last executing test programs: 1.957513519s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) 1.826711971s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRESHEX=0x0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="26b1b15f48e3ca8a82f5248b", @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000002a18f6f8452e4036f4b843476cae8a1b9370666d59534cf37a45e11155fda7b242d38c2211e60d06c5fdf7a91d19aa9c4b4e460265d3ada8f32339389c21d6fe2449d2f142aed673c60d7b98e29db819a658d62d436da80fbde0700ef1b3c807f61470b160310aaa6787872d71a7d3"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0a9201880b"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1ab8ff00000000bfa100000000000007010000f0ffffffb702000000000000b703000000000000850000007300001a29b6a231dc13cea4c2d132579c8e79f80a23431cdf96c81c4619bf8c785dfb8c58d8bc00"/131], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='qdisc_dequeue\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) openat$cgroup_pressure(r4, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) 1.111528298s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}) 1.081566962s ago: executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xaa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r1, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)=[0x0], 0x0, 0x0, 0x0, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x14, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x40000102) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000a80)="009ec1e73f6da57f6095fd6f7d6fbd042000006c4976cefe5533f2c358d2320e177a", 0x1}], 0x4}, 0x8001) 1.020363013s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) ioctl$SIOCSIFHWADDR(r3, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x0, 0xc2, 0x5}}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x40086602, &(0x7f0000000540)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x1, 0x8008, 0x8, 0x11}, 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r11, &(0x7f0000000100), 0x1001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r11, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_pid(r10, &(0x7f0000000340), 0xfdef) 998.923726ms ago: executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 990.179547ms ago: executing program 1: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000240)='ext4_da_reserve_space\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.throttle.io_service_bytes\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) 954.501923ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18660027bc08fb00000000000000000081"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 929.164798ms ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x0, 0xfff}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000400000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x18, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, r1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd63728864"], 0xe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r7}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) 879.951096ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001340)=""/4096, 0x1000}, {0x0}], 0x5}, 0x2021) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0308004d8c71ef288563"], 0xffdd) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) write$cgroup_devices(r5, 0x0, 0xffdd) 875.696096ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xfff, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000356, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000889eb32a6d6a107d0700000000100000bb7f1a00c600feff0000000a950000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r6 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r6, 0x0, 0x8) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(r7, &(0x7f00000006c0)='blkio.bfq.sectors\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x40086607, 0x20001412) perf_event_open$cgroup(&(0x7f00000004c0)={0x3, 0x80, 0xff, 0x4, 0x5, 0x6, 0x0, 0x8, 0x100, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x4}, 0x8820, 0x100000000, 0x8, 0x0, 0x3f, 0x400, 0x1, 0x0, 0xd6, 0x0, 0x101}, r8, 0xc, r4, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x41009432, &(0x7f00000005c0)) 868.406277ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x6, 0x2, 0x4, 0xd, r0, 0x3f}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110040", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x8, 0x4, 0x3ff, 0x3461, 0xffffffffffffffff, 0xffffffe0, '\x00', r6, 0xffffffffffffffff, 0x2, 0x1, 0x3, 0xf}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNDETACHFILTER(r8, 0xb701, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[], 0xfffffdef) 690.099597ms ago: executing program 0: socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000002100000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x93}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x4e, 0x0, 0xffffffffffffffff, 0x3000000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002080a47b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000001300)='./cgroup/../file0/file0\x00', 0x0, 0x4000}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r6 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='}}%\'\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) 580.508534ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}) 542.051871ms ago: executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 533.265272ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 483.92866ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, r0, 0x0, 0x0, 0x0}, 0x30) 468.256373ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) 453.007545ms ago: executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x9) 441.253627ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="c30000000000000095000000000000006902dbbb4fc91175d48539036639128dcecd57ee74535b07294c75d5aea60dbc414a837678ca94bc8b56ee7e0dabe1c12026b6a8ef58cf060ce0643b00058092d37436a85b4c0eb1dfacedf1d4e67d58482315b156115da62cb9c153ad91017b5fde2387e3e7ad56138aac547c4c9b144a06aa69a295cee56281b4f6e94b06b230a5dc8e821c5d73efa57c0342895691e6d2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) openat$cgroup_int(r2, 0x0, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x27) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x2b}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call]}, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r5}, 0x10) write$cgroup_type(r0, &(0x7f0000000140), 0x9) 430.890189ms ago: executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0xffffffffffffff93}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xf, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 409.764302ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x7}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {}, {0x18, 0x7, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x7}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 343.066754ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x38, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000008000000060000000000000e010007000000000000000000010000060400000006000000000000000000000000005f00"], &(0x7f00000001c0)=""/131, 0x44, 0x83, 0x1}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)={&(0x7f0000000080)=@abs={0x1}, 0x6e, 0x0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x220500, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'vlan1\x00', 0x1}) ioctl$TUNSETOFFLOAD(r3, 0x40047440, 0x20004002) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0xfffffdef) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x145000, 0x0) 318.657667ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x0, 0xfff}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000400000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x18, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, r1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd63728864"], 0xe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r7}, &(0x7f0000000d80), &(0x7f0000000dc0)}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) 289.438022ms ago: executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000002100000850000008600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x93}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x4e, 0x0, 0xffffffffffffffff, 0x3000000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002080a47b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000a000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000001300)='./cgroup/../file0/file0\x00', 0x0, 0x4000}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000500)='cgroup.threads\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r5, &(0x7f0000000040), 0x12) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) r6 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='}}%\'\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) close(r7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) 257.314198ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x6, 0x2, 0x4, 0xd, r0, 0x3f}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110040", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x8, 0x4, 0x3ff, 0x3461, 0xffffffffffffffff, 0xffffffe0, '\x00', r6, 0xffffffffffffffff, 0x2, 0x1, 0x3, 0xf}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r8 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNDETACHFILTER(r8, 0xb701, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r9, &(0x7f0000000140)=ANY=[], 0xfffffdef) 189.843268ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb70300000883d700b7040000000000008500000033000000850000000700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 146.957835ms ago: executing program 4: unlink(&(0x7f00000019c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001980)=',(\xec\xef\x89.\nV\x96\xff\x84\xeb\xdf\xa8=\xc3\xea\xd2\x02b\xd1x\'\xc1\x82b\x93\xd7\x96\xca\xec\x04\x18KW\x94\xd7B\xa8\x0e\xb2\x89`>\x90\xfc\x7f\xa7o\xc2\xf5\x1fAZ\xac\xea\x84i\xd3P\xaeoW\x9f\xf6f\xd2\x1f\x1c~\xbb\x8a\xe0\xa3\nCXkI\xed\x14\x0e\xd8}\x1a\x98\x93s*\tH\x1a\xde7\xb9;\x02\xbb\'\xcd\xaf\xeav\xeb\x87@\f\xae\xc669\xfe\xbfh\xd4\xe1\x17\a|\xd6\f\xe4\xe3\x02\xb6E\xf5\xd0\xbf\x1bKuk\x91^\v]qR\xce\n\xf3M\xb0a\xa76\x14\x98\x8fy\x9a\x1a\x7f\x99\x1c\xa5\xeag\xb7\x9b\x12\x8b$\xeb\xcb@\xf8I\x93\xb1\xbe\f2$\xb4\x16ca\xedN@7\xae\xb6\x0e\x92O\x97') 48.618992ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}) 0s ago: executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000240)='ext4_da_reserve_space\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.throttle.io_service_bytes\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) kernel console output (not intermixed with test programs): [ 15.362861][ T28] audit: type=1400 audit(1718509886.807:63): avc: denied { write } for pid=228 comm="sh" path="pipe:[12546]" dev="pipefs" ino=12546 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 15.366231][ T28] audit: type=1400 audit(1718509886.807:64): avc: denied { rlimitinh } for pid=228 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.370063][ T28] audit: type=1400 audit(1718509886.807:65): avc: denied { siginh } for pid=228 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.255' (ED25519) to the list of known hosts. 2024/06/16 03:51:34 fuzzer started 2024/06/16 03:51:34 dialing manager at 10.128.0.163:30014 [ 22.860202][ T28] audit: type=1400 audit(1718509894.307:66): avc: denied { node_bind } for pid=286 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.880745][ T28] audit: type=1400 audit(1718509894.317:67): avc: denied { name_bind } for pid=286 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 22.927257][ T28] audit: type=1400 audit(1718509894.377:68): avc: denied { mounton } for pid=297 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.952036][ T297] cgroup: Unknown subsys name 'net' [ 22.955794][ T28] audit: type=1400 audit(1718509894.387:69): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.980231][ T297] cgroup: Unknown subsys name 'devices' [ 22.985762][ T28] audit: type=1400 audit(1718509894.387:70): avc: denied { mounton } for pid=299 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.987111][ T302] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 23.011098][ T28] audit: type=1400 audit(1718509894.387:71): avc: denied { mount } for pid=299 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.041654][ T28] audit: type=1400 audit(1718509894.407:72): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.064262][ T28] audit: type=1400 audit(1718509894.407:73): avc: denied { unmount } for pid=297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 23.084091][ T28] audit: type=1400 audit(1718509894.477:74): avc: denied { relabelto } for pid=302 comm="mkswap" name="swap-file" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.086724][ T301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.109577][ T28] audit: type=1400 audit(1718509894.477:75): avc: denied { write } for pid=302 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.200952][ T297] cgroup: Unknown subsys name 'hugetlb' [ 23.206669][ T297] cgroup: Unknown subsys name 'rlimit' 2024/06/16 03:51:34 starting 5 executor processes [ 23.713133][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.720068][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.727153][ T310] device bridge_slave_0 entered promiscuous mode [ 23.735537][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.742448][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.749560][ T310] device bridge_slave_1 entered promiscuous mode [ 23.799213][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.806067][ T316] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.813459][ T316] device bridge_slave_0 entered promiscuous mode [ 23.832538][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.839567][ T316] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.846835][ T316] device bridge_slave_1 entered promiscuous mode [ 23.884591][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.891473][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.898564][ T312] device bridge_slave_0 entered promiscuous mode [ 23.907078][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.913970][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.921180][ T312] device bridge_slave_1 entered promiscuous mode [ 23.927541][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.934401][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.941620][ T311] device bridge_slave_0 entered promiscuous mode [ 23.948248][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.955121][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.962282][ T311] device bridge_slave_1 entered promiscuous mode [ 24.002982][ T318] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.009871][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.016958][ T318] device bridge_slave_0 entered promiscuous mode [ 24.026922][ T318] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.033907][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.041344][ T318] device bridge_slave_1 entered promiscuous mode [ 24.186904][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.193788][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.200892][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.207655][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.232867][ T316] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.239741][ T316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.246828][ T316] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.253722][ T316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.270411][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.277258][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.284376][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.291159][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.316466][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.323354][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.330449][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.337215][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.368830][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.376090][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.383275][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.390278][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.397206][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.404563][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.411542][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.418484][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.426210][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.433513][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.456137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.464276][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.471130][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.478364][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.486951][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.493811][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.519160][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.527282][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.550705][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.558936][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.566949][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.574999][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.581837][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.589381][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.597318][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.604159][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.611293][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.619186][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.626012][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.633228][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.641174][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.648001][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.655210][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.671622][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.679411][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.687307][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.694073][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.701242][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.709591][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.716453][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.730975][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.738828][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.746629][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.754529][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.762551][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.770793][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.778479][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.786712][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.812263][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.819735][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.826997][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.834965][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.842742][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.851547][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.859649][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.866471][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.873684][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.881564][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.889377][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.897412][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.905457][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.912306][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.919511][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.927343][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.935169][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.943072][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.960569][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.968755][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.977170][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.984947][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.993114][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.000477][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.012221][ T312] device veth0_vlan entered promiscuous mode [ 25.025398][ T310] device veth0_vlan entered promiscuous mode [ 25.031495][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.039910][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.048012][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.055840][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.063710][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.071455][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.079420][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.086742][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.094103][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.101295][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.111625][ T312] device veth1_macvtap entered promiscuous mode [ 25.125584][ T311] device veth0_vlan entered promiscuous mode [ 25.133019][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.141638][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.150165][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.158110][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.168169][ T318] device veth0_vlan entered promiscuous mode [ 25.181706][ T316] device veth0_vlan entered promiscuous mode [ 25.191579][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.199373][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.207348][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.215577][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.224120][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.232344][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.239963][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.247740][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.255067][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.262385][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.269680][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.282709][ T316] device veth1_macvtap entered promiscuous mode [ 25.289355][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.297355][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.305483][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.321770][ T311] device veth1_macvtap entered promiscuous mode [ 25.341186][ T318] device veth1_macvtap entered promiscuous mode [ 25.349349][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.357389][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.368271][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.377253][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.385505][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.393834][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.401979][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.411761][ T310] device veth1_macvtap entered promiscuous mode [ 25.418634][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.426398][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.435938][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.460165][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.471268][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.479694][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.487800][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.496690][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.499019][ C1] hrtimer: interrupt took 26030 ns [ 25.504964][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.558102][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.578841][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.596461][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.617804][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.654458][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.696764][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.758864][ T355] device pim6reg1 entered promiscuous mode [ 26.379904][ T404] device pim6reg1 entered promiscuous mode [ 27.758901][ T471] device pim6reg1 entered promiscuous mode [ 28.005466][ T483] syz-executor.4 (483) used greatest stack depth: 21080 bytes left [ 28.217425][ T506] device pim6reg1 entered promiscuous mode [ 28.665972][ T548] device pim6reg1 entered promiscuous mode [ 28.687660][ T547] device pim6reg1 entered promiscuous mode [ 29.199957][ T576] device pim6reg1 entered promiscuous mode [ 29.744724][ T625] device pim6reg1 entered promiscuous mode [ 29.834645][ T632] device pim6reg1 entered promiscuous mode [ 30.299664][ T657] device pim6reg1 entered promiscuous mode [ 30.427645][ T681] device pim6reg1 entered promiscuous mode [ 30.732504][ T695] device pim6reg1 entered promiscuous mode [ 30.952704][ T717] syz-executor.2[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.952772][ T717] syz-executor.2[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.012255][ T717] syz-executor.2[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.025306][ T717] syz-executor.2[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.144922][ T733] device pim6reg1 entered promiscuous mode [ 31.195689][ T745] device pim6reg1 entered promiscuous mode [ 31.522382][ T763] syz-executor.2[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.522468][ T763] syz-executor.2[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.561404][ T763] syz-executor.2[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.572979][ T763] syz-executor.2[763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.789920][ T786] device veth1_macvtap left promiscuous mode [ 31.825800][ T786] device veth1_macvtap entered promiscuous mode [ 31.832436][ T786] device macsec0 entered promiscuous mode [ 31.895835][ T792] syz-executor.0[792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.895908][ T792] syz-executor.0[792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.944268][ T796] device pim6reg1 entered promiscuous mode [ 32.418560][ T815] device veth1_macvtap left promiscuous mode [ 32.438624][ T815] device macsec0 left promiscuous mode [ 32.499852][ T815] device veth1_macvtap entered promiscuous mode [ 32.515311][ T815] device macsec0 entered promiscuous mode [ 32.727204][ T849] device veth1_macvtap left promiscuous mode [ 32.799494][ T849] device veth1_macvtap entered promiscuous mode [ 32.826167][ T849] device macsec0 entered promiscuous mode [ 33.043301][ T881] device veth1_macvtap left promiscuous mode [ 33.053967][ T881] device macsec0 left promiscuous mode [ 33.073374][ T881] device veth1_macvtap entered promiscuous mode [ 33.090403][ T881] device macsec0 entered promiscuous mode [ 33.275194][ T907] device veth1_macvtap left promiscuous mode [ 33.339062][ T907] device veth1_macvtap entered promiscuous mode [ 33.377116][ T907] device macsec0 entered promiscuous mode [ 33.418146][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.736954][ T941] device veth1_macvtap left promiscuous mode [ 33.753797][ T941] device macsec0 left promiscuous mode [ 33.791067][ T941] device veth1_macvtap entered promiscuous mode [ 33.797264][ T941] device macsec0 entered promiscuous mode [ 34.107845][ T962] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.114845][ T962] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.123135][ T962] device bridge_slave_0 entered promiscuous mode [ 34.134641][ T962] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.161835][ T962] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.170305][ T962] device bridge_slave_1 entered promiscuous mode [ 34.294209][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 34.294224][ T28] audit: type=1400 audit(1718509905.747:107): avc: denied { read } for pid=987 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.614628][ T28] audit: type=1400 audit(1718509905.777:108): avc: denied { open } for pid=987 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.637898][ T28] audit: type=1400 audit(1718509905.777:109): avc: denied { ioctl } for pid=987 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.662974][ T388] device bridge_slave_1 left promiscuous mode [ 34.668917][ T388] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.688482][ T388] device bridge_slave_0 left promiscuous mode [ 34.694614][ T388] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.705472][ T388] device veth1_macvtap left promiscuous mode [ 34.711722][ T388] device veth0_vlan left promiscuous mode [ 34.750704][ T28] audit: type=1400 audit(1718509906.207:110): avc: denied { cpu } for pid=1002 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.172896][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.197754][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.219732][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 35.227955][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.236413][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.243286][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.251307][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 35.259520][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.267572][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.274432][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.281954][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.289862][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.360745][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.373163][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.382787][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.390642][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.397997][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 35.406619][ T962] device veth0_vlan entered promiscuous mode [ 35.423172][ T962] device veth1_macvtap entered promiscuous mode [ 35.449755][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 35.457872][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 35.477769][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.485899][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 35.494485][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 35.502779][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 35.523187][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.160461][ T1202] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.167360][ T1202] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.178921][ T1202] device bridge_slave_0 entered promiscuous mode [ 37.229742][ T1202] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.239085][ T1202] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.246455][ T1202] device bridge_slave_1 entered promiscuous mode [ 37.762446][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.770341][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.788256][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.797322][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.805625][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.812511][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.834744][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.848625][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.863431][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.870419][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.904839][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.915728][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.942186][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.958805][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 37.972361][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.998337][ T1202] device veth0_vlan entered promiscuous mode [ 38.057607][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.082761][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.123053][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.139806][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.156781][ T43] device bridge_slave_1 left promiscuous mode [ 38.195496][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.224102][ T43] device bridge_slave_0 left promiscuous mode [ 38.248526][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.256810][ T43] device veth1_macvtap left promiscuous mode [ 38.263651][ T43] device veth0_vlan left promiscuous mode [ 38.345184][ T1202] device veth1_macvtap entered promiscuous mode [ 38.352297][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.360564][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.367737][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.378138][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.386315][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.396985][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.448090][ T362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.004102][ T1428] device syzkaller0 entered promiscuous mode [ 41.037439][ T1445] device syzkaller0 entered promiscuous mode [ 41.544496][ T1472] device syzkaller0 entered promiscuous mode [ 41.672147][ T1497] device syzkaller0 entered promiscuous mode [ 41.760569][ T1511] device sit0 entered promiscuous mode [ 42.096028][ T1530] device syzkaller0 entered promiscuous mode [ 42.275734][ T1556] device syzkaller0 entered promiscuous mode [ 42.504748][ T1583] device syzkaller0 entered promiscuous mode [ 42.561554][ T1590] device pim6reg1 entered promiscuous mode [ 42.578994][ T1569] device sit0 entered promiscuous mode [ 42.646256][ T1591] device syzkaller0 entered promiscuous mode [ 43.146733][ T1620] device syzkaller0 entered promiscuous mode [ 43.178379][ T1622] device syzkaller0 entered promiscuous mode [ 43.294912][ T1626] device pim6reg1 entered promiscuous mode [ 43.486293][ T1642] device sit0 left promiscuous mode [ 43.696091][ T1648] device syzkaller0 entered promiscuous mode [ 43.709203][ T1656] device sit0 entered promiscuous mode [ 43.767628][ T1658] device syzkaller0 entered promiscuous mode [ 43.787207][ T1659] device syzkaller0 entered promiscuous mode [ 43.894987][ T1671] device pim6reg1 entered promiscuous mode [ 44.296410][ T1703] device syzkaller0 entered promiscuous mode [ 44.388681][ T1701] device syzkaller0 entered promiscuous mode [ 44.400841][ T1696] device sit0 entered promiscuous mode [ 44.519995][ T1715] device syzkaller0 entered promiscuous mode [ 44.530770][ T1716] device pim6reg1 entered promiscuous mode [ 44.912011][ T1747] device syzkaller0 entered promiscuous mode [ 45.098897][ T1746] device sit0 entered promiscuous mode [ 45.140655][ T1752] device syzkaller0 entered promiscuous mode [ 45.158570][ T1737] syz-executor.0 (1737) used greatest stack depth: 20696 bytes left [ 45.257182][ T1765] device syzkaller0 entered promiscuous mode [ 45.263771][ T1767] device pim6reg1 entered promiscuous mode [ 45.458804][ T1779] device syzkaller0 entered promiscuous mode [ 45.621999][ T1797] device sit0 left promiscuous mode [ 45.967153][ T1841] device syzkaller0 entered promiscuous mode [ 46.162112][ T1831] device sit0 entered promiscuous mode [ 46.623800][ T1879] device syzkaller0 entered promiscuous mode [ 46.658629][ T1880] device sit0 entered promiscuous mode [ 47.238065][ T1924] device sit0 left promiscuous mode [ 47.374300][ T1940] device sit0 entered promiscuous mode [ 47.812425][ T1983] device sit0 left promiscuous mode [ 47.934854][ T1983] device sit0 entered promiscuous mode [ 48.628559][ T2035] device syzkaller0 entered promiscuous mode [ 48.710513][ T2031] device sit0 left promiscuous mode [ 49.146350][ T2047] device sit0 entered promiscuous mode [ 49.515907][ T2096] device syzkaller0 entered promiscuous mode [ 49.560242][ T2088] device sit0 left promiscuous mode [ 49.863530][ T2105] device sit0 entered promiscuous mode [ 50.034121][ T2132] Illegal XDP return value 411155648 on prog (id 918) dev N/A, expect packet loss! [ 50.192581][ T2155] bpf_get_probe_write_proto: 32 callbacks suppressed [ 50.192599][ T2155] syz-executor.4[2155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.200202][ T2155] syz-executor.4[2155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.236900][ T2146] device sit0 left promiscuous mode [ 50.459632][ T2160] device sit0 entered promiscuous mode [ 50.499360][ T2175] device pim6reg1 entered promiscuous mode [ 50.548920][ T2182] syz-executor.0[2182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.548988][ T2182] syz-executor.0[2182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.283173][ T2205] device syzkaller0 entered promiscuous mode [ 51.448664][ T2218] device sit0 left promiscuous mode [ 51.494304][ T2221] device sit0 entered promiscuous mode [ 51.625501][ T2209] syz-executor.3 (2209) used greatest stack depth: 20568 bytes left [ 51.778241][ T2257] device pim6reg1 entered promiscuous mode [ 51.909473][ T2263] syz-executor.1[2263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.909543][ T2263] syz-executor.1[2263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.989339][ T2269] device sit0 left promiscuous mode [ 52.062929][ T2264] device sit0 entered promiscuous mode [ 52.234554][ T2290] device pim6reg1 entered promiscuous mode [ 52.440122][ T2303] syz-executor.4[2303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.440194][ T2303] syz-executor.4[2303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.599299][ T2323] device pim6reg1 entered promiscuous mode [ 52.604169][ T2329] syz-executor.2[2329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.616808][ T2329] syz-executor.2[2329] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.058211][ T2358] device syzkaller0 entered promiscuous mode [ 53.166167][ T2380] device pim6reg1 entered promiscuous mode [ 53.367163][ T28] audit: type=1400 audit(1718509924.817:111): avc: denied { create } for pid=2405 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 53.670036][ T2419] device syzkaller0 entered promiscuous mode [ 53.832792][ T2452] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 54.008702][ T2475] device pim6reg1 entered promiscuous mode [ 54.280186][ T2496] device sit0 left promiscuous mode [ 54.457608][ T2504] device sit0 entered promiscuous mode [ 54.755402][ T2547] device sit0 left promiscuous mode [ 54.904502][ T2559] device sit0 entered promiscuous mode [ 55.045309][ T28] audit: type=1400 audit(1718509926.497:112): avc: denied { relabelfrom } for pid=2589 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.065550][ T28] audit: type=1400 audit(1718509926.497:113): avc: denied { relabelto } for pid=2589 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.243235][ T2598] device sit0 left promiscuous mode [ 55.425018][ T2614] device sit0 entered promiscuous mode [ 55.648441][ T2654] bpf_get_probe_write_proto: 8 callbacks suppressed [ 55.648456][ T2654] syz-executor.3[2654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.655107][ T2654] syz-executor.3[2654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.700693][ T28] audit: type=1400 audit(1718509927.157:114): avc: denied { create } for pid=2661 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 55.763709][ T2672] device sit0 left promiscuous mode [ 55.784102][ T2672] device sit0 entered promiscuous mode [ 55.934928][ T2701] syz-executor.4[2701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.934988][ T2701] syz-executor.4[2701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.005999][ T2707] syz-executor.3[2707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.024568][ T2707] syz-executor.3[2707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.160860][ T2734] device sit0 left promiscuous mode [ 56.204656][ T2734] device sit0 entered promiscuous mode [ 56.245999][ T2746] syz-executor.3[2746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.246063][ T2746] syz-executor.3[2746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.324577][ T2757] syz-executor.4[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.336878][ T2757] syz-executor.4[2757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.660580][ T2790] device sit0 left promiscuous mode [ 56.727187][ T2790] device sit0 entered promiscuous mode [ 57.120559][ T2842] device sit0 left promiscuous mode [ 57.155733][ T2842] device sit0 entered promiscuous mode [ 57.635273][ T2901] device sit0 left promiscuous mode [ 57.675134][ T2901] device sit0 entered promiscuous mode [ 58.090775][ T2970] device sit0 left promiscuous mode [ 58.146221][ T2970] device sit0 entered promiscuous mode [ 58.305011][ T2992] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 58.511414][ T3025] device sit0 left promiscuous mode [ 58.528595][ T3025] device sit0 entered promiscuous mode [ 58.880201][ T3081] device sit0 left promiscuous mode [ 58.923244][ T3081] device sit0 entered promiscuous mode [ 59.271888][ T3111] device syzkaller0 entered promiscuous mode [ 59.435656][ T3139] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 59.462819][ T3145] device sit0 left promiscuous mode [ 59.495696][ T3145] device sit0 entered promiscuous mode [ 59.809583][ T3173] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 59.943517][ T3189] device sit0 left promiscuous mode [ 60.026111][ T3189] device sit0 entered promiscuous mode [ 60.121640][ T3203] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 60.292902][ T3232] device sit0 left promiscuous mode [ 60.321598][ T3232] device sit0 entered promiscuous mode [ 60.649381][ T3301] device sit0 left promiscuous mode [ 60.687674][ T3313] bpf_get_probe_write_proto: 12 callbacks suppressed [ 60.687693][ T3313] syz-executor.1[3313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.690688][ T3301] device sit0 entered promiscuous mode [ 60.695268][ T3313] syz-executor.1[3313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.023953][ T3374] device sit0 left promiscuous mode [ 61.226888][ T28] audit: type=1400 audit(1718509932.677:115): avc: denied { create } for pid=3391 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 61.233609][ T3371] device syzkaller0 entered promiscuous mode [ 61.321575][ T3374] device sit0 entered promiscuous mode [ 61.770324][ T3435] device sit0 left promiscuous mode [ 61.905908][ T3435] device sit0 entered promiscuous mode [ 62.117157][ T3442] device syzkaller0 entered promiscuous mode [ 62.281466][ T3463] syz-executor.2[3463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.281537][ T3463] syz-executor.2[3463] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.396538][ T3489] syz-executor.2[3489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.416354][ T3489] syz-executor.2[3489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.465848][ T3499] device pim6reg1 entered promiscuous mode [ 62.650454][ T3500] device syzkaller0 entered promiscuous mode [ 62.727275][ T3534] device sit0 left promiscuous mode [ 62.756089][ T3534] device sit0 entered promiscuous mode [ 62.911991][ T3542] device pim6reg1 entered promiscuous mode [ 63.144096][ T3566] device syzkaller0 entered promiscuous mode [ 63.151527][ T3572] device sit0 left promiscuous mode [ 63.166048][ T3579] device pim6reg1 entered promiscuous mode [ 63.188526][ T3572] device sit0 entered promiscuous mode [ 63.462639][ T3605] device pim6reg1 entered promiscuous mode [ 63.470213][ T3607] device sit0 left promiscuous mode [ 63.738552][ T3609] device syzkaller0 entered promiscuous mode [ 63.758869][ T3607] device sit0 entered promiscuous mode [ 64.414564][ T3669] device syzkaller0 entered promiscuous mode [ 65.220800][ T3709] device syzkaller0 entered promiscuous mode [ 67.059007][ C1] sched: RT throttling activated [ 67.235493][ T3737] device pim6reg1 entered promiscuous mode [ 69.167333][ T3757] device syzkaller0 entered promiscuous mode [ 69.281080][ T28] audit: type=1400 audit(1718509940.737:116): avc: denied { write } for pid=3777 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 69.285725][ T3776] device syzkaller0 entered promiscuous mode [ 71.155139][ T3807] device syzkaller0 entered promiscuous mode [ 71.325837][ T3814] device syzkaller0 entered promiscuous mode [ 71.363957][ T28] audit: type=1400 audit(1718509942.817:117): avc: denied { create } for pid=3817 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 74.254162][ T3854] device syzkaller0 entered promiscuous mode [ 77.250081][ T3888] device syzkaller0 entered promiscuous mode [ 83.235706][ T4218] device syzkaller0 entered promiscuous mode [ 84.274210][ T4261] device syzkaller0 entered promiscuous mode [ 84.937501][ T4305] device syzkaller0 entered promiscuous mode [ 85.533828][ T4341] device syzkaller0 entered promiscuous mode [ 86.375198][ T4378] device syzkaller0 entered promiscuous mode [ 86.792664][ T4386] device syzkaller0 entered promiscuous mode [ 87.051053][ T4409] device syzkaller0 entered promiscuous mode [ 87.499886][ T4426] device syzkaller0 entered promiscuous mode [ 87.818588][ T4452] device syzkaller0 entered promiscuous mode [ 88.030919][ T4466] device syzkaller0 entered promiscuous mode [ 88.693462][ T4490] device syzkaller0 entered promiscuous mode [ 92.352729][ T4715] device pim6reg1 entered promiscuous mode [ 92.621330][ T4731] bridge0: port 3(veth1_macvtap) entered blocking state [ 92.709504][ T4731] bridge0: port 3(veth1_macvtap) entered disabled state [ 93.005767][ T4747] device pim6reg1 entered promiscuous mode [ 93.059973][ T4748] device pim6reg1 entered promiscuous mode [ 93.249214][ T4763] bridge0: port 3(veth1_macvtap) entered blocking state [ 93.319737][ T4763] bridge0: port 3(veth1_macvtap) entered disabled state [ 94.153389][ T4814] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 94.643882][ T4859] device pim6reg1 entered promiscuous mode [ 95.087927][ T4892] device pim6reg1 entered promiscuous mode [ 95.978270][ T4942] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 96.251707][ T4967] device pim6reg1 entered promiscuous mode [ 96.376865][ T4975] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 96.907279][ T5011] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 97.111027][ T5021] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.660871][ T5052] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.115550][ T5104] nicvf0: tun_chr_ioctl cmd 1074025677 [ 98.121148][ T5104] nicvf0: linktype set to 825 [ 98.288820][ T5118] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.190027][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.200192][ T10] device bridge_slave_0 left promiscuous mode [ 99.208837][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.294216][ T10] device veth1_macvtap left promiscuous mode [ 99.337038][ T10] device veth0_vlan left promiscuous mode [ 99.633643][ T5177] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.683963][ T5177] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.734298][ T5177] device bridge_slave_0 entered promiscuous mode [ 99.786557][ T5177] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.833295][ T5177] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.897179][ T5177] device bridge_slave_1 entered promiscuous mode [ 100.061165][ T5177] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.068089][ T5177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.075186][ T5177] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.081956][ T5177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.143962][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.153248][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.168042][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.177064][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.243103][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.336899][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.343887][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.397077][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.412621][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.419525][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.451339][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.492249][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.569339][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.615218][ T5177] device veth0_vlan entered promiscuous mode [ 100.639746][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.662350][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.698819][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.713641][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.738031][ T5177] device veth1_macvtap entered promiscuous mode [ 100.752841][ T5237] nicvf0: tun_chr_ioctl cmd 1074025677 [ 100.758191][ T5237] nicvf0: linktype set to 825 [ 100.764028][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.772380][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.780485][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.793406][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.801972][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.828821][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.844153][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.886484][ T5246] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.678035][ T5282] nicvf0: tun_chr_ioctl cmd 1074025677 [ 101.730284][ T5282] nicvf0: linktype set to 825 [ 106.731723][ T5509] sock: sock_timestamping_bind_phc: sock not bind to device [ 107.284370][ T5539] sock: sock_timestamping_bind_phc: sock not bind to device [ 107.738777][ T5569] sock: sock_timestamping_bind_phc: sock not bind to device [ 107.840972][ T5581] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 108.202472][ T5596] device pim6reg1 entered promiscuous mode [ 108.572027][ T5612] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 108.986540][ T5624] device pim6reg1 entered promiscuous mode [ 109.340813][ T5636] device pim6reg1 entered promiscuous mode [ 109.379668][ T5642] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.433644][ T5722] device pim6reg1 entered promiscuous mode [ 111.528975][ T5734] device pim6reg1 entered promiscuous mode [ 112.101826][ T5766] device pim6reg1 entered promiscuous mode [ 112.832641][ T5788] device pim6reg1 entered promiscuous mode [ 115.194128][ T5887] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.257842][ T5887] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.265569][ T5887] device bridge_slave_0 entered promiscuous mode [ 115.309653][ T5887] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.332946][ T5887] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.340386][ T5887] device bridge_slave_1 entered promiscuous mode [ 115.542082][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.579679][ T10] device bridge_slave_0 left promiscuous mode [ 115.589172][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.630072][ T10] device veth1_macvtap left promiscuous mode [ 115.635945][ T10] device veth0_vlan left promiscuous mode [ 116.014429][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 116.026090][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.046702][ T5940] device syzkaller0 entered promiscuous mode [ 116.060732][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 116.071016][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.079156][ T1105] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.086029][ T1105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.093329][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.102523][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.111352][ T1105] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.118198][ T1105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.159059][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 116.167881][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.182794][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.191337][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.203218][ T5887] device veth0_vlan entered promiscuous mode [ 116.217199][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.224969][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.232304][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.251253][ T5887] device veth1_macvtap entered promiscuous mode [ 116.258833][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.280367][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.298462][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.333559][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.346012][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.360048][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.369722][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.707679][ T5980] device syzkaller0 entered promiscuous mode [ 119.442429][ T6139] device syzkaller0 entered promiscuous mode [ 124.194923][ T28] audit: type=1400 audit(1718509995.647:118): avc: denied { create } for pid=6223 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 128.191570][ T6263] device sit0 entered promiscuous mode [ 130.067022][ T6303] device sit0 entered promiscuous mode [ 152.077621][ T6458] device syzkaller0 entered promiscuous mode [ 158.766018][ T6538] syz-executor.2 (6538) used greatest stack depth: 19736 bytes left [ 166.340697][ T6776] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 170.156329][ T6789] device syzkaller0 entered promiscuous mode [ 170.193114][ T6801] device veth1_macvtap left promiscuous mode [ 170.202421][ T6801] device veth1_macvtap entered promiscuous mode [ 170.212751][ T6801] device macsec0 entered promiscuous mode [ 170.259773][ T6809] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 174.470469][ T6843] device syzkaller0 entered promiscuous mode [ 174.509832][ T6849] device syzkaller0 entered promiscuous mode [ 175.342324][ T6873] device veth1_macvtap left promiscuous mode [ 175.381659][ T6873] device veth1_macvtap entered promiscuous mode [ 175.387839][ T6873] device macsec0 entered promiscuous mode [ 175.727525][ T6889] device syzkaller0 entered promiscuous mode [ 176.563536][ T6914] device syzkaller0 entered promiscuous mode [ 176.949542][ T6930] device syzkaller0 entered promiscuous mode [ 177.048045][ T6934] device veth1_macvtap left promiscuous mode [ 177.115921][ T6934] device macsec0 left promiscuous mode [ 177.162379][ T6938] device veth1_macvtap entered promiscuous mode [ 177.239241][ T6938] device macsec0 entered promiscuous mode [ 177.820331][ T6956] device syzkaller0 entered promiscuous mode [ 178.217843][ T6984] device veth1_macvtap left promiscuous mode [ 178.282073][ T6984] device veth1_macvtap entered promiscuous mode [ 178.329311][ T6984] device macsec0 entered promiscuous mode [ 178.436868][ T6991] device syzkaller0 entered promiscuous mode [ 178.541919][ T7001] tap0: tun_chr_ioctl cmd 1074025680 [ 178.547195][ T7001] tap0: tun_chr_ioctl cmd 1074812118 [ 178.853622][ T7029] device syzkaller0 entered promiscuous mode [ 178.866910][ T7033] device veth1_macvtap left promiscuous mode [ 178.893663][ T7033] device veth1_macvtap entered promiscuous mode [ 178.907524][ T7033] device macsec0 entered promiscuous mode [ 178.923216][ T7037] tap0: tun_chr_ioctl cmd 1074025680 [ 178.960616][ T7037] tap0: tun_chr_ioctl cmd 1074812118 [ 179.762707][ T7066] device syzkaller0 entered promiscuous mode [ 179.773421][ T7070] tap0: tun_chr_ioctl cmd 1074025680 [ 179.778932][ T7070] tap0: tun_chr_ioctl cmd 1074812118 [ 179.854174][ T7081] device syzkaller0 entered promiscuous mode [ 180.066968][ T7098] tap0: tun_chr_ioctl cmd 1074025680 [ 180.077356][ T7098] tap0: tun_chr_ioctl cmd 1074812118 [ 180.348118][ T7130] tap0: tun_chr_ioctl cmd 1074025680 [ 180.364280][ T7130] tap0: tun_chr_ioctl cmd 1074812118 [ 183.962582][ T7355] device pim6reg1 entered promiscuous mode [ 184.383625][ T7384] device pim6reg1 entered promiscuous mode [ 184.751518][ T7430] device pim6reg1 entered promiscuous mode [ 185.147528][ T7453] device syzkaller0 entered promiscuous mode [ 186.167789][ T7551] device pim6reg1 entered promiscuous mode [ 186.583678][ T7583] device pim6reg1 entered promiscuous mode [ 186.916846][ T7620] device pim6reg1 entered promiscuous mode [ 187.117244][ T7635] device syzkaller0 entered promiscuous mode [ 187.481790][ T7656] device pim6reg1 entered promiscuous mode [ 188.065708][ T7694] device team_slave_0 entered promiscuous mode [ 188.096757][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.108815][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.256880][ T7743] device syzkaller0 entered promiscuous mode [ 189.679104][ T7780] device syzkaller0 entered promiscuous mode [ 189.988071][ T7803] device syzkaller0 entered promiscuous mode [ 190.157032][ T7822] device syzkaller0 entered promiscuous mode [ 190.828252][ T7897] bridge0: port 3(veth1_macvtap) entered blocking state [ 190.921237][ T7897] bridge0: port 3(veth1_macvtap) entered disabled state [ 191.200390][ T7929] bridge0: port 3(veth1_macvtap) entered blocking state [ 191.218267][ T7929] bridge0: port 3(veth1_macvtap) entered disabled state [ 191.847769][ T7967] bridge0: port 3(veth1_macvtap) entered blocking state [ 191.862600][ T7967] bridge0: port 3(veth1_macvtap) entered disabled state [ 192.742614][ T28] audit: type=1400 audit(1718510064.197:119): avc: denied { create } for pid=8057 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 195.680245][ T8256] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 196.130280][ T8286] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 196.775410][ T8318] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 198.233831][ T8416] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 199.401252][ T8479] device syzkaller0 entered promiscuous mode [ 199.853766][ T8510] device syzkaller0 entered promiscuous mode [ 200.352809][ T8549] device syzkaller0 entered promiscuous mode [ 200.425862][ T8558] device syzkaller0 entered promiscuous mode [ 200.856724][ T8595] device syzkaller0 entered promiscuous mode [ 202.170337][ T8603] device syzkaller0 entered promiscuous mode [ 202.692403][ T8650] device syzkaller0 entered promiscuous mode [ 203.308716][ T8679] device syzkaller0 entered promiscuous mode [ 204.085279][ T8733] device syzkaller0 entered promiscuous mode [ 204.391923][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.398849][ T8738] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.419269][ T8738] device bridge_slave_0 entered promiscuous mode [ 204.426111][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.433000][ T8738] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.440772][ T8738] device bridge_slave_1 entered promiscuous mode [ 205.000811][ T10] device bridge_slave_1 left promiscuous mode [ 205.006785][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.099270][ T10] device bridge_slave_0 left promiscuous mode [ 205.144290][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.214003][ T10] device veth1_macvtap left promiscuous mode [ 205.531994][ T8738] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.538893][ T8738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.545981][ T8738] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.552788][ T8738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.600101][ T5791] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.607374][ T5791] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.627414][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.634883][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.645254][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.657603][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.666072][ T5791] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.673159][ T5791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.680900][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.689221][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.697337][ T5791] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.704201][ T5791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.718801][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.728285][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.737489][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.745819][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.761747][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.770259][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.783823][ T8738] device veth0_vlan entered promiscuous mode [ 205.791394][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.799475][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.814262][ T8738] device veth1_macvtap entered promiscuous mode [ 205.827132][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.834848][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.846627][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.895172][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.928832][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.004954][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.015797][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.029240][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.042859][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.179554][ T8828] device pim6reg1 entered promiscuous mode [ 211.157491][ T8908] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.240856][ T8908] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.300145][ T8908] device bridge_slave_0 entered promiscuous mode [ 211.360485][ T8] device bridge_slave_1 left promiscuous mode [ 211.369801][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.430969][ T8] device bridge_slave_0 left promiscuous mode [ 211.479844][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.566859][ T8] device veth1_macvtap left promiscuous mode [ 211.573648][ T8] device veth0_vlan left promiscuous mode [ 211.833900][ T8908] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.842092][ T8908] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.858202][ T8908] device bridge_slave_1 entered promiscuous mode [ 212.158881][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.168535][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.210475][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.219755][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.228889][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.235793][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.265007][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.336158][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.392538][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.399444][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.441173][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.486992][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.536402][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.575363][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.594338][ T8908] device veth0_vlan entered promiscuous mode [ 212.605257][ T7988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.614353][ T7988] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.626815][ T7988] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.643060][ T8908] device veth1_macvtap entered promiscuous mode [ 212.677127][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.695881][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.732487][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.670106][ T28] audit: type=1400 audit(1718510086.127:120): avc: denied { ioctl } for pid=9088 comm="syz-executor.4" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 217.380630][ T9220] rose0: tun_chr_ioctl cmd 1074025677 [ 217.385884][ T9220] rose0: linktype set to 776 [ 217.422075][ T9216] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.429321][ T9216] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.436597][ T9216] device bridge_slave_0 entered promiscuous mode [ 217.447485][ T9216] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.464724][ T9216] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.478575][ T9216] device bridge_slave_1 entered promiscuous mode [ 217.840076][ T9216] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.846948][ T9216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.854081][ T9216] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.860858][ T9216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.085276][ T9257] rose0: tun_chr_ioctl cmd 1074025677 [ 218.161252][ T9257] rose0: linktype set to 776 [ 218.203543][ T10] device bridge_slave_1 left promiscuous mode [ 218.209643][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.333309][ T10] device bridge_slave_0 left promiscuous mode [ 218.371715][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.387295][ T10] device veth1_macvtap left promiscuous mode [ 218.393373][ T10] device veth0_vlan left promiscuous mode [ 218.620796][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.627963][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.644878][ T28] audit: type=1400 audit(1718510090.097:121): avc: denied { attach_queue } for pid=9277 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 218.719181][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.734828][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.810132][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.869369][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.881399][ T5791] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.888286][ T5791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.896904][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.905818][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.914010][ T5791] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.920914][ T5791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.988180][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.010963][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.080974][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.152983][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.279420][ T9216] device veth0_vlan entered promiscuous mode [ 219.304989][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.321374][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.336178][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.350205][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.377475][ T9216] device veth1_macvtap entered promiscuous mode [ 219.399903][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.416186][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.423951][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.446002][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.458536][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.493064][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.519798][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.582292][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.640285][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.727238][ T9301] rose0: tun_chr_ioctl cmd 1074025677 [ 219.749297][ T9301] rose0: linktype set to 776 [ 221.205368][ T9451] device syzkaller0 entered promiscuous mode [ 221.357549][ T9461] device pim6reg1 entered promiscuous mode [ 221.488672][ T9481] device syzkaller0 entered promiscuous mode [ 221.829450][ T9512] device pim6reg1 entered promiscuous mode [ 222.018726][ T9524] device syzkaller0 entered promiscuous mode [ 222.123970][ T9530] bridge0: port 3(veth1_macvtap) entered blocking state [ 222.142734][ T9530] bridge0: port 3(veth1_macvtap) entered disabled state [ 222.253552][ T9542] device pim6reg1 entered promiscuous mode [ 222.584591][ T9575] device pim6reg1 entered promiscuous mode [ 223.262672][ T28] audit: type=1400 audit(1718510094.717:122): avc: denied { create } for pid=9644 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 223.586409][ T9672] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 223.692246][ T9677] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.699346][ T9677] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.706544][ T9677] device bridge_slave_0 entered promiscuous mode [ 223.713277][ T9677] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.720136][ T9677] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.727346][ T9677] device bridge_slave_1 entered promiscuous mode [ 224.050982][ T9708] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 224.097127][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.106644][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.189668][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.197971][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.287009][ T5791] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.294083][ T5791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.392629][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.453415][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.523989][ T5791] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.530878][ T5791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.626746][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.638617][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.647033][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.660728][ T9731] device veth1_macvtap left promiscuous mode [ 224.666637][ T9731] device macsec0 entered promiscuous mode [ 224.674855][ T9732] device veth1_macvtap entered promiscuous mode [ 224.695734][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.714828][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.729167][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.745066][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.755000][ T9677] device veth0_vlan entered promiscuous mode [ 224.776310][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.801424][ T9677] device veth1_macvtap entered promiscuous mode [ 224.827958][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.836756][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.855727][ T9750] bridge0: port 3(veth1_macvtap) entered blocking state [ 224.864017][ T9750] bridge0: port 3(veth1_macvtap) entered disabled state [ 224.883582][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.899919][ T43] device bridge_slave_0 left promiscuous mode [ 224.906109][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.969775][ T43] device veth1_macvtap left promiscuous mode [ 225.366450][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.437881][ T28] audit: type=1400 audit(1718510096.887:123): avc: denied { mounton } for pid=9677 comm="syz-executor.2" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 225.602537][ T9800] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 225.642882][ T9804] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 225.729964][ T9815] bridge0: port 3(veth1_macvtap) entered blocking state [ 225.745497][ T9815] bridge0: port 3(veth1_macvtap) entered disabled state [ 225.832843][ T28] audit: type=1400 audit(1718510097.287:124): avc: denied { create } for pid=9822 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 225.870633][ T9831] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 227.551738][T10002] tap0: tun_chr_ioctl cmd 2147767520 [ 227.578066][T10004] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 227.774204][T10041] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 227.983527][T10067] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 228.693665][T10137] tap0: tun_chr_ioctl cmd 2147767520 [ 229.922678][T10244] device syzkaller0 entered promiscuous mode [ 229.939237][T10242] tap0: tun_chr_ioctl cmd 2147767520 [ 230.536150][T10298] device syzkaller0 entered promiscuous mode [ 230.835174][T10317] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 231.747031][T10382] €Â: renamed from pim6reg1 [ 231.990944][T10415] bridge0: port 3(veth1_macvtap) entered blocking state [ 232.025274][T10415] bridge0: port 3(veth1_macvtap) entered disabled state [ 232.327337][T10428] €Â: renamed from pim6reg1 [ 232.895739][T10444] bridge0: port 3(veth1_macvtap) entered blocking state [ 232.953449][T10444] bridge0: port 3(veth1_macvtap) entered disabled state [ 233.182214][T10469] bridge0: port 3(veth1_macvtap) entered blocking state [ 233.189686][T10469] bridge0: port 3(veth1_macvtap) entered disabled state [ 234.239332][T10492] device pim6reg1 entered promiscuous mode [ 234.257407][T10497] bridge0: port 3(veth1_macvtap) entered blocking state [ 234.269745][T10497] bridge0: port 3(veth1_macvtap) entered disabled state [ 234.554898][T10530] bridge0: port 3(veth1_macvtap) entered blocking state [ 234.567830][T10530] bridge0: port 3(veth1_macvtap) entered disabled state [ 234.795590][T10558] tap0: tun_chr_ioctl cmd 2147767520 [ 235.408892][T10598] syz-executor.2[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.408967][T10598] syz-executor.2[10598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.555918][ T28] audit: type=1400 audit(1718510107.007:125): avc: denied { create } for pid=10618 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 236.506531][T10771] syz-executor.2[10771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.506610][T10771] syz-executor.2[10771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.695201][T10806] syz-executor.1[10806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.712745][T10806] syz-executor.1[10806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.744719][T10811] syz-executor.3[10811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.777276][T10811] syz-executor.3[10811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.009818][T10848] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 237.399176][T10902] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 237.652177][T10934] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 237.897855][T10971] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 238.126193][T11002] device syzkaller0 entered promiscuous mode [ 238.159306][T11004] device sit0 entered promiscuous mode [ 238.475211][T11028] device sit0 entered promiscuous mode [ 238.567320][T11036] device syzkaller0 entered promiscuous mode [ 238.959069][T11088] device syzkaller0 entered promiscuous mode [ 238.970878][T11091] syz-executor.3[11091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.970949][T11091] syz-executor.3[11091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.225812][T11109] device syzkaller0 entered promiscuous mode [ 239.693495][T11129] device syzkaller0 entered promiscuous mode [ 241.085527][T11191] device syzkaller0 entered promiscuous mode [ 241.465561][T11207] device syzkaller0 entered promiscuous mode [ 241.563543][T11217] device syzkaller0 entered promiscuous mode [ 241.666682][T11236] device syzkaller0 entered promiscuous mode [ 242.047711][T11265] device syzkaller0 entered promiscuous mode [ 242.149294][T11272] device syzkaller0 entered promiscuous mode [ 242.497870][T11284] device syzkaller0 entered promiscuous mode [ 242.835491][T11311] device syzkaller0 entered promiscuous mode [ 242.867937][T11312] device syzkaller0 entered promiscuous mode [ 243.290286][T11348] device syzkaller0 entered promiscuous mode [ 243.395150][T11356] device syzkaller0 entered promiscuous mode [ 243.730278][T11381] device syzkaller0 entered promiscuous mode [ 243.867663][T11392] device syzkaller0 entered promiscuous mode [ 244.379208][T11427] device syzkaller0 entered promiscuous mode [ 244.643546][T11437] device syzkaller0 entered promiscuous mode [ 245.278309][T11478] device syzkaller0 entered promiscuous mode [ 245.407936][T11485] bpf_get_probe_write_proto: 2 callbacks suppressed [ 245.407956][T11485] syz-executor.2[11485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.449807][T11485] syz-executor.2[11485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.857597][T11517] syz-executor.1[11517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.911002][T11517] syz-executor.1[11517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.240930][T11548] syz-executor.4[11548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.252930][T11548] syz-executor.4[11548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.423553][T11557] device syzkaller0 entered promiscuous mode [ 246.806059][T11598] device syzkaller0 entered promiscuous mode [ 247.547605][T11618] device syzkaller0 entered promiscuous mode [ 247.943905][T11637] device syzkaller0 entered promiscuous mode [ 247.960890][T11623] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.967752][T11623] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.975761][T11623] device bridge_slave_0 entered promiscuous mode [ 247.982820][T11623] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.990391][T11623] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.997933][T11623] device bridge_slave_1 entered promiscuous mode [ 251.161113][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.191630][ T43] device bridge_slave_0 left promiscuous mode [ 251.249710][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.293313][ T43] device veth1_macvtap left promiscuous mode [ 251.339432][ T43] device veth0_vlan left promiscuous mode [ 251.979201][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.986516][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.060508][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.068694][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.076966][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.083864][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.091508][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.100288][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.108610][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.115500][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.187962][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.069340][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.078970][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.082926][T11695] syz-executor.3[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.086830][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.092045][T11695] syz-executor.3[11695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.098679][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.101060][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.109712][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.121510][T11623] device veth0_vlan entered promiscuous mode [ 255.147781][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.157605][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.172933][T11623] device veth1_macvtap entered promiscuous mode [ 255.195522][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.203130][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.245123][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.265858][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.274226][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.292776][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.301249][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.309557][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.317721][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.540023][T11715] device syzkaller0 entered promiscuous mode [ 258.571815][T11815] tap0: tun_chr_ioctl cmd 1074025677 [ 258.579420][T11815] tap0: linktype set to 769 [ 259.427669][T11864] syz-executor.4[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.427736][T11864] syz-executor.4[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.592091][T11866] device pim6reg1 entered promiscuous mode [ 259.929524][T11897] syz-executor.2[11897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.929639][T11897] syz-executor.2[11897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.006885][T11907] device pim6reg1 entered promiscuous mode [ 260.510370][T11951] device syzkaller0 entered promiscuous mode [ 260.527919][T11942] device pim6reg1 entered promiscuous mode [ 260.788766][T11990] device syzkaller0 entered promiscuous mode [ 261.198817][T12044] device syzkaller0 entered promiscuous mode [ 261.348535][T12072] device syzkaller0 entered promiscuous mode [ 261.545923][T12096] device syzkaller0 entered promiscuous mode [ 262.594412][T12147] device pim6reg1 entered promiscuous mode [ 262.825814][T12155] syz-executor.3[12155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.825879][T12155] syz-executor.3[12155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.946462][T12153] device syzkaller0 entered promiscuous mode [ 263.160586][T12180] tap0: tun_chr_ioctl cmd 1074025677 [ 263.227741][T12180] tap0: linktype set to 769 [ 264.104735][T12224] tap0: tun_chr_ioctl cmd 1074025677 [ 264.130203][T12224] tap0: linktype set to 769 [ 264.327319][T12237] syz-executor.4[12237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.327390][T12237] syz-executor.4[12237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.367928][T12237] syz-executor.4[12237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.424922][T12237] syz-executor.4[12237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.572749][T12264] device pim6reg1 entered promiscuous mode [ 264.934390][T12285] syz-executor.1[12285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.934459][T12285] syz-executor.1[12285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.983865][T12287] syz-executor.4[12287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.985610][T12288] syz-executor.1[12288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.087227][T12287] syz-executor.4[12287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.100012][T12288] syz-executor.1[12288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.687401][T12331] device syzkaller0 entered promiscuous mode [ 266.255101][T12390] device syzkaller0 entered promiscuous mode [ 266.536179][T12415] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.607657][T12415] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.622377][T12415] device bridge_slave_0 entered promiscuous mode [ 266.666602][T12415] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.673541][T12415] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.696619][T12415] device bridge_slave_1 entered promiscuous mode [ 266.904837][T12446] device syzkaller0 entered promiscuous mode [ 267.299459][T12415] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.306355][T12415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.313455][T12415] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.320230][T12415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.510639][ T1105] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.537904][ T1105] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.631845][ T43] device bridge_slave_1 left promiscuous mode [ 267.641315][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.665153][T12470] syz-executor.3[12470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.665228][T12470] syz-executor.3[12470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.687750][ T43] device bridge_slave_0 left promiscuous mode [ 267.715591][T12479] syz-executor.3[12479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.715665][T12479] syz-executor.3[12479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.727421][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.756859][ T28] audit: type=1400 audit(1718510139.207:126): avc: denied { create } for pid=12477 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.780668][ T43] device veth1_macvtap left promiscuous mode [ 267.786902][ T43] device veth0_vlan left promiscuous mode [ 267.960820][T12488] ªªªªªª: renamed from vlan0 [ 268.005503][T12489] device syzkaller0 entered promiscuous mode [ 268.050375][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.067020][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.094878][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.130145][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.143730][ T1311] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.150879][ T1311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.168458][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.184187][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.193160][ T1311] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.200141][ T1311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.239575][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.247519][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.262142][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.272105][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.299369][T12502] device pim6reg1 entered promiscuous mode [ 268.342026][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.360526][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.413616][T12415] device veth0_vlan entered promiscuous mode [ 268.440129][T12509] device pim6reg1 entered promiscuous mode [ 268.479102][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.493094][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.556503][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.572465][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.623124][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.661039][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.701658][T12415] device veth1_macvtap entered promiscuous mode [ 268.744341][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.779630][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.850858][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.869256][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 269.722059][T12573] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 270.307953][T12614] device pim6reg1 entered promiscuous mode [ 270.564830][T12634] device wg2 entered promiscuous mode [ 270.856222][T12642] ªªªªªª: renamed from vlan0 [ 271.478098][T12652] device pim6reg1 entered promiscuous mode [ 271.521538][T12665] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 272.212838][T12692] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 272.681088][T12720] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 274.760934][T12867] bpf_get_probe_write_proto: 2 callbacks suppressed [ 274.760952][T12867] syz-executor.2[12867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.767442][T12867] syz-executor.2[12867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.245007][T12882] device syzkaller0 entered promiscuous mode [ 275.329046][T12913] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 275.347471][T12913] device syzkaller0 entered promiscuous mode [ 275.704398][T12953] device syzkaller0 entered promiscuous mode [ 275.995082][T12977] device pim6reg1 entered promiscuous mode [ 276.083192][T12981] device syzkaller0 entered promiscuous mode [ 276.259767][T13006] device wg2 entered promiscuous mode [ 278.054227][T13093] device syzkaller0 entered promiscuous mode [ 278.107715][ T28] audit: type=1400 audit(1718510149.557:127): avc: denied { create } for pid=13092 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 278.632907][T13116] device pim6reg1 entered promiscuous mode [ 278.933995][T13123] device syzkaller0 entered promiscuous mode [ 279.537023][T13165] device syzkaller0 entered promiscuous mode [ 280.246208][T13177] device pim6reg1 entered promiscuous mode [ 280.478323][T13179] device syzkaller0 entered promiscuous mode [ 280.508308][ T43] device bridge_slave_1 left promiscuous mode [ 280.514845][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.522522][ T43] device bridge_slave_0 left promiscuous mode [ 280.528524][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.536656][ T43] device veth1_macvtap left promiscuous mode [ 280.738332][T13209] device wg2 entered promiscuous mode [ 280.744209][T13182] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.751732][T13182] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.759399][T13182] device bridge_slave_0 entered promiscuous mode [ 280.766587][T13182] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.773783][T13182] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.784178][T13182] device bridge_slave_1 entered promiscuous mode [ 280.848172][T13182] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.855075][T13182] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.862165][T13182] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.868925][T13182] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.898656][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.911861][ T5791] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.919359][ T5791] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.960905][T13214] device syzkaller0 entered promiscuous mode [ 280.994655][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.004703][ T1105] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.011589][ T1105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.018824][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.028533][ T1105] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.035414][ T1105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.042657][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.051230][ T1105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.075938][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.092488][T13182] device veth0_vlan entered promiscuous mode [ 281.099952][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.121446][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.136389][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.158372][T13182] device veth1_macvtap entered promiscuous mode [ 281.179972][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.201309][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.225588][ T5791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.637232][T13236] device wg2 entered promiscuous mode [ 281.935821][T13238] device syzkaller0 entered promiscuous mode [ 281.995242][T13246] device syzkaller0 entered promiscuous mode [ 282.141659][T13264] device wg2 left promiscuous mode [ 282.168939][T13264] device wg2 entered promiscuous mode [ 282.457975][T13273] device syzkaller0 entered promiscuous mode [ 282.947527][T13323] device syzkaller0 entered promiscuous mode [ 283.041008][T13342] device syzkaller0 entered promiscuous mode [ 283.191166][T13366] device wg2 left promiscuous mode [ 283.454138][T13368] device syzkaller0 entered promiscuous mode [ 283.512818][T13390] device syzkaller0 entered promiscuous mode [ 284.055805][T13423] device syzkaller0 entered promiscuous mode [ 284.780428][T13442] device syzkaller0 entered promiscuous mode [ 284.991571][T13438] device syzkaller0 entered promiscuous mode [ 285.080864][T13458] device syzkaller0 entered promiscuous mode [ 285.511140][T13474] device syzkaller0 entered promiscuous mode [ 285.735452][T13488] device pim6reg1 entered promiscuous mode [ 285.911266][T13500] device syzkaller0 entered promiscuous mode [ 287.103676][T13532] device pim6reg1 entered promiscuous mode [ 288.341836][T13586] device pim6reg1 entered promiscuous mode [ 289.252662][T13631] device pim6reg1 entered promiscuous mode [ 289.399777][T13644] device syzkaller0 entered promiscuous mode [ 290.251068][T13677] syz-executor.1[13677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.251144][T13677] syz-executor.1[13677] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.658412][T13688] device syzkaller0 entered promiscuous mode [ 290.735168][T13686] device syzkaller0 entered promiscuous mode [ 290.995866][T13705] device wg2 left promiscuous mode [ 291.160153][T13719] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.167119][T13719] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.197920][T13719] device bridge_slave_1 left promiscuous mode [ 291.204039][T13719] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.211919][T13719] device bridge_slave_0 left promiscuous mode [ 291.217976][T13719] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.481241][T13742] device syzkaller0 entered promiscuous mode [ 291.563165][T13757] syz-executor.0[13757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.563240][T13757] syz-executor.0[13757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.589562][T13763] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.608160][T13763] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.642243][T13763] device bridge_slave_1 left promiscuous mode [ 291.651573][T13763] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.666618][T13763] device bridge_slave_0 left promiscuous mode [ 291.679191][T13763] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.025378][T13771] device syzkaller0 entered promiscuous mode [ 292.167359][T13796] device wg2 left promiscuous mode [ 292.224156][T13804] device pim6reg1 entered promiscuous mode [ 292.338081][T13815] device pim6reg1 entered promiscuous mode [ 292.579423][T13817] device syzkaller0 entered promiscuous mode [ 293.244555][T13836] device pim6reg1 entered promiscuous mode [ 293.363976][T13855] device syzkaller0 entered promiscuous mode [ 293.671869][T13860] device syzkaller0 entered promiscuous mode [ 293.865067][T13863] device syzkaller0 entered promiscuous mode [ 293.901068][T13888] device pim6reg1 entered promiscuous mode [ 293.954678][T13890] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 294.005741][T13892] device syzkaller0 entered promiscuous mode [ 394.428999][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 394.435797][ C0] rcu: 1-...!: (1 GPs behind) idle=cf94/1/0x4000000000000000 softirq=36495/36496 fqs=2 [ 394.445417][ C0] (detected by 0, t=10002 jiffies, g=41985, q=54 ncpus=2) [ 394.452454][ C0] Sending NMI from CPU 0 to CPUs 1: [ 394.457546][ C1] NMI backtrace for cpu 1 [ 394.457558][ C1] CPU: 1 PID: 13905 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 394.457575][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 394.457590][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 394.457619][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 0a 13 31 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 394.457632][ C1] RSP: 0018:ffffc90002567140 EFLAGS: 00000046 [ 394.457647][ C1] RAX: 0000000000000003 RBX: 1ffff920004ace2c RCX: ffffffff8500688c [ 394.457658][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffffc90007196080 [ 394.457669][ C1] RBP: ffffc900025671f0 R08: dffffc0000000000 R09: fffff52000e32c11 [ 394.457681][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 394.457692][ C1] R13: ffffc90007196080 R14: 0000000000000003 R15: 1ffff920004ace30 [ 394.457703][ C1] FS: 00007fee32f906c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 394.457717][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 394.457728][ C1] CR2: 0000786c6c257830 CR3: 0000000119a4e000 CR4: 00000000003506a0 [ 394.457742][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 394.457751][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 394.457761][ C1] Call Trace: [ 394.457768][ C1] [ 394.457775][ C1] ? show_regs+0x58/0x60 [ 394.457790][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 394.457810][ C1] ? nmi_trigger_cpumask_backtrace+0x3c0/0x3c0 [ 394.457832][ C1] ? kvm_wait+0x117/0x180 [ 394.457845][ C1] ? kvm_wait+0x117/0x180 [ 394.457858][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 394.457875][ C1] ? nmi_handle+0xa7/0x280 [ 394.457891][ C1] ? kvm_wait+0x117/0x180 [ 394.457904][ C1] ? default_do_nmi+0x69/0x160 [ 394.457922][ C1] ? exc_nmi+0xaf/0x120 [ 394.457938][ C1] ? end_repeat_nmi+0x16/0x31 [ 394.457956][ C1] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 394.457979][ C1] ? kvm_wait+0x117/0x180 [ 394.457992][ C1] ? kvm_wait+0x117/0x180 [ 394.458006][ C1] ? kvm_wait+0x117/0x180 [ 394.458019][ C1] [ 394.458023][ C1] [ 394.458029][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 394.458044][ C1] ? pv_hash+0x86/0x150 [ 394.458062][ C1] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 394.458088][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 394.458110][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 394.458128][ C1] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 394.458151][ C1] ? compat_start_thread+0x20/0x20 [ 394.458170][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 394.458191][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 394.458210][ C1] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 394.458227][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 394.458248][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 394.458267][ C1] ? finish_task_switch+0x167/0x7b0 [ 394.458289][ C1] __bpf_ringbuf_reserve+0x1c5/0x3d0 [ 394.458315][ C1] ? bpf_ringbuf_notify+0x30/0x30 [ 394.458331][ C1] ? __sched_text_start+0x8/0x8 [ 394.458348][ C1] bpf_ringbuf_output+0x66/0x1f0 [ 394.458363][ C1] bpf_prog_a3e2825f60354855+0x3d/0x41 [ 394.458380][ C1] bpf_trace_run2+0x133/0x290 [ 394.458393][ C1] ? schedule_preempt_disabled+0x20/0x20 [ 394.458411][ C1] ? bpf_trace_run1+0x240/0x240 [ 394.458424][ C1] ? __kasan_check_write+0x14/0x20 [ 394.458441][ C1] __bpf_trace_contention_end+0xb/0x10 [ 394.458457][ C1] __pv_queued_spin_lock_slowpath+0xd59/0xda0 [ 394.458480][ C1] ? rt_mutex_futex_unlock+0x170/0x1f0 [ 394.458500][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 394.458523][ C1] ? swake_up_one_online+0x6b/0x110 [ 394.458545][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 394.458566][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 394.458581][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 394.458601][ C1] ? __bpf_ringbuf_reserve+0x23b/0x3d0 [ 394.458617][ C1] ? _raw_spin_unlock_irqrestore+0x56/0x80 [ 394.458639][ C1] __bpf_ringbuf_reserve+0x1c5/0x3d0 [ 394.458655][ C1] ? bpf_ringbuf_notify+0x30/0x30 [ 394.458669][ C1] ? bpf_test_timer_continue+0xf2/0x460 [ 394.458690][ C1] bpf_ringbuf_output+0x66/0x1f0 [ 394.458705][ C1] bpf_prog_a3e2825f60354855+0x3d/0x41 [ 394.458719][ C1] bpf_test_run+0x4ab/0xa40 [ 394.458741][ C1] ? convert___skb_to_skb+0x670/0x670 [ 394.458759][ C1] ? build_skb+0x2c/0x220 [ 394.458774][ C1] ? eth_type_trans+0x2ca/0x650 [ 394.458790][ C1] ? eth_get_headlen+0x240/0x240 [ 394.458805][ C1] ? convert___skb_to_skb+0x44/0x670 [ 394.458823][ C1] ? build_skb+0xde/0x220 [ 394.458838][ C1] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 394.458861][ C1] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 394.458879][ C1] ? __kasan_check_write+0x14/0x20 [ 394.458893][ C1] ? fput+0x15b/0x1b0 [ 394.458905][ C1] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 394.458924][ C1] bpf_prog_test_run+0x3b0/0x630 [ 394.458945][ C1] ? bpf_prog_query+0x260/0x260 [ 394.458964][ C1] ? selinux_bpf+0xd2/0x100 [ 394.458981][ C1] ? security_bpf+0x82/0xb0 [ 394.458999][ C1] __sys_bpf+0x59f/0x7f0 [ 394.459017][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 394.459036][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 394.459061][ C1] ? __kasan_check_write+0x14/0x20 [ 394.459074][ C1] ? fpregs_restore_userregs+0x130/0x290 [ 394.459093][ C1] __x64_sys_bpf+0x7c/0x90 [ 394.459111][ C1] do_syscall_64+0x3d/0xb0 [ 394.459126][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 394.459141][ C1] RIP: 0033:0x7fee3227cea9 [ 394.459153][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 394.459166][ C1] RSP: 002b:00007fee32f900c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.459181][ C1] RAX: ffffffffffffffda RBX: 00007fee323b3f80 RCX: 00007fee3227cea9 [ 394.459192][ C1] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 000000000000000a [ 394.459201][ C1] RBP: 00007fee322ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 394.459211][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 394.459221][ C1] R13: 000000000000000b R14: 00007fee323b3f80 R15: 00007ffeebff1068 [ 394.459235][ C1] [ 394.459491][ C0] rcu: rcu_preempt kthread starved for 9998 jiffies! g41985 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 395.065280][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 395.075082][ C0] rcu: RCU grace-period kthread stack dump: [ 395.080809][ C0] task:rcu_preempt state:R running task stack:27720 pid:14 ppid:2 flags:0x00004000 [ 395.091400][ C0] Call Trace: [ 395.094524][ C0] [ 395.097391][ C0] __schedule+0xca7/0x1550 [ 395.101650][ C0] ? __sched_text_start+0x8/0x8 [ 395.106336][ C0] ? del_timer_sync+0x1bc/0x230 [ 395.111018][ C0] ? __kasan_check_write+0x14/0x20 [ 395.115962][ C0] schedule+0xc3/0x180 [ 395.119869][ C0] schedule_timeout+0x18c/0x380 [ 395.124556][ C0] ? __kasan_check_write+0x14/0x20 [ 395.129502][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 395.134796][ C0] ? console_conditional_schedule+0x10/0x10 [ 395.140524][ C0] ? update_process_times+0x1b0/0x1b0 [ 395.145739][ C0] ? prepare_to_swait_event+0x308/0x320 [ 395.151113][ C0] rcu_gp_fqs_loop+0x2ed/0x1060 [ 395.155973][ C0] ? dyntick_save_progress_counter+0x280/0x280 [ 395.161963][ C0] ? rcu_gp_init+0xf80/0xf80 [ 395.166389][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 395.172030][ C0] ? finish_swait+0x17d/0x1b0 [ 395.176544][ C0] rcu_gp_kthread+0xa3/0x390 [ 395.180971][ C0] ? queued_spin_lock_slowpath+0x50/0x50 [ 395.186437][ C0] ? set_cpus_allowed_ptr+0xa4/0xe0 [ 395.191472][ C0] ? __kasan_check_read+0x11/0x20 [ 395.196331][ C0] ? __kthread_parkme+0x12d/0x180 [ 395.201194][ C0] kthread+0x26d/0x300 [ 395.205099][ C0] ? queued_spin_lock_slowpath+0x50/0x50 [ 395.210567][ C0] ? kthread_blkcg+0xd0/0xd0 [ 395.215000][ C0] ret_from_fork+0x1f/0x30 [ 395.219249][ C0] [ 395.222111][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 395.228361][ C0] CPU: 0 PID: 13886 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 395.238342][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 395.248238][ C0] RIP: 0010:smp_call_function_many_cond+0x86c/0x930 [ 395.254667][ C0] Code: df 75 0a e8 86 9b 09 00 e9 2f ff ff ff f3 90 42 0f b6 04 3b 84 c0 75 14 41 f7 06 01 00 00 00 0f 84 12 ff ff ff e8 64 9b 09 00 e1 44 89 f1 80 e1 07 80 c1 03 38 c1 7c df 4c 89 f7 e8 8d 98 50 [ 395.274189][ C0] RSP: 0018:ffffc90000e97600 EFLAGS: 00000293 [ 395.280088][ C0] RAX: ffffffff816bd89c RBX: 1ffff1103ee27705 RCX: ffff88812e018000 [ 395.287989][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 395.295799][ C0] RBP: ffffc90000e97718 R08: ffffffff816bd865 R09: ffffed103ee0707b [ 395.303612][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 [ 395.311419][ C0] R13: 0000000800000000 R14: ffff8881f713b828 R15: dffffc0000000000 [ 395.319234][ C0] FS: 0000555556467480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 395.327998][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 395.334420][ C0] CR2: 0000000020150000 CR3: 000000014ace0000 CR4: 00000000003506b0 [ 395.342233][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 395.350134][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000090602 [ 395.357941][ C0] Call Trace: [ 395.361067][ C0] [ 395.363759][ C0] ? show_regs+0x58/0x60 [ 395.367833][ C0] ? dump_cpu_task+0x3c/0x70 [ 395.372262][ C0] ? rcu_check_gp_kthread_starvation+0x1d1/0x240 [ 395.378425][ C0] ? print_other_cpu_stall+0x1140/0x1300 [ 395.383921][ C0] ? print_cpu_stall+0x590/0x590 [ 395.388666][ C0] ? acct_account_cputime+0xf7/0x2c0 [ 395.393788][ C0] ? rcu_sched_clock_irq+0xaeb/0x1330 [ 395.398997][ C0] ? rcu_boost_kthread_setaffinity+0x5a0/0x5a0 [ 395.404985][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 395.410022][ C0] ? update_wall_time+0x25/0x30 [ 395.414706][ C0] ? update_process_times+0x149/0x1b0 [ 395.419917][ C0] ? tick_sched_timer+0x188/0x240 [ 395.424773][ C0] ? tick_setup_sched_timer+0x490/0x490 [ 395.430155][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 395.435364][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 395.440308][ C0] ? clockevents_program_event+0x22f/0x300 [ 395.445969][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 395.451855][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 395.456802][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 395.462702][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 395.468343][ C0] [ 395.471120][ C0] [ 395.473897][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 395.479903][ C0] ? smp_call_function_many_cond+0x835/0x930 [ 395.485701][ C0] ? smp_call_function_many_cond+0x86c/0x930 [ 395.491535][ C0] ? smp_call_function_many_cond+0x86c/0x930 [ 395.497343][ C0] ? text_poke_sync+0x30/0x30 [ 395.501846][ C0] ? smp_call_function_many+0x40/0x40 [ 395.507054][ C0] ? insn_get_immediate+0xbb6/0x1400 [ 395.512173][ C0] ? kernel_text_address+0xa9/0xe0 [ 395.517124][ C0] ? text_poke_sync+0x30/0x30 [ 395.521634][ C0] on_each_cpu_cond_mask+0x40/0x80 [ 395.526584][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.532396][ C0] text_poke_bp_batch+0x1e9/0x730 [ 395.537257][ C0] ? text_poke_finish+0x30/0x30 [ 395.541943][ C0] ? text_poke_loc_init+0x680/0x680 [ 395.546979][ C0] ? __stack_depot_save+0x36/0x480 [ 395.551930][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.557740][ C0] text_poke_bp+0xc8/0x140 [ 395.561992][ C0] ? kasan_set_track+0x4b/0x70 [ 395.566591][ C0] ? kasan_save_alloc_info+0x1f/0x30 [ 395.571715][ C0] ? text_poke_queue+0x1a0/0x1a0 [ 395.576487][ C0] ? bpf_link_free+0x129/0x3f0 [ 395.581086][ C0] ? ____fput+0x15/0x20 [ 395.585081][ C0] ? task_work_run+0x24d/0x2e0 [ 395.589681][ C0] __static_call_transform+0x333/0x560 [ 395.594975][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.600789][ C0] ? probe_sched_wakeup+0x80/0x80 [ 395.605649][ C0] ? text_poke_bp+0x140/0x140 [ 395.610164][ C0] ? mutex_lock+0xb1/0x1e0 [ 395.614418][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.620231][ C0] ? __static_call_validate+0x54/0x1a0 [ 395.625526][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.631340][ C0] ? probe_sched_wakeup+0x80/0x80 [ 395.636203][ C0] arch_static_call_transform+0x51/0xa0 [ 395.641582][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 395.647400][ C0] __static_call_update+0xd2/0x5c0 [ 395.652346][ C0] ? probe_sched_wakeup+0x80/0x80 [ 395.657207][ C0] ? __static_call_return0+0x10/0x10 [ 395.662325][ C0] ? __kasan_kmalloc+0x9c/0xb0 [ 395.666927][ C0] ? tracepoint_probe_unregister+0x458/0x900 [ 395.672829][ C0] ? memcpy+0x56/0x70 [ 395.676646][ C0] ? probe_sched_wakeup+0x80/0x80 [ 395.681508][ C0] tracepoint_probe_unregister+0x7fb/0x900 [ 395.687151][ C0] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 395.693311][ C0] bpf_probe_unregister+0x61/0x70 [ 395.698173][ C0] bpf_raw_tp_link_release+0x63/0x90 [ 395.703293][ C0] bpf_link_free+0x129/0x3f0 [ 395.707717][ C0] ? rcu_force_quiescent_state+0x170/0x170 [ 395.713362][ C0] ? bpf_link_put_deferred+0x20/0x20 [ 395.718481][ C0] ? __kasan_slab_free+0x11/0x20 [ 395.723260][ C0] ? bpf_prog_get_stats+0x290/0x290 [ 395.728288][ C0] bpf_link_release+0x170/0x180 [ 395.732990][ C0] ? bpf_prog_get_stats+0x290/0x290 [ 395.738099][ C0] __fput+0x3ab/0x870 [ 395.741921][ C0] ____fput+0x15/0x20 [ 395.745734][ C0] task_work_run+0x24d/0x2e0 [ 395.750250][ C0] ? task_work_cancel+0x2b0/0x2b0 [ 395.755107][ C0] ? close_fd+0x2f0/0x2f0 [ 395.759274][ C0] exit_to_user_mode_loop+0x94/0xa0 [ 395.764395][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 395.769690][ C0] syscall_exit_to_user_mode+0x26/0x140 [ 395.775071][ C0] do_syscall_64+0x49/0xb0 [ 395.779322][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 395.784963][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 395.790693][ C0] RIP: 0033:0x7f2dbb07cea9 [ 395.794947][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 395.814389][ C0] RSP: 002b:00007fff330aaba8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 395.822645][ C0] RAX: 0000000000000000 RBX: 00007f2dbb1b5980 RCX: 00007f2dbb07cea9 [ 395.830450][ C0] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 395.838255][ C0] RBP: 00007f2dbb1b5980 R08: 0000000081872b6c R09: 0000000a00000000 [ 395.846155][ C0] R10: 0000000080000000 R11: 0000000000000246 R12: 0000000000047f11 [ 395.853963][ C0] R13: 00007f2dbb1b3f8c R14: 0000000000000032 R15: 00007f2dbb1b5980 [ 395.861873][ C0] [ 529.102951][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 225s! [syz-executor.1:13886] [ 529.111457][ C0] Modules linked in: [ 529.115199][ C0] CPU: 0 PID: 13886 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 529.125169][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 529.135075][ C0] RIP: 0010:smp_call_function_many_cond+0x851/0x930 [ 529.141489][ C0] Code: 3e 44 89 fe 83 e6 01 31 ff e8 4b 9f 09 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 0a e8 86 9b 09 00 e9 2f ff ff ff f3 90 <42> 0f b6 04 3b 84 c0 75 14 41 f7 06 01 00 00 00 0f 84 12 ff ff ff [ 529.161624][ C0] RSP: 0018:ffffc90000e97600 EFLAGS: 00000293 [ 529.167523][ C0] RAX: ffffffff816bd89c RBX: 1ffff1103ee27705 RCX: ffff88812e018000 [ 529.175336][ C0] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 529.183146][ C0] RBP: ffffc90000e97718 R08: ffffffff816bd865 R09: ffffed103ee0707b [ 529.190958][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000001 [ 529.198769][ C0] R13: 0000000800000000 R14: ffff8881f713b828 R15: dffffc0000000000 [ 529.206580][ C0] FS: 0000555556467480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 529.215347][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 529.221770][ C0] CR2: 0000000020150000 CR3: 000000014ace0000 CR4: 00000000003506b0 [ 529.229582][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 529.237397][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000090602 [ 529.245206][ C0] Call Trace: [ 529.248331][ C0] [ 529.251035][ C0] ? show_regs+0x58/0x60 [ 529.255098][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 529.260047][ C0] ? proc_watchdog_cpumask+0xf0/0xf0 [ 529.265167][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 529.270378][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 529.275322][ C0] ? clockevents_program_event+0x22f/0x300 [ 529.280964][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 529.286875][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 529.291822][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 529.297714][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 529.303356][ C0] [ 529.306131][ C0] [ 529.308909][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 529.314900][ C0] ? smp_call_function_many_cond+0x835/0x930 [ 529.320713][ C0] ? smp_call_function_many_cond+0x86c/0x930 [ 529.326530][ C0] ? smp_call_function_many_cond+0x851/0x930 [ 529.332346][ C0] ? text_poke_sync+0x30/0x30 [ 529.336894][ C0] ? smp_call_function_many+0x40/0x40 [ 529.342064][ C0] ? insn_get_immediate+0xbb6/0x1400 [ 529.347186][ C0] ? kernel_text_address+0xa9/0xe0 [ 529.352143][ C0] ? text_poke_sync+0x30/0x30 [ 529.356647][ C0] on_each_cpu_cond_mask+0x40/0x80 [ 529.361605][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.367410][ C0] text_poke_bp_batch+0x1e9/0x730 [ 529.372283][ C0] ? text_poke_finish+0x30/0x30 [ 529.376963][ C0] ? text_poke_loc_init+0x680/0x680 [ 529.381991][ C0] ? __stack_depot_save+0x36/0x480 [ 529.386940][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.392755][ C0] text_poke_bp+0xc8/0x140 [ 529.397010][ C0] ? kasan_set_track+0x4b/0x70 [ 529.401605][ C0] ? kasan_save_alloc_info+0x1f/0x30 [ 529.406728][ C0] ? text_poke_queue+0x1a0/0x1a0 [ 529.411501][ C0] ? bpf_link_free+0x129/0x3f0 [ 529.416108][ C0] ? ____fput+0x15/0x20 [ 529.420092][ C0] ? task_work_run+0x24d/0x2e0 [ 529.424694][ C0] __static_call_transform+0x333/0x560 [ 529.429988][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.435803][ C0] ? probe_sched_wakeup+0x80/0x80 [ 529.440669][ C0] ? text_poke_bp+0x140/0x140 [ 529.445261][ C0] ? mutex_lock+0xb1/0x1e0 [ 529.449516][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.455332][ C0] ? __static_call_validate+0x54/0x1a0 [ 529.460623][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.466439][ C0] ? probe_sched_wakeup+0x80/0x80 [ 529.471314][ C0] arch_static_call_transform+0x51/0xa0 [ 529.476688][ C0] ? __SCT__tp_func_sched_wakeup_new+0x8/0x8 [ 529.482517][ C0] __static_call_update+0xd2/0x5c0 [ 529.487449][ C0] ? probe_sched_wakeup+0x80/0x80 [ 529.492313][ C0] ? __static_call_return0+0x10/0x10 [ 529.497426][ C0] ? __kasan_kmalloc+0x9c/0xb0 [ 529.502024][ C0] ? tracepoint_probe_unregister+0x458/0x900 [ 529.507841][ C0] ? memcpy+0x56/0x70 [ 529.511658][ C0] ? probe_sched_wakeup+0x80/0x80 [ 529.516669][ C0] tracepoint_probe_unregister+0x7fb/0x900 [ 529.522306][ C0] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 529.528465][ C0] bpf_probe_unregister+0x61/0x70 [ 529.533499][ C0] bpf_raw_tp_link_release+0x63/0x90 [ 529.538620][ C0] bpf_link_free+0x129/0x3f0 [ 529.543045][ C0] ? rcu_force_quiescent_state+0x170/0x170 [ 529.548691][ C0] ? bpf_link_put_deferred+0x20/0x20 [ 529.553805][ C0] ? __kasan_slab_free+0x11/0x20 [ 529.558582][ C0] ? bpf_prog_get_stats+0x290/0x290 [ 529.563613][ C0] bpf_link_release+0x170/0x180 [ 529.568302][ C0] ? bpf_prog_get_stats+0x290/0x290 [ 529.573337][ C0] __fput+0x3ab/0x870 [ 529.577155][ C0] ____fput+0x15/0x20 [ 529.580974][ C0] task_work_run+0x24d/0x2e0 [ 529.585403][ C0] ? task_work_cancel+0x2b0/0x2b0 [ 529.590260][ C0] ? close_fd+0x2f0/0x2f0 [ 529.594425][ C0] exit_to_user_mode_loop+0x94/0xa0 [ 529.599460][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 529.604758][ C0] syscall_exit_to_user_mode+0x26/0x140 [ 529.610137][ C0] do_syscall_64+0x49/0xb0 [ 529.614390][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 529.620033][ C0] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 529.625757][ C0] RIP: 0033:0x7f2dbb07cea9 [ 529.630014][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 529.649455][ C0] RSP: 002b:00007fff330aaba8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 529.657697][ C0] RAX: 0000000000000000 RBX: 00007f2dbb1b5980 RCX: 00007f2dbb07cea9 [ 529.665512][ C0] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 529.673321][ C0] RBP: 00007f2dbb1b5980 R08: 0000000081872b6c R09: 0000000a00000000 [ 529.681132][ C0] R10: 0000000080000000 R11: 0000000000000246 R12: 0000000000047f11 [ 529.688943][ C0] R13: 00007f2dbb1b3f8c R14: 0000000000000032 R15: 00007f2dbb1b5980 [ 529.696758][ C0] [ 529.699622][ C0] Sending NMI from CPU 0 to CPUs 1: [ 529.704711][ C1] NMI backtrace for cpu 1 [ 529.704720][ C1] CPU: 1 PID: 13905 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00009-g25216be1ac5e #0 [ 529.704737][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 529.704746][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 529.704766][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d 0a 13 31 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 529.704779][ C1] RSP: 0018:ffffc90002567140 EFLAGS: 00000046 [ 529.704792][ C1] RAX: 0000000000000003 RBX: 1ffff920004ace2c RCX: ffffffff8500688c [ 529.704804][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffffc90007196080 [ 529.704814][ C1] RBP: ffffc900025671f0 R08: dffffc0000000000 R09: fffff52000e32c11 [ 529.704827][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 529.704837][ C1] R13: ffffc90007196080 R14: 0000000000000003 R15: 1ffff920004ace30 [ 529.704848][ C1] FS: 00007fee32f906c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 529.704862][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 529.704873][ C1] CR2: 0000786c6c257830 CR3: 0000000119a4e000 CR4: 00000000003506a0 [ 529.704888][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 529.704897][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 529.704906][ C1] Call Trace: [ 529.704913][ C1] [ 529.704919][ C1] ? show_regs+0x58/0x60 [ 529.704939][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 529.704959][ C1] ? nmi_trigger_cpumask_backtrace+0x3c0/0x3c0 [ 529.704980][ C1] ? kvm_wait+0x117/0x180 [ 529.704993][ C1] ? kvm_wait+0x117/0x180 [ 529.705006][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 529.705023][ C1] ? nmi_handle+0xa7/0x280 [ 529.705039][ C1] ? kvm_wait+0x117/0x180 [ 529.705051][ C1] ? kvm_wait+0x117/0x180 [ 529.705064][ C1] ? default_do_nmi+0x69/0x160 [ 529.705082][ C1] ? exc_nmi+0xaf/0x120 [ 529.705097][ C1] ? end_repeat_nmi+0x16/0x31 [ 529.705127][ C1] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 529.705151][ C1] ? kvm_wait+0x117/0x180 [ 529.705164][ C1] ? kvm_wait+0x117/0x180 [ 529.705178][ C1] ? kvm_wait+0x117/0x180 [ 529.705191][ C1] [ 529.705195][ C1] [ 529.705200][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 529.705215][ C1] ? pv_hash+0x86/0x150 [ 529.705234][ C1] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 529.705258][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 529.705281][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.705299][ C1] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 529.705321][ C1] ? compat_start_thread+0x20/0x20 [ 529.705341][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 529.705361][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.705379][ C1] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 529.705397][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 529.705417][ C1] ? _raw_spin_unlock+0x4c/0x70 [ 529.705436][ C1] ? finish_task_switch+0x167/0x7b0 [ 529.705457][ C1] __bpf_ringbuf_reserve+0x1c5/0x3d0 [ 529.705474][ C1] ? bpf_ringbuf_notify+0x30/0x30 [ 529.705488][ C1] ? __sched_text_start+0x8/0x8 [ 529.705505][ C1] bpf_ringbuf_output+0x66/0x1f0 [ 529.705520][ C1] bpf_prog_a3e2825f60354855+0x3d/0x41 [ 529.705536][ C1] bpf_trace_run2+0x133/0x290 [ 529.705549][ C1] ? schedule_preempt_disabled+0x20/0x20 [ 529.705567][ C1] ? bpf_trace_run1+0x240/0x240 [ 529.705580][ C1] ? __kasan_check_write+0x14/0x20 [ 529.705596][ C1] __bpf_trace_contention_end+0xb/0x10 [ 529.705613][ C1] __pv_queued_spin_lock_slowpath+0xd59/0xda0 [ 529.705635][ C1] ? rt_mutex_futex_unlock+0x170/0x1f0 [ 529.705655][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 529.705677][ C1] ? swake_up_one_online+0x6b/0x110 [ 529.705698][ C1] _raw_spin_lock_irqsave+0x1a0/0x210 [ 529.705718][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 529.705734][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 529.705754][ C1] ? __bpf_ringbuf_reserve+0x23b/0x3d0 [ 529.705769][ C1] ? _raw_spin_unlock_irqrestore+0x56/0x80 [ 529.705791][ C1] __bpf_ringbuf_reserve+0x1c5/0x3d0 [ 529.705807][ C1] ? bpf_ringbuf_notify+0x30/0x30 [ 529.705821][ C1] ? bpf_test_timer_continue+0xf2/0x460 [ 529.705841][ C1] bpf_ringbuf_output+0x66/0x1f0 [ 529.705856][ C1] bpf_prog_a3e2825f60354855+0x3d/0x41 [ 529.705870][ C1] bpf_test_run+0x4ab/0xa40 [ 529.705892][ C1] ? convert___skb_to_skb+0x670/0x670 [ 529.705909][ C1] ? build_skb+0x2c/0x220 [ 529.705925][ C1] ? eth_type_trans+0x2ca/0x650 [ 529.705941][ C1] ? eth_get_headlen+0x240/0x240 [ 529.705956][ C1] ? convert___skb_to_skb+0x44/0x670 [ 529.705973][ C1] ? build_skb+0xde/0x220 [ 529.705988][ C1] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 529.706011][ C1] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 529.706030][ C1] ? __kasan_check_write+0x14/0x20 [ 529.706043][ C1] ? fput+0x15b/0x1b0 [ 529.706055][ C1] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 529.706074][ C1] bpf_prog_test_run+0x3b0/0x630 [ 529.706094][ C1] ? bpf_prog_query+0x260/0x260 [ 529.706118][ C1] ? selinux_bpf+0xd2/0x100 [ 529.706135][ C1] ? security_bpf+0x82/0xb0 [ 529.706153][ C1] __sys_bpf+0x59f/0x7f0 [ 529.706170][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.706189][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 529.706213][ C1] ? __kasan_check_write+0x14/0x20 [ 529.706226][ C1] ? fpregs_restore_userregs+0x130/0x290 [ 529.706245][ C1] __x64_sys_bpf+0x7c/0x90 [ 529.706264][ C1] do_syscall_64+0x3d/0xb0 [ 529.706279][ C1] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 529.706293][ C1] RIP: 0033:0x7fee3227cea9 [ 529.706305][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 529.706317][ C1] RSP: 002b:00007fee32f900c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 529.706332][ C1] RAX: ffffffffffffffda RBX: 00007fee323b3f80 RCX: 00007fee3227cea9 [ 529.706344][ C1] RDX: 0000000000000050 RSI: 0000000020000000 RDI: 000000000000000a [ 529.706353][ C1] RBP: 00007fee322ebff4 R08: 0000000000000000 R09: 0000000000000000 [ 529.706364][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.706373][ C1] R13: 000000000000000b R14: 00007fee323b3f80 R15: 00007ffeebff1068 [ 529.706387][ C1]