][ T6511] device syzkaller0 entered promiscuous mode [ 132.424256][ T6524] syz.3.2519[6524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.424323][ T6524] syz.3.2519[6524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.130395][ T6540] device syzkaller0 entered promiscuous mode [ 134.178131][ T6603] device pim6reg1 entered promiscuous mode [ 134.291251][ T6618] device wg2 entered promiscuous mode [ 134.539272][ T6651] syz.4.2574[6651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.539300][ T6651] syz.4.2574[6651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.584592][ T6651] device pim6reg1 entered promiscuous mode [ 134.629149][ T6659] device syzkaller0 entered promiscuous mode [ 135.175474][ T6703] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 135.548160][ T6738] device syzkaller0 entered promiscuous mode [ 135.635751][ T6748] device wg2 left promiscuous mode [ 135.651411][ T6748] device wg2 entered promiscuous mode [ 135.657119][ T6749] syz.2.2617[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.657181][ T6749] syz.2.2617[6749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.361912][ T6976] device pim6reg1 entered promiscuous mode [ 141.519352][ T6991] device syzkaller0 entered promiscuous mode [ 141.755749][ T7018] device pim6reg1 entered promiscuous mode [ 142.012113][ T7044] device syzkaller0 entered promiscuous mode [ 142.077616][ T7055] device pim6reg1 entered promiscuous mode [ 142.555796][ T7089] device syzkaller0 entered promiscuous mode [ 142.929345][ T7124] device pim6reg1 entered promiscuous mode [ 143.150357][ T7136] device veth1_macvtap left promiscuous mode [ 143.175769][ T7136] device macsec0 left promiscuous mode [ 143.497515][ T7192] device wg2 left promiscuous mode [ 143.517806][ T7192] device wg2 entered promiscuous mode [ 143.981246][ T7222] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 145.476807][ T7340] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.484303][ T7340] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.492659][ T7340] device bridge_slave_0 entered promiscuous mode [ 145.503351][ T7340] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.510377][ T7340] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.517748][ T7340] device bridge_slave_1 entered promiscuous mode [ 145.583743][ T7340] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.590624][ T7340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.597714][ T7340] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.604479][ T7340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.654592][ T412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.664004][ T412] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.735577][ T412] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.776716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.784687][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.791562][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.798813][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.807380][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.814209][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.834772][ T7340] device veth0_vlan entered promiscuous mode [ 145.844382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 145.853338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 145.861305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 145.869689][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.877239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.884966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 145.902299][ T7340] device veth1_macvtap entered promiscuous mode [ 145.910732][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.942832][ T1175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.954196][ T1175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.153092][ T7372] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 146.180667][ T7372] pim6reg0: linktype set to 773 [ 149.090073][ T7494] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 149.192241][ T7505] device veth1_macvtap left promiscuous mode [ 149.208670][ T7505] device veth1_macvtap entered promiscuous mode [ 149.229046][ T7505] device macsec0 entered promiscuous mode [ 149.244002][ T1740] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.997048][ T7631] €Â: renamed from pim6reg1 [ 151.712939][ T7678] device syzkaller0 entered promiscuous mode [ 151.980787][ T7676] device syzkaller0 entered promiscuous mode [ 152.232222][ T7697] tun0: tun_chr_ioctl cmd 1074812118 [ 153.488445][ T7727] syz.3.3019[7727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.488490][ T7727] syz.3.3019[7727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.994143][ T7756] device syzkaller0 entered promiscuous mode [ 154.699334][ T24] audit: type=1400 audit(1719817109.159:164): avc: denied { create } for pid=7781 comm="syz.0.3040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 156.176677][ T7806] device syzkaller0 entered promiscuous mode [ 158.262094][ T7904] device syzkaller0 entered promiscuous mode [ 159.098136][ T7916] device syzkaller0 entered promiscuous mode [ 160.029002][ T7892] device syzkaller0 entered promiscuous mode [ 160.356617][ T24] audit: type=1400 audit(1719817114.809:165): avc: denied { create } for pid=7953 comm="syz.2.3103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 160.527959][ T7971] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.534810][ T7971] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.542053][ T7971] device bridge_slave_0 entered promiscuous mode [ 160.548687][ T7971] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.556102][ T7971] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.563334][ T7971] device bridge_slave_1 entered promiscuous mode [ 160.802035][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.813433][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.850174][ T7384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.862154][ T7384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.879025][ T7384] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.885895][ T7384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.912622][ T7384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.939646][ T7384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.963992][ T7384] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.970886][ T7384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.030387][ T7990] device wg2 left promiscuous mode [ 161.051131][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.062975][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.096414][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.131768][ T7971] device veth0_vlan entered promiscuous mode [ 161.273582][ T7990] device wg2 entered promiscuous mode [ 161.349012][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.392555][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.495550][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.502802][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.517096][ T7971] device veth1_macvtap entered promiscuous mode [ 161.534047][ T7384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.601492][ T8007] syz.3.3123[8007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.601531][ T8007] syz.3.3123[8007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.614896][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.674635][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.683198][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.700266][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.375934][ T9] device bridge_slave_1 left promiscuous mode [ 162.387336][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.400484][ T9] device bridge_slave_0 left promiscuous mode [ 162.412939][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.428519][ T9] device veth1_macvtap left promiscuous mode [ 162.439765][ T9] device veth0_vlan left promiscuous mode [ 163.570081][ T8108] device wg2 left promiscuous mode [ 164.057691][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 164.114616][ T8149] vlan1: mtu greater than device maximum [ 164.209871][ T8153] device syzkaller0 entered promiscuous mode [ 165.659867][ T8232] device syzkaller0 entered promiscuous mode [ 165.669722][ T8234] device wg2 left promiscuous mode [ 166.253782][ T8251] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.303569][ T8251] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.369110][ T8251] device bridge_slave_0 entered promiscuous mode [ 166.377030][ T8256] syz.1.3220[8256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.377078][ T8256] syz.1.3220[8256] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.417078][ T8251] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.566657][ T8251] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.574023][ T8251] device bridge_slave_1 entered promiscuous mode [ 166.709440][ T8270] device vxcan1 entered promiscuous mode [ 166.747356][ T8251] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.754220][ T8251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.761320][ T8251] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.768108][ T8251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.795821][ T8280] device veth1_macvtap left promiscuous mode [ 166.818625][ T8280] device veth1_macvtap entered promiscuous mode [ 166.840664][ T7378] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.852464][ T7378] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.879752][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.890220][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.909299][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.916172][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.930451][ T284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.991811][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.998690][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.147441][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.157259][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.167717][ T8288] ¯Ê®¸}p: renamed from pim6reg1 [ 167.180770][ T8291] device syzkaller0 entered promiscuous mode [ 167.193277][ T8251] device veth0_vlan entered promiscuous mode [ 167.204478][ T8293] device wg2 left promiscuous mode [ 167.210262][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.218783][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.226969][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.234530][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.244110][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.251404][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.271307][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.288589][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.297941][ T8251] device veth1_macvtap entered promiscuous mode [ 167.338017][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.346738][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.355848][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.371260][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.381829][ T4039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.764269][ T8346] device sit0 entered promiscuous mode [ 167.809186][ T8351] syz.3.3258[8351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.809237][ T8351] syz.3.3258[8351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.937954][ T8351] syz.3.3258[8351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.076592][ T8351] syz.3.3258[8351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.281246][ T8356] syz.3.3258[8356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.458037][ T8356] syz.3.3258[8356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.591091][ T8372] device sit0 left promiscuous mode [ 168.683586][ T8370] device syzkaller0 entered promiscuous mode [ 169.176403][ T8411] syz.4.3281[8411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.176447][ T8411] syz.4.3281[8411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.237438][ T110] device bridge_slave_1 left promiscuous mode [ 169.278260][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.295099][ T8416] syz.1.3282[8416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.296090][ T8416] syz.1.3282[8416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.338688][ T110] device bridge_slave_0 left promiscuous mode [ 169.395914][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.557874][ T8437] device syzkaller0 entered promiscuous mode [ 170.689264][ T8500] device syzkaller0 entered promiscuous mode [ 170.799842][ T8513] device syzkaller0 entered promiscuous mode [ 170.943637][ T8531] device syzkaller0 entered promiscuous mode [ 171.023030][ T8543] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 171.451813][ T8584] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.459281][ T8584] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.466514][ T8584] device bridge_slave_0 entered promiscuous mode [ 171.473240][ T8584] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.480202][ T8584] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.487383][ T8584] device bridge_slave_1 entered promiscuous mode [ 171.538948][ T8584] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.545822][ T8584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.552884][ T8584] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.559703][ T8584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.604913][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.638368][ T7378] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.677682][ T7378] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.716328][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.725045][ T4031] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.731920][ T4031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.739496][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.747714][ T4031] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.754592][ T4031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.762577][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.770463][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.787969][ T8604] device pim6reg1 entered promiscuous mode [ 171.805996][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 171.814442][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.832174][ T8584] device veth0_vlan entered promiscuous mode [ 171.838817][ T2366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.847023][ T2366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.867233][ T8584] device veth1_macvtap entered promiscuous mode [ 171.878045][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.885629][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.892957][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.901483][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.910701][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.925329][ T2366] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.946241][ T2366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.965779][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.973786][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.452754][ T8642] device syzkaller0 entered promiscuous mode [ 173.006941][ T9] device bridge_slave_1 left promiscuous mode [ 173.015356][ T9] ÿÿÿÿÿÿ: port 2(bridge_slave_1) entered disabled state [ 173.060600][ T9] device bridge_slave_0 left promiscuous mode [ 173.083242][ T9] ÿÿÿÿÿÿ: port 1(bridge_slave_0) entered disabled state [ 173.130112][ T9] device veth1_macvtap left promiscuous mode [ 173.546090][ T8690] device pim6reg1 entered promiscuous mode [ 174.038627][ T8735] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 174.117435][ T8731] bpf_get_probe_write_proto: 6 callbacks suppressed [ 174.117904][ T8731] syz.3.3416[8731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.127340][ T8731] syz.3.3416[8731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.165011][ T8736] syz.3.3416[8736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.185626][ T8736] syz.3.3416[8736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.326252][ T8743] device syzkaller0 entered promiscuous mode [ 174.480771][ T8743] syzkaller0: refused to change device tx_queue_len [ 175.238392][ T8802] device vxcan1 entered promiscuous mode [ 176.337389][ T8843] device veth1_macvtap left promiscuous mode [ 176.501023][ T8851] device sit0 entered promiscuous mode [ 177.254730][ T8916] syz.4.3485[8916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.254778][ T8916] syz.4.3485[8916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.121618][ T8958] device pim6reg1 entered promiscuous mode [ 179.271480][ T9007] device syzkaller0 entered promiscuous mode [ 179.424955][ T9026] : renamed from ipvlan1 [ 179.450691][ T9024] device syzkaller0 entered promiscuous mode [ 180.063003][ T9055] syz.3.3545[9055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.063045][ T9055] syz.3.3545[9055] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.189793][ T9060] syz.3.3545[9060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.225259][ T9060] syz.3.3545[9060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.281202][ T9118] syz.0.3569[9118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.298900][ T9118] syz.0.3569[9118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.300460][ T9121] device pim6reg1 entered promiscuous mode [ 181.362469][ T9122] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.369731][ T9122] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.377778][ T9122] device bridge_slave_0 entered promiscuous mode [ 181.385526][ T9122] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.392390][ T9122] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.399848][ T9122] device bridge_slave_1 entered promiscuous mode [ 181.440315][ T9122] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.447281][ T9122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.454319][ T9122] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.461156][ T9122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.482876][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.492677][ T4033] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.501018][ T4033] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.525862][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.533864][ T4031] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.540719][ T4031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.548081][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.556545][ T4031] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.563390][ T4031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.570714][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.591232][ T4031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.599668][ T9148] device pim6reg1 entered promiscuous mode [ 181.609083][ T4033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.627901][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.653832][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.661255][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.675656][ T9122] device veth0_vlan entered promiscuous mode [ 181.709428][ T9122] device veth1_macvtap entered promiscuous mode [ 181.776585][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.838252][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.847270][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.970602][ T9165] device syzkaller0 entered promiscuous mode [ 182.728732][ T110] device bridge_slave_1 left promiscuous mode [ 182.741732][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.892840][ T110] device bridge_slave_0 left promiscuous mode [ 182.934738][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.006332][ T110] device veth1_macvtap left promiscuous mode [ 183.012155][ T110] device veth0_vlan left promiscuous mode [ 183.233921][ T9227] syz.3.3615[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.233971][ T9227] syz.3.3615[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.249333][ T9227] syz.3.3615[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.275324][ T9227] syz.3.3615[9227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.766989][ T9265] device veth0_vlan left promiscuous mode [ 183.784329][ T9265] device veth0_vlan entered promiscuous mode [ 184.047535][ T9283] device wg2 entered promiscuous mode [ 184.569485][ T9340] device syzkaller0 entered promiscuous mode [ 185.144821][ T9376] device syzkaller0 entered promiscuous mode [ 185.191417][ T9382] ªªªªªª: renamed from vlan0 [ 186.204226][ T9466] device syzkaller0 entered promiscuous mode [ 186.648368][ T9515] device syzkaller0 entered promiscuous mode [ 186.730682][ T9519] device veth0_vlan left promiscuous mode [ 186.740929][ T9519] device veth0_vlan entered promiscuous mode [ 188.907959][ T9607] device pim6reg1 entered promiscuous mode [ 190.354754][ T9672] device syzkaller0 entered promiscuous mode [ 190.431149][ T9675] device sit0 entered promiscuous mode [ 191.397603][ T9700] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 192.043920][ T9766] tap0: tun_chr_ioctl cmd 1074025673 [ 192.111589][ T9780] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 63 (only 8 groups) [ 192.127756][ T9784] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 192.976572][ T9815] device syzkaller0 entered promiscuous mode [ 193.482748][ T9852] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.489660][ T9852] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.497096][ T9852] device bridge_slave_0 entered promiscuous mode [ 193.503775][ T9852] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.510716][ T9852] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.517785][ T9852] device bridge_slave_1 entered promiscuous mode [ 193.558898][ T9852] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.565752][ T9852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.572880][ T9852] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.579639][ T9852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.597068][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.604400][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.611686][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.620961][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.628927][ T7378] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.635765][ T7378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.652701][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.660637][ T7378] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.667473][ T7378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.674837][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.682559][ T7378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.691119][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.702924][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.711195][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.718715][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.739404][ T9852] device veth0_vlan entered promiscuous mode [ 193.752981][ T9852] device veth1_macvtap entered promiscuous mode [ 193.760545][ T9857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.792623][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.802237][ T9859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.845247][ T9868] device syzkaller0 entered promiscuous mode [ 194.904467][ T9913] bpf_get_probe_write_proto: 2 callbacks suppressed [ 194.904474][ T9913] syz.2.3898[9913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.911201][ T9913] syz.2.3898[9913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.077527][ T24] audit: type=1400 audit(1719817149.519:166): avc: denied { setattr } for pid=9916 comm="syz.2.3900" path="/dev/net/tun" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 195.418785][ T9] device bridge_slave_1 left promiscuous mode [ 195.425944][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.451807][ T9] device bridge_slave_0 left promiscuous mode [ 195.459206][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.491127][ T9] device veth1_macvtap left promiscuous mode [ 195.515290][ T9] device veth0_vlan left promiscuous mode [ 195.656303][ T9964] €Â: renamed from pim6reg1 [ 195.669211][ T9966] device pim6reg1 entered promiscuous mode [ 195.704992][ T9972] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4294967295 (only 8 groups) [ 195.861217][ T9986] device syzkaller0 entered promiscuous mode [ 195.975862][T10011] lo: mtu less than device minimum [ 196.027739][T10015] syz.2.3937[10015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.027783][T10015] syz.2.3937[10015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.124697][T10063] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 198.410683][T10140] device syzkaller0 entered promiscuous mode [ 198.501663][T10145] device pim6reg1 entered promiscuous mode [ 198.687683][T10172] syz.0.4003[10172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.687877][T10172] syz.0.4003[10172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.716818][T10172] syz.0.4003[10172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.604601][T10198] device syzkaller0 entered promiscuous mode [ 200.373379][T10246] syz.1.4033[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.373427][T10246] syz.1.4033[10246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.564777][ T24] audit: type=1400 audit(1719817155.019:167): avc: denied { create } for pid=10262 comm="syz.3.4038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 200.889499][T10292] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.896586][T10292] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.903803][T10292] device bridge_slave_0 entered promiscuous mode [ 200.910909][T10292] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.917881][T10292] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.925091][T10292] device bridge_slave_1 entered promiscuous mode [ 200.966178][T10292] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.973013][T10292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.980147][T10292] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.986916][T10292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.012053][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.019692][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.027357][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.036401][ T9997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.044630][ T9997] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.051506][ T9997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.060215][ T7380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.068359][ T7380] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.075210][ T7380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.096534][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.104193][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.117937][ T7380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.137119][T10292] device veth0_vlan entered promiscuous mode [ 201.143595][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.151666][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.163141][T10292] device veth1_macvtap entered promiscuous mode [ 201.169776][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.177323][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.184529][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.192483][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.200472][T10003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.215603][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.223857][ T7386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.235707][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.243957][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.292534][T10309] device syzkaller0 entered promiscuous mode [ 201.356473][T10318] device syzkaller0 entered promiscuous mode [ 201.403065][T10324] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 201.466080][T10328] device sit0 left promiscuous mode [ 201.478113][T10326] device sit0 entered promiscuous mode [ 201.546345][ T1170] device bridge_slave_1 left promiscuous mode [ 201.552345][ T1170] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.563097][ T1170] device bridge_slave_0 left promiscuous mode [ 201.574425][ T1170] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.819909][T10368] device syzkaller0 entered promiscuous mode [ 202.949999][T10382] device syzkaller0 entered promiscuous mode [ 203.119770][T10401] device pim6reg1 entered promiscuous mode [ 203.172284][T10406] device pim6reg1 entered promiscuous mode SYZFAIL: SIGSEGV sig:7 handler:0x7f75eda3e460 pc:0x7f75eda52fb5 addr:0x7f75e9204ffc (errno 9: Bad file descriptor)