last executing test programs: 2.014447076s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x2, 0x150a}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000d00)=ANY=[@ANYRESHEX=r0, @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff003055000300000000000000000007020000f8ffffffb703000008200000b704000000000000850000000100000095de29b25031430eb39870976457991185484265d48702ada7545110b74977667054ccc2417e1cc230bf"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) (async) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000c24cc234009500000000000000"], 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x8000}) (async) socketpair(0x11, 0x800, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x9, &(0x7f00000001c0)=[{0xfffe, 0x5c, 0x6}, {0x1ff, 0x6, 0x80, 0x32}, {0x1ff, 0xc, 0x24, 0x9}, {0x8, 0x81, 0x5, 0x1a56}, {0x7, 0x1, 0xf, 0x8}, {0xfffb, 0x1, 0xff, 0x5}, {0x200, 0x9, 0xda, 0xaa4}, {0xb000, 0x40, 0xe8, 0x4}, {0x7f, 0x6, 0x3, 0x4}]}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 2.005308257s ago: executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x90) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000063013b0000000000950000000000000041cea7799e8484016ad829c1128af9479960a7640444a0b5cf1a4928391857084c8af5cb71de333be3e0c0e1b650a4b76409974d8463dde81aad8306112cf1c11d06c48fab"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x11, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6}, @generic={0xf9, 0x7, 0x3, 0x3ff, 0x6}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @jmp={0x5, 0x0, 0x14, 0x2, 0x0, 0x100, 0x8}, @call={0x85, 0x0, 0x0, 0xb9}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r3, 0xffffffffffffffff}, &(0x7f0000000800), 0x0}, 0x20) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x5, &(0x7f0000000600)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r7, r3, r3, r7, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0xde0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000214de0220b235e59fe613c5858d00000000000000ff0100006da000000800008095000000129c5c9275ef7162309aaac3c5c3b89d2ce859bf71914fbca154f7df0989e015c3bba0a9c5cd32fb39ee7c6be99493249c75c01c449d571116c03a9a223fe1ea9749dd4da8a55a0dace0c5b38b17937b8413e3f28accbea9161c54a3c1ffa02a4c904cbbdcab0b5a6b50ddb253cf8b424b775cc1d508524097f73d06fd450305ec29c2e514fac348c7", @ANYRES8=r2, @ANYRES32=r0, @ANYRES64=r8, @ANYRES64=r1, @ANYRESOCT=r6, @ANYRESDEC=r4, @ANYRESOCT=r4, @ANYRESDEC=r5, @ANYRES8=r5, @ANYBLOB="f4ff563047e06e069d4bb798f72d994ca956baf708c1f045ec722da41339c4977f3a34840148466c3b66f6fddc2abd55448d7324ef95ac08179cb2ec7623d751090b6fd4a7fadf812ea759aec14fa2e864d0669353efc050e4"], &(0x7f0000000100)='GPL\x00', 0x80, 0x24, &(0x7f0000000140)=""/36, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a50000009757670373bb8bc004a8f2e8d2c5c969d9d02c71757e97da4db7b93606fa025a56ce4c04f3c02704b8b80f843a12d26f1feefca639483451e6197d5205f911"], &(0x7f0000000700)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x0, 0xc, 0x80000001, 0x101}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000b40)=[r7, 0xffffffffffffffff, r7, r1], &(0x7f0000000b80)=[{0x0, 0x5, 0xb, 0x3}, {0x4, 0x3, 0xd, 0x8}, {0x0, 0x1, 0x5, 0xb}], 0x10, 0xec8}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_int(r10, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000f40)=ANY=[@ANYBLOB="405f755d65747f002085f0571072ccf3548981d2a75aaad2ae6d49a39c238b6edd8601874d9fe5fadcd46f849bc5445cd998e60a8645f1cdd19be0e58d3129db290fbe9929b02abc4038e378124fab12726189e7e3037bd989ce4f90948bcaf5805bcae53f4d1e207303e791cec73fb2fc63ebecc9548bff8e15977fae416a613f4500"/140], 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x6611, &(0x7f0000000040)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.98426428s ago: executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x4, 0x4, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, &(0x7f0000000740)=""/235, &(0x7f0000000300)="305322a06cb17946a08504725d123a4e9ba5e67de97fc58d69764a781d5185bd12cc39ef5d65c20ee084434b062e1b59f32871e454d4cb9299a6c48a958100d6d63e722ec06446c312a22ad2f55755705f84d8ce5b78cf70a9a47f6e4f83be04bb27be9a28ff", &(0x7f0000000380)="d003259669bafb5896f3006313fa7275d2170a0ee4fe11d5b167d34a9219", 0x22b8}, 0x38) 1.974172462s ago: executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001300), 0x1}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000001280), 0x4) recvmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/130, 0x82}], 0x1}, 0x4100) sendmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000005c0)='O', 0x1}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x1, 0x4, 0x2, 0x0, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x3, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000002980)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 1.865033149s ago: executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000004c0)='memory.max\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8927, &(0x7f0000000280)={'wg2\x00'}) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000540)=ANY=[@ANYRES64=r2], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x8049, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="1e031c003c5ca6012887636086000008"], 0xffdd) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f030000e0ff0060007538e486dd630ace2202052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa000088a8"], 0xcfa4) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x200000000000035b, &(0x7f0000000200)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfff}, 0x90) socketpair(0x34, 0x800, 0x7, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x7, 0x7, 0x0, 0x5, 0x1, 0x8001, [{0x9, 0x2, 0xfffffff9}, {0xb, 0x3, 0x3}, {0xe, 0x0, 0x8}, {0xc, 0x0, 0x6}, {0x0, 0x3, 0x1ff}, {0x2, 0x0, 0x5}, {0x10, 0x5}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/99, 0x7d, 0x63, 0x1, 0x6}, 0x20) 1.565506376s ago: executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x4, 0x4, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, &(0x7f0000000740)=""/235, &(0x7f0000000300)="305322a06cb17946a08504725d123a4e9ba5e67de97fc58d69764a781d5185bd12cc39ef5d65c20ee084434b062e1b59f32871e454d4cb9299a6c48a958100d6d63e722ec06446c312a22ad2f55755705f84d8ce5b78cf70a9a47f6e4f83be04bb27be9a28ff", &(0x7f0000000380)="d003259669bafb5896f3006313fa7275d2170a0ee4fe11d5b167d34a9219", 0x22b8}, 0x38) 1.419163768s ago: executing program 4: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x816, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="24b6e474f080f3509feb0105b23ff5fb625a3101002400000009000000000000000200000fffffffff0e04000000000000000000000700000003000000fd0000ecffffff0000000000008aac7eb12ea7dcf1602121e02eb3c9a4310f450cc5d18177f5cb2558a26e337ddd4edd7bf64ef8b90d44b569345e21ee963205"], &(0x7f0000000040)=""/249, 0x45, 0xf9, 0x6}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000c600000000000000c605000000000b009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x93, &(0x7f0000000100)=""/147}, 0x5e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, &(0x7f0000000100)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x3, 0x51, 0x40, r0, 0x59, '\x00', 0x0, r2, 0x0, 0x6, 0x3, 0xc}, 0x48) 1.229261688s ago: executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f00000003c0)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xffffffffffffff1c}, 0x70) 1.138826382s ago: executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f00000003c0)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xffffffffffffff1c}, 0x70) 1.132001553s ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x90) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x4, 0x9, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00'}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffe16) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r0, 0x8b0f, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000670000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.110407586s ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000cc0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffd2a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x91, 0x43451) 1.041825798s ago: executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40106614, &(0x7f0000000040)) 1.005821393s ago: executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000004c0)='memory.max\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8927, &(0x7f0000000280)={'wg2\x00'}) perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000540)=ANY=[@ANYRES64=r2], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x8049, 0x7}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="1e031c003c5ca6012887636086000008"], 0xffdd) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f030000e0ff0060007538e486dd630ace2202052f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa000088a8"], 0xcfa4) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x200000000000035b, &(0x7f0000000200)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfff}, 0x90) socketpair(0x34, 0x800, 0x7, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0x7, 0x7, 0x0, 0x5, 0x1, 0x8001, [{0x9, 0x2, 0xfffffff9}, {0xb, 0x3, 0x3}, {0xe, 0x0, 0x8}, {0xc, 0x0, 0x6}, {0x0, 0x3, 0x1ff}, {0x2, 0x0, 0x5}, {0x10, 0x5}]}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f00000000c0)=""/99, 0x7d, 0x63, 0x1, 0x6}, 0x20) 912.887008ms ago: executing program 2: bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x800000, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b1d0a30, 0x4101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x10001}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, 0x0, 0xda00) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x100001}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000500)="557ab1d9a2bf9729e4fddce1a266f03184150975093b057d7266289f8c4986f3f4e7bd15e8cf76890f4887bcc34b6d824992ab7a22a9c3bbdbabe7c8898476c0ef376a216f3e24f0a05dbba8309dc8dfa6a163464e9b7fb8320cdc97e7c945428ee4a478c1a3fb45e95e62061350b6e33d6095ed69c5ec9971f8ef71af4aa8e121a52d16ff9dabdf000fd5e31b42267871f10625327bb106ae22429c14e429e52420ed9fb4b34990", 0x0, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r1, &(0x7f0000000040)={'c', ' *:* ', 'rw\x00'}, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) sendmsg$unix(r5, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a06030000002300"/48], 0xfdef) 855.200656ms ago: executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x4, 0x4, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, &(0x7f0000000740)=""/235, &(0x7f0000000300)="305322a06cb17946a08504725d123a4e9ba5e67de97fc58d69764a781d5185bd12cc39ef5d65c20ee084434b062e1b59f32871e454d4cb9299a6c48a958100d6d63e722ec06446c312a22ad2f55755705f84d8ce5b78cf70a9a47f6e4f83be04bb27be9a28ff", &(0x7f0000000380)="d003259669bafb5896f3006313fa7275d2170a0ee4fe11d5b167d34a9219", 0x22b8}, 0x38) 826.746551ms ago: executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x90) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000063013b0000000000950000000000000041cea7799e8484016ad829c1128af9479960a7640444a0b5cf1a4928391857084c8af5cb71de333be3e0c0e1b650a4b76409974d8463dde81aad8306112cf1c11d06c48fab"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x11, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6}, @generic={0xf9, 0x7, 0x3, 0x3ff, 0x6}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @jmp={0x5, 0x0, 0x14, 0x2, 0x0, 0x100, 0x8}, @call={0x85, 0x0, 0x0, 0xb9}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r3, 0xffffffffffffffff}, &(0x7f0000000800), 0x0}, 0x20) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x5, &(0x7f0000000600)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r7, r3, r3, r7, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0xde0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000214de0220b235e59fe613c5858d00000000000000ff0100006da000000800008095000000129c5c9275ef7162309aaac3c5c3b89d2ce859bf71914fbca154f7df0989e015c3bba0a9c5cd32fb39ee7c6be99493249c75c01c449d571116c03a9a223fe1ea9749dd4da8a55a0dace0c5b38b17937b8413e3f28accbea9161c54a3c1ffa02a4c904cbbdcab0b5a6b50ddb253cf8b424b775cc1d508524097f73d06fd450305ec29c2e514fac348c7", @ANYRES8=r2, @ANYRES32=r0, @ANYRES64=r8, @ANYRES64=r1, @ANYRESOCT=r6, @ANYRESDEC=r4, @ANYRESOCT=r4, @ANYRESDEC=r5, @ANYRES8=r5, @ANYBLOB="f4ff563047e06e069d4bb798f72d994ca956baf708c1f045ec722da41339c4977f3a34840148466c3b66f6fddc2abd55448d7324ef95ac08179cb2ec7623d751090b6fd4a7fadf812ea759aec14fa2e864d0669353efc050e4"], &(0x7f0000000100)='GPL\x00', 0x80, 0x24, &(0x7f0000000140)=""/36, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a50000009757670373bb8bc004a8f2e8d2c5c969d9d02c71757e97da4db7b93606fa025a56ce4c04f3c02704b8b80f843a12d26f1feefca639483451e6197d5205f911"], &(0x7f0000000700)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x0, 0xc, 0x80000001, 0x101}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000b40)=[r7, 0xffffffffffffffff, r7, r1], &(0x7f0000000b80)=[{0x0, 0x5, 0xb, 0x3}, {0x4, 0x3, 0xd, 0x8}, {0x0, 0x1, 0x5, 0xb}], 0x10, 0xec8}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_int(r10, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000f40)=ANY=[@ANYBLOB="405f755d65747f002085f0571072ccf3548981d2a75aaad2ae6d49a39c238b6edd8601874d9fe5fadcd46f849bc5445cd998e60a8645f1cdd19be0e58d3129db290fbe9929b02abc4038e378124fab12726189e7e3037bd989ce4f90948bcaf5805bcae53f4d1e207303e791cec73fb2fc63ebecc9548bff8e15977fae416a613f4500"/140], 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x6611, &(0x7f0000000040)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 788.640427ms ago: executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x7, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x87}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xea, &(0x7f0000000340)=""/234}, 0x80) 661.056767ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000540)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8080001, 0x0, @perf_config_ext={0x1, 0xffff}, 0x802, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000140), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x97, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000800)={'pim6reg1\x00', @link_local={0x1, 0x63}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r2, r3, 0x0, 0x3, &(0x7f0000000440)='$-\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0xfffffffffffffffd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x7604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 648.635698ms ago: executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x8927, &(0x7f0000000040)={0x0, 0x0}) 601.387746ms ago: executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f00000003c0)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xffffffffffffff1c}, 0x70) 594.015967ms ago: executing program 3: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x81, 0x4, 0xffffffff, 0x16, 0xffffffffffffffff, 0xffffffff}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xe0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x11208, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0x80000000000000}, 0x0, 0x10000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000009f1a0063110800000000008510000002000000850000000500020095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xef, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/262, 0x106}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x42}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r3, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001b40)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) 547.121344ms ago: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f00000003c0)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x14, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000), 0xffffffffffffff1c}, 0x70) 546.469064ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000740)={r0, &(0x7f0000000000), &(0x7f00000000c0)=""/109, 0x4}, 0x20) 526.952368ms ago: executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x14, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x3, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x7, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{0x1}, &(0x7f0000000500), &(0x7f0000000540)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x4, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={0x1}, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0xb4, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 523.349068ms ago: executing program 1: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x816, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x19000) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="24b6e474f080f3509feb0105b23ff5fb625a3101002400000009000000000000000200000fffffffff0e04000000000000000000000700000003000000fd0000ecffffff0000000000008aac7eb12ea7dcf1602121e02eb3c9a4310f450cc5d18177f5cb2558a26e337ddd4edd7bf64ef8b90d44b569345e21ee963205"], &(0x7f0000000040)=""/249, 0x45, 0xf9, 0x6}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000c600000000000000c605000000000b009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x93, &(0x7f0000000100)=""/147}, 0x5e) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40286608, &(0x7f0000000100)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x3, 0x51, 0x40, r0, 0x59, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x3, 0xc}, 0x48) 480.611145ms ago: executing program 0: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61122400000000006113340000000000bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee59541199"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000d80)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000003c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x4, 0x4, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, &(0x7f0000000740)=""/235, &(0x7f0000000300)="305322a06cb17946a08504725d123a4e9ba5e67de97fc58d69764a781d5185bd12cc39ef5d65c20ee084434b062e1b59f32871e454d4cb9299a6c48a958100d6d63e722ec06446c312a22ad2f55755705f84d8ce5b78cf70a9a47f6e4f83be04bb27be9a28ff", &(0x7f0000000380)="d003259669bafb5896f3006313fa7275d2170a0ee4fe11d5b167d34a9219", 0x22b8}, 0x38) 448.49207ms ago: executing program 4: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x816, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x15}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000040)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="24b6e474f080f3509feb0105b23ff5fb625a3101002400000009000000000000000200000fffffffff0e04000000000000000000000700000003000000fd0000ecffffff0000000000008aac7eb12ea7dcf1602121e02eb3c9a4310f450cc5d18177f5cb2558a26e337ddd4edd7bf64ef8b90d44b569345e21ee963205"], &(0x7f0000000040)=""/249, 0x45, 0xf9, 0x6}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000c600000000000000c605000000000b009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x93, &(0x7f0000000100)=""/147}, 0x5e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, &(0x7f0000000100)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x7, 0x3, 0x51, 0x40, r0, 0x59, '\x00', 0x0, r2, 0x0, 0x6, 0x3, 0xc}, 0x48) 416.040925ms ago: executing program 0: bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000140)="a2", 0x1}, {&(0x7f0000000a40)="d0819a6df9baf02bdf32171646263960941a7fd5485b168d1b44dd1993d2727147e9e9ac8610fdea0becfee55e50b712ecd011061f5716724755a826d7d68613ca5ea27630c44940cf2811ba519d6381fe146f3dc11cddaee05ba8230e61bcfd8543199323e20902e19122e6e01258b69faad47f76d8d88bb54d92389b6ed6222b5b24399cce2af20e98c85ada69e1d3158fde69404b50fc6a2f1163aac046ee2ba93b8a58212682f5dec9f773573120bd87dbe2ad6f5bf68c16367cffb8f9584894473185f83ce6fbe4e5bc11351a73c73e", 0xd2}, {&(0x7f0000000940)="b885542ac686f8d66554295300828da0245e1c5d7c5a9454032782c1d36bf4b897d16741f09ad242a61af944719930d30b74", 0x32}, {0x0}, {&(0x7f0000000c40)="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", 0xfa}], 0x5}, 0x1fffffff) sendmsg$tipc(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x40000c1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x9, 0x1c000, 0x1, 0x104, 0xffffffffffffffff, 0xbffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x0, 0xc}, 0x48) recvmsg(r0, &(0x7f00000008c0)={&(0x7f00000005c0)=@nl=@proc, 0x80, &(0x7f0000000880)=[{&(0x7f0000000700)=""/194, 0xc2}, {&(0x7f0000000640)=""/71, 0x47}, {&(0x7f0000000800)=""/34, 0x22}, {&(0x7f0000000840)=""/20, 0x14}], 0x4, &(0x7f0000001900)=""/4096, 0x1000}, 0x10001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r2}, &(0x7f0000000500)=0x2, &(0x7f0000000540)='%-010d \x00'}, 0x20) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000980)='tasks\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, 0x0, 0x26}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 229.470824ms ago: executing program 0: close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x0, 0xc, 0x5, 0xa, 0xffffffffffffffff, 0xfffffffffffffff1}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x5}], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x2b, &(0x7f0000000280)=""/43, 0x41100, 0xc, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f00000002c0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xf, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r1], 0x0, 0x10, 0x800}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0189436, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x12) bpf$PROG_BIND_MAP(0x23, &(0x7f00000004c0)={r3, r5}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x90) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000063013b0000000000950000000000000041cea7799e8484016ad829c1128af9479960a7640444a0b5cf1a4928391857084c8af5cb71de333be3e0c0e1b650a4b76409974d8463dde81aad8306112cf1c11d06c48fab"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r3 = bpf$ITER_CREATE(0xb, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x11, &(0x7f0000000e00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x6}, @generic={0xf9, 0x7, 0x3, 0x3ff, 0x6}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @jmp={0x5, 0x0, 0x14, 0x2, 0x0, 0x100, 0x8}, @call={0x85, 0x0, 0x0, 0xb9}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x10, 0xfffffffe}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r3, 0xffffffffffffffff}, &(0x7f0000000800), 0x0}, 0x20) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x5, &(0x7f0000000600)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x7, 0x1, 0x0, r7}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[r7, r3, r3, r7, 0xffffffffffffffff, r3, r3], 0x0, 0x10, 0xde0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000214de0220b235e59fe613c5858d00000000000000ff0100006da000000800008095000000129c5c9275ef7162309aaac3c5c3b89d2ce859bf71914fbca154f7df0989e015c3bba0a9c5cd32fb39ee7c6be99493249c75c01c449d571116c03a9a223fe1ea9749dd4da8a55a0dace0c5b38b17937b8413e3f28accbea9161c54a3c1ffa02a4c904cbbdcab0b5a6b50ddb253cf8b424b775cc1d508524097f73d06fd450305ec29c2e514fac348c7", @ANYRES8=r2, @ANYRES32=r0, @ANYRES64=r8, @ANYRES64=r1, @ANYRESOCT=r6, @ANYRESDEC=r4, @ANYRESOCT=r4, @ANYRESDEC=r5, @ANYRES8=r5, @ANYBLOB="f4ff563047e06e069d4bb798f72d994ca956baf708c1f045ec722da41339c4977f3a34840148466c3b66f6fddc2abd55448d7324ef95ac08179cb2ec7623d751090b6fd4a7fadf812ea759aec14fa2e864d0669353efc050e4"], &(0x7f0000000100)='GPL\x00', 0x80, 0x24, &(0x7f0000000140)=""/36, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000200)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff], 0x0, 0x10, 0x1}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x12, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a50000009757670373bb8bc004a8f2e8d2c5c969d9d02c71757e97da4db7b93606fa025a56ce4c04f3c02704b8b80f843a12d26f1feefca639483451e6197d5205f911"], &(0x7f0000000700)='GPL\x00', 0x6, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x0, 0xc, 0x80000001, 0x101}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000b40)=[r7, 0xffffffffffffffff, r7, r1], &(0x7f0000000b80)=[{0x0, 0x5, 0xb, 0x3}, {0x4, 0x3, 0xd, 0x8}, {0x0, 0x1, 0x5, 0xb}], 0x10, 0xec8}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_int(r10, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r11, &(0x7f0000000f40)=ANY=[@ANYBLOB="405f755d65747f002085f0571072ccf3548981d2a75aaad2ae6d49a39c238b6edd8601874d9fe5fadcd46f849bc5445cd998e60a8645f1cdd19be0e58d3129db290fbe9929b02abc4038e378124fab12726189e7e3037bd989ce4f90948bcaf5805bcae53f4d1e207303e791cec73fb2fc63ebecc9548bff8e15977fae416a613f4500"/140], 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x6611, &(0x7f0000000040)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.96' (ED25519) to the list of known hosts. 2024/06/19 06:11:47 fuzzer started 2024/06/19 06:11:47 dialing manager at 10.128.0.163:30002 [ 21.995319][ T23] audit: type=1400 audit(1718777507.460:66): avc: denied { node_bind } for pid=344 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 22.015868][ T23] audit: type=1400 audit(1718777507.460:67): avc: denied { name_bind } for pid=344 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 22.066069][ T23] audit: type=1400 audit(1718777507.530:68): avc: denied { setattr } for pid=353 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9310 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.074393][ T352] cgroup1: Unknown subsys name 'net' [ 22.099437][ T23] audit: type=1400 audit(1718777507.530:69): avc: denied { mounton } for pid=352 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.122514][ T352] cgroup1: Unknown subsys name 'net_prio' [ 22.123059][ T23] audit: type=1400 audit(1718777507.530:70): avc: denied { mount } for pid=352 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.139654][ T352] cgroup1: Unknown subsys name 'devices' [ 22.157421][ T23] audit: type=1400 audit(1718777507.560:71): avc: denied { mounton } for pid=356 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.182300][ T23] audit: type=1400 audit(1718777507.560:72): avc: denied { mount } for pid=356 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.207196][ T23] audit: type=1400 audit(1718777507.670:73): avc: denied { unmount } for pid=352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.213152][ T360] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.235663][ T23] audit: type=1400 audit(1718777507.700:74): avc: denied { relabelto } for pid=360 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.261056][ T23] audit: type=1400 audit(1718777507.700:75): avc: denied { write } for pid=360 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.317268][ T352] cgroup1: Unknown subsys name 'hugetlb' [ 22.323112][ T352] cgroup1: Unknown subsys name 'rlimit' [ 22.348171][ T359] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 2024/06/19 06:11:47 starting 5 executor processes [ 22.746406][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.753384][ T369] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.760669][ T369] device bridge_slave_0 entered promiscuous mode [ 22.769748][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.776602][ T369] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.784048][ T369] device bridge_slave_1 entered promiscuous mode [ 22.881871][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.888720][ T370] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.896189][ T370] device bridge_slave_0 entered promiscuous mode [ 22.905021][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.912105][ T370] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.919377][ T370] device bridge_slave_1 entered promiscuous mode [ 22.995322][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.002283][ T371] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.009567][ T371] device bridge_slave_0 entered promiscuous mode [ 23.020250][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027151][ T371] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.034557][ T371] device bridge_slave_1 entered promiscuous mode [ 23.096470][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.103437][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.110878][ T373] device bridge_slave_0 entered promiscuous mode [ 23.136752][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.143694][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.150922][ T372] device bridge_slave_0 entered promiscuous mode [ 23.160005][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.166900][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.174257][ T373] device bridge_slave_1 entered promiscuous mode [ 23.191990][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.198820][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.206303][ T372] device bridge_slave_1 entered promiscuous mode [ 23.266797][ T369] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.273646][ T369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.280797][ T369] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.287627][ T369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.373843][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.380681][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.387830][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.394588][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.404959][ T371] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.411820][ T371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.418911][ T371] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.425720][ T371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.475158][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.482014][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.489130][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.495904][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.504340][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.511551][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.518730][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.526215][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.533988][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.540914][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.547883][ T124] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.554873][ T124] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.562765][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.570019][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.594290][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.602569][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.609383][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.616619][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.624926][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.631791][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.663788][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.671617][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.693541][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.722172][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.730359][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.739150][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.746005][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.754000][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.762202][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.770677][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.777603][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.784839][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.792958][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.818271][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.825828][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.833696][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.843554][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.852279][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.860452][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.868679][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.875519][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.883051][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.891236][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.899267][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.906091][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.913675][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.921523][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.930251][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.938072][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.965557][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.973800][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.981640][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.989792][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.004525][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.012778][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.033650][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.042221][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.050214][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.057049][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.064971][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.072582][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.079807][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.088002][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.095979][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.102987][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.110257][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.118470][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.126514][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.133366][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.141809][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.164002][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.172545][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.180542][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.188850][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.197842][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.206249][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.214431][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.221247][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.248282][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.256566][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.265138][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.274765][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.283047][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.291139][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.299040][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.306783][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.314759][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.322789][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.330576][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.338855][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.365916][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.374804][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.383373][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.401847][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.410560][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.418991][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.427584][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.460132][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.469793][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.478688][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.487966][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.496346][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.504781][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.513022][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.521136][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.556206][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.565143][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.573589][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.581669][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.589967][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.623312][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.631593][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.640817][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.649665][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.658074][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.666984][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.704510][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.735135][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.755848][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.770186][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.781954][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.858629][ C1] hrtimer: interrupt took 11110 ns [ 24.901187][ T423] [ 24.910770][ T423] ********************************************************** [ 27.002851][ T423] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 27.010149][ T423] ** ** [ 28.841562][ T423] ** trace_printk() being used. Allocating extra memory. ** [ 28.941909][ T423] ** ** [ 28.963025][ T423] ** This means that this is a DEBUG kernel and it is ** [ 28.970288][ T423] ** unsafe for production use. ** [ 28.977488][ T423] ** ** [ 28.984991][ T423] ** If you see this message and you are not debugging ** [ 28.992253][ T423] ** the kernel, report this immediately to your vendor! ** [ 28.999452][ T423] ** ** [ 29.006745][ T423] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 29.013951][ T423] ********************************************************** [ 29.022559][ T23] kauditd_printk_skb: 24 callbacks suppressed [ 29.022570][ T23] audit: type=1400 audit(1718777510.360:100): avc: denied { create } for pid=422 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.347142][ T23] audit: type=1400 audit(1718777514.810:101): avc: denied { read } for pid=432 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.389341][ T23] audit: type=1400 audit(1718777514.830:102): avc: denied { open } for pid=432 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.727417][ T23] audit: type=1400 audit(1718777515.190:103): avc: denied { write } for pid=449 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.895983][ T23] audit: type=1400 audit(1718777515.360:104): avc: denied { create } for pid=449 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 29.954766][ T434] device syzkaller0 entered promiscuous mode [ 30.280730][ T467] device pim6reg1 entered promiscuous mode [ 30.287080][ T23] audit: type=1400 audit(1718777515.740:105): avc: denied { ioctl } for pid=464 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=790 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.662696][ T23] audit: type=1400 audit(1718777516.130:106): avc: denied { write } for pid=474 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.700943][ T23] audit: type=1400 audit(1718777516.150:107): avc: denied { setopt } for pid=474 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.721010][ T23] audit: type=1400 audit(1718777516.150:108): avc: denied { read } for pid=474 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.012294][ T493] device pim6reg1 entered promiscuous mode [ 31.185398][ T23] audit: type=1400 audit(1718777516.650:109): avc: denied { cpu } for pid=521 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.399931][ T537] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 31.574180][ T503] device syzkaller0 entered promiscuous mode [ 32.126354][ T373] syz-executor.0 (373) used greatest stack depth: 20856 bytes left [ 32.141258][ T570] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 32.211764][ T564] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.218780][ T564] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.226612][ T564] device bridge_slave_0 entered promiscuous mode [ 32.233869][ T564] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.240783][ T564] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.291081][ T564] device bridge_slave_1 entered promiscuous mode [ 32.594720][ T602] cgroup: syz-executor.3 (602) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 32.631832][ T602] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 32.704504][ T616] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 33.580974][ T604] device syzkaller0 entered promiscuous mode [ 33.688100][ T657] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 33.754288][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 33.762865][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.792079][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 33.800302][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.896509][ T393] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.903487][ T393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.974915][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 33.994275][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.014598][ T393] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.021453][ T393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.041272][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 34.049080][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 34.057461][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.085743][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 34.094887][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.103978][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 34.114235][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.130817][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 34.144312][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.162549][ T9] device bridge_slave_1 left promiscuous mode [ 34.168519][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.180929][ T9] device bridge_slave_0 left promiscuous mode [ 34.187708][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.342239][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.480364][ T693] device syzkaller0 entered promiscuous mode [ 34.491895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.500137][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.508551][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.516931][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.525312][ T696] ip6tnl0: mtu greater than device maximum [ 34.549433][ T699] device syzkaller0 entered promiscuous mode [ 34.695883][ T705] device syzkaller0 entered promiscuous mode [ 34.717499][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 34.717513][ T23] audit: type=1400 audit(1718777520.180:112): avc: denied { write } for pid=714 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.853097][ T719] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 35.063338][ T715] syz-executor.4 (715) used greatest stack depth: 20280 bytes left [ 36.085101][ T736] device syzkaller0 entered promiscuous mode [ 36.438173][ T770] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 36.465151][ T747] device syzkaller0 entered promiscuous mode [ 37.687145][ T798] device syzkaller0 entered promiscuous mode [ 37.933727][ T831] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 38.032260][ T801] device syzkaller0 entered promiscuous mode [ 38.075936][ T822] Â: renamed from pim6reg1 [ 39.070543][ T871] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.077651][ T871] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.192293][ T875] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 39.360770][ T887] device syzkaller0 entered promiscuous mode [ 40.149995][ T918] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4294967295 (only 8 groups) [ 40.641980][ T935] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 40.818223][ T23] audit: type=1400 audit(1718777526.250:113): avc: denied { create } for pid=945 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.904934][ T954] device syzkaller0 entered promiscuous mode [ 41.276866][ T977] EXT4-fs warning (device sda1): ext4_group_extend:1827: can't shrink FS - resize aborted [ 42.317725][ T1030] device syzkaller0 entered promiscuous mode [ 42.368730][ T1040] device syzkaller0 entered promiscuous mode [ 42.451136][ T23] audit: type=1400 audit(1718777527.910:114): avc: denied { ioctl } for pid=1065 comm="syz-executor.1" path="uts:[4026532378]" dev="nsfs" ino=4026532378 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 42.736668][ T23] audit: type=1400 audit(1718777528.200:115): avc: denied { create } for pid=1084 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 43.000528][ T23] audit: type=1400 audit(1718777528.460:116): avc: denied { create } for pid=1093 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 44.108490][ T1096] device syzkaller0 entered promiscuous mode [ 44.270101][ T23] audit: type=1400 audit(1718777529.730:117): avc: denied { create } for pid=1153 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 44.549955][ T1179] device syzkaller0 entered promiscuous mode [ 50.494749][ T1282] device sit0 entered promiscuous mode [ 50.885993][ T23] audit: type=1400 audit(1718777536.350:118): avc: denied { create } for pid=1303 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 51.074828][ T1312] device syzkaller0 entered promiscuous mode [ 51.547016][ T1330] device syzkaller0 entered promiscuous mode [ 51.573446][ T1331] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 52.527758][ T1369] device syzkaller0 entered promiscuous mode [ 52.785764][ T1382] device syzkaller0 entered promiscuous mode [ 53.345457][ T1409] device syzkaller0 entered promiscuous mode [ 53.779104][ T1425] device sit0 entered promiscuous mode [ 54.257033][ T1438] device syzkaller0 entered promiscuous mode [ 54.378797][ T1454] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.390496][ T1454] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.488993][ T1457] device bridge_slave_1 left promiscuous mode [ 54.502973][ T1457] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.531982][ T1457] device bridge_slave_0 left promiscuous mode [ 54.537953][ T1457] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.283796][ T1459] Â: renamed from pim6reg1 [ 55.303963][ T1471] device sit0 entered promiscuous mode [ 56.313432][ T1492] device syzkaller0 entered promiscuous mode [ 56.416916][ T1518] device syzkaller0 entered promiscuous mode [ 56.512354][ T1524] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.519747][ T1524] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.577487][ T1528] device syzkaller0 entered promiscuous mode [ 56.891383][ T1535] sock: sock_set_timeout: `syz-executor.2' (pid 1535) tries to set negative timeout [ 57.398984][ T1568] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.407364][ T1568] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.473453][ T23] audit: type=1400 audit(1718777542.940:119): avc: denied { create } for pid=1571 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 57.952055][ T1561] device syzkaller0 entered promiscuous mode [ 57.970875][ T1573] device bridge_slave_1 left promiscuous mode [ 57.976895][ T1573] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.988634][ T1573] device bridge_slave_0 left promiscuous mode [ 58.000733][ T1573] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.252040][ T1570] device syzkaller0 entered promiscuous mode [ 58.305027][ T1598] device pim6reg1 entered promiscuous mode [ 58.741631][ T1631] device syzkaller0 entered promiscuous mode [ 58.755550][ T1626] sock: sock_set_timeout: `syz-executor.1' (pid 1626) tries to set negative timeout [ 58.768225][ T1629] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.777864][ T1629] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.040131][ T1632] device sit0 left promiscuous mode [ 59.053460][ T1636] device bridge_slave_1 left promiscuous mode [ 59.059426][ T1636] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.068814][ T1636] device bridge_slave_0 left promiscuous mode [ 59.074870][ T1636] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.128086][ T1642] device sit0 entered promiscuous mode [ 59.188337][ T1662] device pim6reg1 entered promiscuous mode [ 59.867441][ T1683] sock: sock_set_timeout: `syz-executor.1' (pid 1683) tries to set negative timeout [ 60.241391][ T1694] device syzkaller0 entered promiscuous mode [ 60.343515][ T1709] device syzkaller0 entered promiscuous mode [ 60.479833][ T1753] device sit0 left promiscuous mode [ 60.855404][ T1761] device syzkaller0 entered promiscuous mode [ 61.314140][ T1787] device syzkaller0 entered promiscuous mode [ 61.567874][ T1826] device syzkaller0 entered promiscuous mode [ 62.671388][ T23] audit: type=1400 audit(1718777548.130:120): avc: denied { ioctl } for pid=1869 comm="syz-executor.4" path="socket:[16807]" dev="sockfs" ino=16807 ioctlcmd=0x54cb scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.844006][ T23] audit: type=1400 audit(1718777548.160:121): avc: denied { create } for pid=1869 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 63.128421][ T1868] device syzkaller0 entered promiscuous mode [ 63.878623][ T1890] device syzkaller0 entered promiscuous mode [ 64.126601][ T1911] device syzkaller0 entered promiscuous mode [ 64.405727][ T1858] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.414813][ T1858] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.423806][ T1858] device bridge_slave_0 entered promiscuous mode [ 64.430921][ T1858] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.438068][ T1858] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.446037][ T1858] device bridge_slave_1 entered promiscuous mode [ 64.924036][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.931540][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.135702][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.145633][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.154722][ T852] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.161563][ T852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.169318][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.177896][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.186590][ T852] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.193560][ T852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.047159][ T121] cfg80211: failed to load regulatory.db [ 68.221092][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.253958][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.266412][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.523493][ T1962] device syzkaller0 entered promiscuous mode [ 68.561742][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.569983][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.586248][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.594322][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.625285][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.634215][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.659292][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.668071][ T846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.716741][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.731555][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.826848][ T2014] device syzkaller0 entered promiscuous mode [ 69.980215][ T23] audit: type=1400 audit(1718777555.440:122): avc: denied { write } for pid=2025 comm="syz-executor.4" name="cgroup.subtree_control" dev="cgroup2" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 70.029190][ T23] audit: type=1400 audit(1718777555.470:123): avc: denied { open } for pid=2025 comm="syz-executor.4" path="" dev="cgroup2" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 70.253872][ T2017] device syzkaller0 entered promiscuous mode [ 71.923682][ T2097] device syzkaller0 entered promiscuous mode [ 73.202543][ T2151] device syzkaller0 entered promiscuous mode [ 73.356984][ T2166] device syzkaller0 entered promiscuous mode [ 74.215129][ T2210] device syzkaller0 entered promiscuous mode [ 75.019817][ T2216] device syzkaller0 entered promiscuous mode [ 76.170438][ T2295] device syzkaller0 entered promiscuous mode [ 76.201669][ T2298] device syzkaller0 entered promiscuous mode [ 76.353683][ T369] syz-executor.3 (369) used greatest stack depth: 19576 bytes left [ 77.072038][ T2341] device syzkaller0 entered promiscuous mode [ 77.083267][ T2325] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.090135][ T2325] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.097608][ T2325] device bridge_slave_0 entered promiscuous mode [ 77.125440][ T2359] device syzkaller0 entered promiscuous mode [ 77.142034][ T2325] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.148874][ T2325] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.156706][ T2325] device bridge_slave_1 entered promiscuous mode [ 77.548690][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.592327][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.636888][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.650550][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.659316][ T121] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.666171][ T121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.674708][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.683993][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.692065][ T121] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.698893][ T121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.706983][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.781096][ T121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.229432][ T2399] device syzkaller0 entered promiscuous mode [ 78.238601][ T838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.295301][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.304073][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.312774][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 78.322735][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.507420][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 78.519909][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 78.553324][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 78.602086][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 78.661044][ T23] audit: type=1400 audit(1718777564.120:124): avc: denied { create } for pid=2434 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 78.732337][ T838] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 78.750706][ T838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.909967][ T2461] device syzkaller0 entered promiscuous mode [ 82.844743][ T2523] device syzkaller0 entered promiscuous mode [ 84.035704][ T2596] device syzkaller0 entered promiscuous mode [ 84.184831][ T2611] device syzkaller0 entered promiscuous mode [ 84.441056][ T2633] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.758621][ T2653] device syzkaller0 entered promiscuous mode [ 85.257304][ T2677] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 49 (only 8 groups) [ 85.418197][ T2657] device syzkaller0 entered promiscuous mode [ 86.192934][ T2719] device syzkaller0 entered promiscuous mode [ 86.207230][ T23] audit: type=1400 audit(1718777571.670:125): avc: denied { create } for pid=2727 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 86.527014][ T23] audit: type=1400 audit(1718777571.990:126): avc: denied { create } for pid=2756 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 86.556505][ T2757] device pim6reg1 entered promiscuous mode [ 87.728960][ T2784] device syzkaller0 entered promiscuous mode [ 87.788783][ T23] audit: type=1400 audit(1718777573.250:127): avc: denied { create } for pid=2821 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 88.840926][ T2854] device syzkaller0 entered promiscuous mode [ 89.673827][ T2919] device syzkaller0 entered promiscuous mode [ 91.624370][ T2985] device syzkaller0 entered promiscuous mode [ 91.702928][ T2990] device syzkaller0 entered promiscuous mode [ 91.793516][ T3014] device syzkaller0 entered promiscuous mode [ 92.936944][ T3060] device syzkaller0 entered promiscuous mode [ 92.962592][ T3063] device syzkaller0 entered promiscuous mode [ 93.273636][ T3086] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 93.666205][ T3107] device syzkaller0 entered promiscuous mode [ 94.130801][ T3117] device syzkaller0 entered promiscuous mode [ 94.461503][ T3151] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 95.296817][ T3183] device syzkaller0 entered promiscuous mode [ 95.982024][ T23] audit: type=1400 audit(1718777581.440:128): avc: denied { create } for pid=3239 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 96.131432][ T3248] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 96.469956][ T3257] device syzkaller0 entered promiscuous mode [ 96.524168][ T3269] device syzkaller0 entered promiscuous mode [ 96.566331][ T23] audit: type=1400 audit(1718777582.030:129): avc: denied { create } for pid=3280 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 96.616054][ T23] audit: type=1400 audit(1718777582.060:130): avc: denied { create } for pid=3280 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 97.022842][ T3300] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 97.568895][ T3328] device syzkaller0 entered promiscuous mode [ 97.636587][ T3323] device syzkaller0 entered promiscuous mode [ 97.710670][ T3342] device syzkaller0 entered promiscuous mode [ 98.189979][ T3360] device syzkaller0 entered promiscuous mode [ 98.415615][ T3372] device syzkaller0 entered promiscuous mode [ 98.581366][ T3378] device syzkaller0 entered promiscuous mode [ 98.657048][ T3390] device syzkaller0 entered promiscuous mode [ 98.746139][ T3386] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 99.441084][ T23] audit: type=1400 audit(1718777584.900:131): avc: denied { create } for pid=3425 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 99.609721][ T23] audit: type=1400 audit(1718777585.070:132): avc: denied { create } for pid=3436 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 99.646481][ T3417] device syzkaller0 entered promiscuous mode [ 99.708874][ T3441] device syzkaller0 entered promiscuous mode [ 99.735311][ T3443] device syzkaller0 entered promiscuous mode [ 99.799708][ T3447] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 100.503815][ T3473] device syzkaller0 entered promiscuous mode [ 100.537008][ T3488] device syzkaller0 entered promiscuous mode [ 100.626218][ T3487] device syzkaller0 entered promiscuous mode [ 100.880083][ T3518] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 101.259401][ T3538] device syzkaller0 entered promiscuous mode [ 101.631296][ T3554] device lo entered promiscuous mode [ 102.239729][ T3559] device syzkaller0 entered promiscuous mode [ 102.389788][ T3585] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 103.101396][ T3623] device syzkaller0 entered promiscuous mode [ 103.132916][ T3625] device syzkaller0 entered promiscuous mode [ 103.212028][ T3614] device syzkaller0 entered promiscuous mode [ 104.009001][ T3684] device syzkaller0 entered promiscuous mode [ 104.403927][ T3676] device syzkaller0 entered promiscuous mode [ 105.268224][ T3746] device syzkaller0 entered promiscuous mode [ 105.349991][ T3751] device syzkaller0 entered promiscuous mode [ 106.892054][ T3820] device syzkaller0 entered promiscuous mode [ 107.238427][ T3844] device syzkaller0 entered promiscuous mode [ 108.843950][ T23] audit: type=1400 audit(1718777594.310:133): avc: denied { create } for pid=3908 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 108.935913][ T3880] device syzkaller0 entered promiscuous mode [ 109.117102][ T3912] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1986224493 (only 8 groups) [ 109.465925][ T3946] device syzkaller0 entered promiscuous mode [ 109.540748][ T23] audit: type=1400 audit(1718777595.000:134): avc: denied { create } for pid=3945 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 109.858949][ T3956] device syzkaller0 entered promiscuous mode [ 110.427259][ T3977] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 110.811204][ T4014] device syzkaller0 entered promiscuous mode [ 111.071492][ T4033] device syzkaller0 entered promiscuous mode [ 111.509184][ T4058] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 112.024645][ T4078] device syzkaller0 entered promiscuous mode [ 113.287598][ T4090] device syzkaller0 entered promiscuous mode [ 113.299724][ T4122] device lo entered promiscuous mode [ 113.345526][ T4129] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 113.921365][ T4176] device syzkaller0 entered promiscuous mode [ 114.282446][ T4191] device syzkaller0 entered promiscuous mode [ 115.424408][ T4221] device syzkaller0 entered promiscuous mode [ 115.482937][ T4253] device syzkaller0 entered promiscuous mode [ 115.749322][ T4268] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 116.731986][ T23] audit: type=1400 audit(1718777602.180:135): avc: denied { create } for pid=4312 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 117.109674][ T4304] device syzkaller0 entered promiscuous mode [ 117.190271][ T4333] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 117.348238][ T4337] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 117.883219][ T4391] device syzkaller0 entered promiscuous mode [ 118.024525][ T4386] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 118.585328][ T4404] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 119.048582][ T4433] device syzkaller0 entered promiscuous mode [ 119.174055][ T4438] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 119.484965][ T4444] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 119.858845][ T4460] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 120.174533][ T4474] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 120.726678][ T4495] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 120.948667][ T4505] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 121.319039][ T4525] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 121.924289][ T4544] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 122.113058][ T4562] syz-executor.4[4562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.113127][ T4562] syz-executor.4[4562] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.274932][ T4560] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 122.959305][ T4590] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 123.081123][ T4601] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 124.214487][ T4657] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 124.336588][ T23] audit: type=1400 audit(1718777609.800:136): avc: denied { create } for pid=4685 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 124.869010][ T4716] device syzkaller0 entered promiscuous mode [ 125.559983][ T4755] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 125.699430][ T4761] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 126.004030][ T4790] device syzkaller0 entered promiscuous mode [ 126.836087][ T4846] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 128.039345][ T4861] device syzkaller0 entered promiscuous mode [ 128.114625][ T4893] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 3283 (only 8 groups) [ 128.466166][ T4916] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 129.412596][ T4940] device syzkaller0 entered promiscuous mode [ 129.821003][ T4992] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 130.327116][ T5002] device syzkaller0 entered promiscuous mode [ 132.485513][ T5063] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 132.587525][ T5079] €Â: renamed from pim6reg1 [ 133.493303][ T5124] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 133.791373][ T5140] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 134.530416][ T5170] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 134.766819][ T5181] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 134.868864][ T5186] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 135.133900][ T5214] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 135.628418][ T5262] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 135.664231][ T5261] device lo left promiscuous mode [ 135.914576][ T5266] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 137.459771][ T5362] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 137.565131][ T5376] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 137.595867][ T23] audit: type=1400 audit(1718777623.060:137): avc: denied { create } for pid=5382 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 138.548273][ T5424] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 138.725537][ T5446] device syzkaller0 entered promiscuous mode [ 138.988030][ T23] audit: type=1400 audit(1718777624.450:138): avc: denied { tracepoint } for pid=5471 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 139.139954][ T5489] device syzkaller0 entered promiscuous mode [ 139.287983][ T5495] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 139.594223][ T5514] device lo left promiscuous mode [ 139.654640][ T5514] device lo entered promiscuous mode [ 140.265883][ T5548] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 140.459773][ T5562] device lo entered promiscuous mode [ 140.977708][ T5626] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 141.004657][ T5630] device lo entered promiscuous mode [ 141.070932][ T5634] device syzkaller0 entered promiscuous mode [ 141.439147][ T5663] device lo left promiscuous mode [ 141.501582][ T5663] device lo entered promiscuous mode [ 141.705190][ T5676] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 142.652856][ T23] audit: type=1400 audit(1718777628.110:139): avc: denied { create } for pid=5720 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 143.180444][ T5746] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 143.209668][ T5741] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.216621][ T5741] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.224349][ T5741] device bridge_slave_0 entered promiscuous mode [ 143.232104][ T5741] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.239070][ T5741] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.246958][ T5741] device bridge_slave_1 entered promiscuous mode [ 143.368364][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 143.376109][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.393608][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.403617][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.413389][ T845] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.420267][ T845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.439624][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.448642][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.457272][ T845] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.464132][ T845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.483697][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.491752][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.499741][ T845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.539094][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.564103][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.610637][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.072646][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.176754][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.274557][ T23] audit: type=1400 audit(1718777629.740:140): avc: denied { mounton } for pid=5741 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=11643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 144.424278][ T179] device bridge_slave_1 left promiscuous mode [ 144.430705][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.445946][ T179] device bridge_slave_0 left promiscuous mode [ 144.455926][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.152015][ T5877] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 147.353223][ T5940] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 147.452593][ T5953] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.459500][ T5953] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.467472][ T5953] device bridge_slave_0 entered promiscuous mode [ 147.475148][ T5953] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.482269][ T5953] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.489790][ T5953] device bridge_slave_1 entered promiscuous mode [ 147.602948][ T5953] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.609786][ T5953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.616963][ T5953] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.623812][ T5953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.690568][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.730506][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.758580][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.795987][ T458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.810839][ T458] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.817725][ T458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.012230][ T458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.020366][ T458] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.027224][ T458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.333386][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.531958][ T458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.610087][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.633429][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.642329][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.650191][ T562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.673298][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.682619][ T455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.742299][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.751201][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.770115][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.787878][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.842850][ T179] device bridge_slave_1 left promiscuous mode [ 148.848834][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.868362][ T179] device bridge_slave_0 left promiscuous mode [ 148.875405][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.968461][ T6062] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 150.169540][ T6077] sock: sock_set_timeout: `syz-executor.1' (pid 6077) tries to set negative timeout [ 150.748521][ T6104] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 150.807038][ T6098] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 150.960174][ T6128] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 151.543483][ T6165] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 151.788801][ T6177] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 152.758500][ T6230] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 154.298792][ T6269] device wg2 entered promiscuous mode [ 154.694489][ T6302] device wg2 entered promiscuous mode [ 154.934113][ T6313] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.944410][ T6313] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.037768][ T6323] device bridge_slave_1 left promiscuous mode [ 155.053930][ T6323] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.065170][ T6323] device bridge_slave_0 left promiscuous mode [ 155.071392][ T6323] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.247817][ T6327] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 155.464321][ T6339] device syzkaller0 entered promiscuous mode [ 156.346433][ T6402] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 156.545123][ T6417] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.555732][ T6417] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.756702][ T6417] device bridge_slave_1 left promiscuous mode [ 156.765862][ T6417] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.833503][ T6417] device bridge_slave_0 left promiscuous mode [ 156.934657][ T6417] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.820440][ T6476] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 157.962102][ T6483] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.972501][ T6483] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.135424][ T6483] device bridge_slave_1 left promiscuous mode [ 158.142351][ T6483] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.149770][ T6483] device bridge_slave_0 left promiscuous mode [ 158.156793][ T6483] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.363498][ T6526] device bridge_slave_1 left promiscuous mode [ 159.373777][ T6526] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.391775][ T6526] device bridge_slave_0 left promiscuous mode [ 159.402059][ T6526] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.567355][ T6580] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 161.678481][ T6643] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 162.300152][ T23] audit: type=1400 audit(1718777647.760:141): avc: denied { create } for pid=6667 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 162.327574][ T23] audit: type=1400 audit(1718777647.790:142): avc: denied { create } for pid=6667 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 162.713709][ T6698] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 163.600200][ T6741] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 163.755171][ T6739] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 164.505749][ T6779] syz-executor.4[6779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.337960][ T6799] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 165.924778][ T6809] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 166.551571][ T6848] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 167.376761][ T6877] device syzkaller0 entered promiscuous mode [ 168.213008][ T6907] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 169.079051][ T6969] device syzkaller0 entered promiscuous mode [ 169.260006][ T6968] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 169.700007][ T7005] device syzkaller0 entered promiscuous mode [ 170.108503][ T7030] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 170.199689][ T7027] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 170.643442][ T7046] device syzkaller0 entered promiscuous mode [ 170.813659][ T7058] Â: renamed from pim6reg1 [ 170.833231][ T7058] ref_ctr_offset mismatch. inode: 0x7af offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x7604 [ 171.069837][ T7076] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (809594220) [ 171.452845][ T7083] ================================================================== [ 171.460758][ T7083] BUG: KASAN: use-after-free in detach_if_pending+0x160/0x360 [ 171.468023][ T7083] Write of size 8 at addr ffff8881e2ce31c0 by task syz-executor.4/7083 [ 171.476085][ T7083] [ 171.478270][ T7083] CPU: 0 PID: 7083 Comm: syz-executor.4 Not tainted 5.4.274-syzkaller-00002-g6f97bd951d82 #0 [ 171.488502][ T7083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 171.498389][ T7083] Call Trace: [ 171.501537][ T7083] dump_stack+0x1d8/0x241 [ 171.505691][ T7083] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 171.511328][ T7083] ? printk+0xd1/0x111 [ 171.515339][ T7083] ? detach_if_pending+0x160/0x360 [ 171.520265][ T7083] ? wake_up_klogd+0xb2/0xf0 [ 171.524693][ T7083] ? detach_if_pending+0x160/0x360 [ 171.529638][ T7083] print_address_description+0x8c/0x600 [ 171.535031][ T7083] ? panic+0x89d/0x89d [ 171.538932][ T7083] ? schedule+0x143/0x1d0 [ 171.543097][ T7083] ? detach_if_pending+0x160/0x360 [ 171.548042][ T7083] __kasan_report+0xf3/0x120 [ 171.552478][ T7083] ? detach_if_pending+0x160/0x360 [ 171.560380][ T7083] kasan_report+0x30/0x60 [ 171.564534][ T7083] detach_if_pending+0x160/0x360 [ 171.569307][ T7083] del_timer_sync+0x13c/0x230 [ 171.573816][ T7083] ? find_next_bit+0xcd/0x100 [ 171.578359][ T7083] ? try_to_del_timer_sync+0x150/0x150 [ 171.583714][ T7083] ? pcpu_chunk_relocate+0xdc/0x3a0 [ 171.588749][ T7083] tun_flow_uninit+0x2c/0x280 [ 171.593261][ T7083] ? free_percpu+0x359/0x910 [ 171.597686][ T7083] tun_free_netdev+0x77/0x190 [ 171.602197][ T7083] ? tun_xdp+0x3f0/0x3f0 [ 171.606278][ T7083] netdev_run_todo+0xb7f/0xdf0 [ 171.610882][ T7083] ? netdev_refcnt_read+0x1c0/0x1c0 [ 171.615913][ T7083] ? kfree+0x123/0x370 [ 171.619816][ T7083] ? tun_chr_close+0x8f/0x130 [ 171.624328][ T7083] tun_chr_close+0xc1/0x130 [ 171.628666][ T7083] ? tun_chr_open+0x500/0x500 [ 171.633181][ T7083] __fput+0x262/0x680 [ 171.637002][ T7083] task_work_run+0x140/0x170 [ 171.641432][ T7083] do_exit+0xcaf/0x2bc0 [ 171.645421][ T7083] ? kobject_put+0x21a/0x2f0 [ 171.649847][ T7083] ? put_task_struct+0x80/0x80 [ 171.654446][ T7083] ? __tun_chr_ioctl+0x8ce/0x1d00 [ 171.659321][ T7083] do_group_exit+0x138/0x300 [ 171.663735][ T7083] get_signal+0xdb1/0x1440 [ 171.667993][ T7083] do_signal+0xb0/0x11f0 [ 171.672068][ T7083] ? ioctl_preallocate+0x250/0x250 [ 171.677017][ T7083] ? signal_fault+0x1e0/0x1e0 [ 171.681543][ T7083] ? __fget+0x407/0x490 [ 171.685527][ T7083] ? flush_delayed_fput+0x71/0x80 [ 171.690461][ T7083] ? fput_many+0x23/0x1b0 [ 171.694628][ T7083] ? fput_many+0x2a/0x1b0 [ 171.698797][ T7083] ? fput_many+0x15e/0x1b0 [ 171.703050][ T7083] exit_to_usermode_loop+0xc0/0x1a0 [ 171.708085][ T7083] prepare_exit_to_usermode+0x199/0x200 [ 171.713465][ T7083] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 171.719198][ T7083] RIP: 0033:0x7fee0bbb5f29 [ 171.723445][ T7083] Code: Bad RIP value. [ 171.727345][ T7083] RSP: 002b:00007fee0af0f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 171.735594][ T7083] RAX: fffffffffffffff4 RBX: 00007fee0bced050 RCX: 00007fee0bbb5f29 [ 171.743402][ T7083] RDX: 0000000020000100 RSI: 00000000400454ca RDI: 0000000000000009 [ 171.751215][ T7083] RBP: 00007fee0bc25074 R08: 0000000000000000 R09: 0000000000000000 [ 171.759025][ T7083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 171.766836][ T7083] R13: 000000000000006e R14: 00007fee0bced050 R15: 00007ffc55d3c508 [ 171.774651][ T7083] [ 171.776817][ T7083] The buggy address belongs to the page: [ 171.782293][ T7083] page:ffffea00078b38c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 171.791236][ T7083] flags: 0x8000000000000000() [ 171.795848][ T7083] raw: 8000000000000000 0000000000000000 ffffea0007442b08 0000000000000000 [ 171.804260][ T7083] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 171.812669][ T7083] page dumped because: kasan: bad access detected [ 171.818926][ T7083] page_owner tracks the page as freed [ 171.824135][ T7083] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x146dc0(GFP_USER|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP|__GFP_ZERO) [ 171.838286][ T7083] prep_new_page+0x18f/0x370 [ 171.842820][ T7083] get_page_from_freelist+0x2d13/0x2d90 [ 171.848209][ T7083] __alloc_pages_nodemask+0x393/0x840 [ 171.853532][ T7083] kmalloc_order_trace+0x2a/0x100 [ 171.858391][ T7083] kvmalloc_node+0x7e/0xf0 [ 171.862642][ T7083] alloc_netdev_mqs+0x85/0xc70 [ 171.867248][ T7083] tun_set_iff+0x51f/0xdc0 [ 171.871495][ T7083] __tun_chr_ioctl+0x8a9/0x1d00 [ 171.876183][ T7083] do_vfs_ioctl+0x742/0x1720 [ 171.880611][ T7083] __x64_sys_ioctl+0xd4/0x110 [ 171.885121][ T7083] do_syscall_64+0xca/0x1c0 [ 171.889482][ T7083] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 171.895186][ T7083] page last free stack trace: [ 171.899706][ T7083] __free_pages_ok+0x847/0x950 [ 171.904303][ T7083] __free_pages+0x91/0x140 [ 171.908559][ T7083] device_release+0x6b/0x190 [ 171.912981][ T7083] kobject_put+0x1e6/0x2f0 [ 171.917234][ T7083] tun_set_iff+0x870/0xdc0 [ 171.921486][ T7083] __tun_chr_ioctl+0x8a9/0x1d00 [ 171.926174][ T7083] do_vfs_ioctl+0x742/0x1720 [ 171.930624][ T7083] __x64_sys_ioctl+0xd4/0x110 [ 171.935112][ T7083] do_syscall_64+0xca/0x1c0 [ 171.939472][ T7083] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 171.945177][ T7083] [ 171.947345][ T7083] Memory state around the buggy address: [ 171.952821][ T7083] ffff8881e2ce3080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 171.960716][ T7083] ffff8881e2ce3100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 171.968612][ T7083] >ffff8881e2ce3180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 171.976511][ T7083] ^ [ 171.982500][ T7083] ffff8881e2ce3200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 171.990399][ T7083] ffff8881e2ce3280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 171.998292][ T7083] ================================================================== 2024/06/19 06:14:17 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 172.006365][ T7083] Disabling lock debugging due to kernel taint