last executing test programs: 939.855194ms ago: executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r3 = openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) close(r3) 878.936513ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000f2ff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r0}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 850.754078ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000020000000000000000000010000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) 806.665455ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 763.435081ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00'}, 0x10) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) 578.69341ms ago: executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x12) r3 = getpid() perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = gettid() bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3c, 0x0, &(0x7f0000000580)=[{0x0, 0x4001, 0x0, 0x2}]}, 0x90) sendmsg$unix(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="e4", 0x8ec0}], 0xc0, &(0x7f00000005c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, 0xee01}}}], 0x38}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x2, 0x42, 0x40}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), 0xfffffff8, r8}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) r10 = gettid() sendmsg$unix(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="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", 0xec0}, {0x0}, {&(0x7f0000000140)="bd", 0x1}], 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400001e1c00000001007b9f27209af0bb87a000b29664e00fd9ed82bd7fae5fa685e5edd18eff95a9bc2d85ec919ae31b853881aca3bf7b92c79bdc101222417c3a8964d7d801421fbe114dfa3c96f03f8855a11fb98384367704f5926159c202c8719edeb56d43917c3f19a058a7ed82586085a66864b8731e275f97040523992b4b6cb0538a315106da7c8c3a6742e1b5632c6c5a4266b0f39b127e932eab85487e2fd9a6c05a01893edab150659f270b372b7c0f5d9bd33d77e05f648d375dbacf4f7271565e2dad0597626600ddef4137", @ANYRES64=r0, @ANYRES32=r7, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r10, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="be809f90f70c4107682d805044c64fc32e1e05e43a6282547e3cdde0df26c6a3d1e1d0755869bfa1d5c40b0ef03bd8be119ece38065534d90d5041cffb94a980bdf96798"], 0x60}, 0x0) 469.289887ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) 422.572944ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 388.891579ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d80)={&(0x7f0000000d40)='mmap_lock_acquire_returned\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8902, 0x2000fcc6) 325.872929ms ago: executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5452, &(0x7f0000000040)={'dvmrp0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x2, 0x0, 0x0, 0x93, 0x2, [], "b36e"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "ddc6"}]}, {0x0, [0x0, 0x2e, 0x3e]}}, 0x0, 0x39}, 0x20) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000001200)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000001280)={'a', ' *:* ', 'rw\x00'}, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1ff}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00000085000000d000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='block_split\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) 283.690286ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000008850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1}, 0xc) 267.626398ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 247.602951ms ago: executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r0}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 243.167832ms ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x6) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/699], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080}, 0x3d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 218.744286ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xa, 0x8, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000300), 0x0}, 0x20) 198.507489ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) 188.47569ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000f2ff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r0}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 175.612422ms ago: executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="5eaa00000000000071101900000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) 158.067085ms ago: executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000340)=""/176}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) write$cgroup_devices(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e02"], 0xffdd) 149.843556ms ago: executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00'}, 0x10) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) 144.218657ms ago: executing program 1: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x60000000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe6e, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={0x1, 0x58, &(0x7f0000000800)}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r2) openat$cgroup_ro(r2, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000001940)=""/4096, 0x41100, 0x1, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x9}, 0x8, 0x10, 0x0, 0x0, r0, r2, 0x7, &(0x7f0000000940)=[r3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000a40)=[{0x5, 0x0, 0xd}, {0x0, 0x0, 0x2, 0x5}, {0x4, 0x4, 0x8, 0x7}, {0x4, 0x3, 0x10, 0x6}, {0x5, 0x0, 0x0, 0x3}, {0x2, 0x4, 0xb, 0x7}, {0x80000000, 0x3, 0x7}]}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x1f2f, 0xf, 0xca0, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x161, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) getpid() 124.84ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b7030000000000208500000073"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free_batched\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 98.503715ms ago: executing program 1: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x1, 0x7, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='freezer.state\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000002c00)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000300000000020000000200000001000000000000000000000105da73a2400000000000000000000009"], 0x0, 0x4e}, 0x20) perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) ioctl$SIOCSIFHWADDR(r2, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) 80.440967ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree_skb\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) sendmsg$unix(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 59.49457ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000008850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1}, 0xc) 49.917692ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f00000000c0), 0x12) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) 39.581184ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 19.018897ms ago: executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x5452, &(0x7f0000000040)={'dvmrp0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@datasec={0x2, 0x0, 0x0, 0x93, 0x2, [], "b36e"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "ddc6"}]}, {0x0, [0x0, 0x2e, 0x3e]}}, 0x0, 0x39}, 0x20) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000001200)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000001280)={'a', ' *:* ', 'rw\x00'}, 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1ff}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00000085000000d000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='block_split\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) 13.571857ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xa, 0x8, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000300), 0x0}, 0x20) 0s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.247' (ED25519) to the list of known hosts. 2024/06/16 01:05:23 fuzzer started 2024/06/16 01:05:23 dialing manager at 10.128.0.163:30010 [ 19.025976][ T30] audit: type=1400 audit(1718499923.250:66): avc: denied { node_bind } for pid=280 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 19.032333][ T30] audit: type=1400 audit(1718499923.260:67): avc: denied { name_bind } for pid=280 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 19.058000][ T30] audit: type=1400 audit(1718499923.290:68): avc: denied { integrity } for pid=289 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 19.079739][ T289] cgroup: Unknown subsys name 'net' [ 19.090118][ T289] cgroup: Unknown subsys name 'devices' [ 19.095496][ T30] audit: type=1400 audit(1718499923.290:69): avc: denied { mounton } for pid=288 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.120059][ T30] audit: type=1400 audit(1718499923.290:70): avc: denied { mount } for pid=288 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.143511][ T30] audit: type=1400 audit(1718499923.290:71): avc: denied { setattr } for pid=291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.157666][ T294] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.167027][ T30] audit: type=1400 audit(1718499923.290:72): avc: denied { mounton } for pid=289 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.183763][ T292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.197496][ T30] audit: type=1400 audit(1718499923.290:73): avc: denied { mount } for pid=289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.227991][ T30] audit: type=1400 audit(1718499923.320:74): avc: denied { unmount } for pid=289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.247593][ T30] audit: type=1400 audit(1718499923.410:75): avc: denied { relabelto } for pid=294 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.296860][ T289] cgroup: Unknown subsys name 'hugetlb' [ 19.302352][ T289] cgroup: Unknown subsys name 'rlimit' 2024/06/16 01:05:23 starting 5 executor processes [ 19.876313][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.883171][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.890616][ T307] device bridge_slave_0 entered promiscuous mode [ 19.897530][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.904369][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.911774][ T307] device bridge_slave_1 entered promiscuous mode [ 19.938041][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.944908][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.952144][ T309] device bridge_slave_0 entered promiscuous mode [ 19.963612][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.970580][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.977711][ T309] device bridge_slave_1 entered promiscuous mode [ 20.012644][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.019529][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.026966][ T305] device bridge_slave_0 entered promiscuous mode [ 20.040841][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.047733][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.055055][ T308] device bridge_slave_0 entered promiscuous mode [ 20.061511][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.068411][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.075577][ T305] device bridge_slave_1 entered promiscuous mode [ 20.091486][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.098351][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.105654][ T308] device bridge_slave_1 entered promiscuous mode [ 20.196578][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.203427][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.211357][ T306] device bridge_slave_0 entered promiscuous mode [ 20.231030][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.238002][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.245411][ T306] device bridge_slave_1 entered promiscuous mode [ 20.331488][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.338359][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.345477][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.352231][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.370791][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.377690][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.384766][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.391531][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.429567][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.436486][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.443522][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.450345][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.487102][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.494149][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.501215][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.508907][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.516437][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.523437][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.530481][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.559341][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.567235][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.574397][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.582363][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.590467][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.598475][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.605320][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.612447][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.620478][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.628387][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.635142][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.642272][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.650225][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.657079][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.664219][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.672305][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.679151][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.686444][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.694361][ T328] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.701207][ T328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.708530][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.733852][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.741661][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.749735][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.757919][ T328] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.764773][ T328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.796926][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.805832][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.813558][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.821368][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.829179][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.848247][ T307] device veth0_vlan entered promiscuous mode [ 20.861516][ T305] device veth0_vlan entered promiscuous mode [ 20.869983][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.877848][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.885053][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.896580][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.903869][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.912211][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.919076][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.926246][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.934437][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.941385][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.948729][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.956544][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.964234][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.972447][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.980448][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.988658][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.996313][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.008863][ T307] device veth1_macvtap entered promiscuous mode [ 21.017090][ T308] device veth0_vlan entered promiscuous mode [ 21.023336][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.030773][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.038221][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.045567][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.052784][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.060775][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.068696][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.084837][ T305] device veth1_macvtap entered promiscuous mode [ 21.095520][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.103727][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.112163][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.120584][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.128975][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.136468][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.143653][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.150989][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.159119][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.167141][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.173970][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.183035][ T309] device veth0_vlan entered promiscuous mode [ 21.196179][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.203666][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.211438][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.219284][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.227463][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.235409][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.242227][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.249440][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.257500][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.265730][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.273813][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.282433][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.289815][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.301369][ T309] device veth1_macvtap entered promiscuous mode [ 21.310959][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.318947][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.327071][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.334468][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.342561][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.356895][ T308] device veth1_macvtap entered promiscuous mode [ 21.367517][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.375050][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.383044][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.391436][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.399509][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.421131][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.429391][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.437899][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.445795][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.453492][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.461378][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.469128][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.477233][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.504763][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.512911][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.521701][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.529880][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.551122][ T306] device veth0_vlan entered promiscuous mode [ 21.566532][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.574676][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.588492][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.597699][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.606032][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.613221][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.634260][ T306] device veth1_macvtap entered promiscuous mode [ 21.658869][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.668116][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.683951][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.692469][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.701025][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.710510][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.146859][ C1] hrtimer: interrupt took 27130 ns [ 24.092667][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 24.092683][ T30] audit: type=1400 audit(1718499928.320:109): avc: denied { write } for pid=540 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 24.725702][ T524] syz-executor.2 (524) used greatest stack depth: 21616 bytes left [ 24.997245][ T30] audit: type=1400 audit(1718499929.230:110): avc: denied { create } for pid=602 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 25.085190][ T30] audit: type=1400 audit(1718499929.320:111): avc: denied { setopt } for pid=611 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.950558][ T615] syz-executor.0 (615) used greatest stack depth: 21392 bytes left [ 26.313432][ T728] device macsec0 entered promiscuous mode [ 27.061070][ T30] audit: type=1400 audit(1718499931.290:112): avc: denied { create } for pid=753 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 27.141558][ T764] device syzkaller0 entered promiscuous mode [ 27.377649][ T30] audit: type=1400 audit(1718499931.610:113): avc: denied { create } for pid=786 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 29.216438][ T941] device syzkaller0 entered promiscuous mode [ 29.720923][ T978] device syzkaller0 entered promiscuous mode [ 29.738545][ T980] device pim6reg1 entered promiscuous mode [ 29.823851][ T30] audit: type=1400 audit(1718499934.050:114): avc: denied { cpu } for pid=988 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.017708][ T1017] device syzkaller0 entered promiscuous mode [ 30.039106][ T1019] device pim6reg1 entered promiscuous mode [ 30.558875][ T1057] device pim6reg1 entered promiscuous mode [ 31.101141][ T1091] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 31.262188][ T1091] device syzkaller0 entered promiscuous mode [ 31.296250][ T1098] device pim6reg1 entered promiscuous mode [ 31.712758][ T1138] device veth1_macvtap left promiscuous mode [ 31.979066][ T1136] device syzkaller0 entered promiscuous mode [ 32.846657][ T1189] device syzkaller0 entered promiscuous mode [ 33.024023][ T1200] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (293486) [ 33.676148][ T1230] device syzkaller0 entered promiscuous mode [ 34.413096][ T1282] device syzkaller0 entered promiscuous mode [ 35.704962][ T1404] Â: renamed from pim6reg1 [ 36.100798][ T30] audit: type=1400 audit(1718499940.330:115): avc: denied { read } for pid=1427 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.146208][ T30] audit: type=1400 audit(1718499940.360:116): avc: denied { open } for pid=1427 comm="syz-executor.4" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.212811][ T1435] Â: renamed from pim6reg1 [ 36.217803][ T30] audit: type=1400 audit(1718499940.360:117): avc: denied { ioctl } for pid=1427 comm="syz-executor.4" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.723922][ T1452] device syzkaller0 entered promiscuous mode [ 36.858585][ T1481] device syzkaller0 entered promiscuous mode [ 36.876990][ T1485] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (293486) [ 37.493472][ T1519] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (293486) [ 37.757853][ T1523] device syzkaller0 entered promiscuous mode [ 38.497428][ T1564] device syzkaller0 entered promiscuous mode [ 38.915191][ T1617] Â: renamed from pim6reg1 [ 39.285775][ T1655] Â: renamed from pim6reg1 [ 39.653331][ T1683] syz-executor.4[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.653401][ T1683] syz-executor.4[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.963808][ T1707] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 40.146697][ T1719] syz-executor.1[1719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.146771][ T1719] syz-executor.1[1719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.541542][ T1815] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 41.627875][ T1823] syz-executor.2[1823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.627947][ T1823] syz-executor.2[1823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.055906][ T1849] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 42.153553][ T1856] syz-executor.4[1856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.153625][ T1856] syz-executor.4[1856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.416070][ T1886] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 42.980587][ T1914] syz-executor.3[1914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.980683][ T1914] syz-executor.3[1914] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.063416][ T1898] device syzkaller0 entered promiscuous mode [ 43.426178][ T1935] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 43.972979][ T1952] device syzkaller0 entered promiscuous mode [ 44.832439][ T2006] device syzkaller0 entered promiscuous mode [ 44.853669][ T2012] ªªªªªª: renamed from vlan0 [ 46.269738][ T2063] ªªªªªª: renamed from vlan0 [ 47.722178][ T2110] device syzkaller0 entered promiscuous mode [ 47.736040][ T309] syz-executor.0 (309) used greatest stack depth: 20880 bytes left [ 47.837939][ T2118] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.844948][ T2118] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.852314][ T2118] device bridge_slave_0 entered promiscuous mode [ 47.859338][ T2118] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.866582][ T2118] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.874370][ T2118] device bridge_slave_1 entered promiscuous mode [ 47.948812][ T2118] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.955720][ T2118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.962798][ T2118] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.969595][ T2118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.027837][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 48.043417][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.065529][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.118323][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.164465][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.171364][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.204844][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.242949][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.249841][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.316670][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.344792][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.383245][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 48.403599][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.424317][ T2118] device veth0_vlan entered promiscuous mode [ 48.442257][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.492077][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.549247][ T2118] device veth1_macvtap entered promiscuous mode [ 48.590278][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 49.251872][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 49.296557][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 49.335086][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 49.358174][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 49.466397][ T10] device bridge_slave_1 left promiscuous mode [ 49.474789][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.505470][ T10] device bridge_slave_0 left promiscuous mode [ 49.511456][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.570374][ T10] device veth1_macvtap left promiscuous mode [ 49.589068][ T10] device veth0_vlan left promiscuous mode [ 50.643884][ T2181] ªªªªªª: renamed from vlan0 [ 55.957118][ T2380] device syzkaller0 entered promiscuous mode [ 56.883736][ T2427] device syzkaller0 entered promiscuous mode [ 57.846290][ T2485] device syzkaller0 entered promiscuous mode [ 58.102709][ T2506] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 58.467254][ T2538] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 58.621296][ T2539] device syzkaller0 entered promiscuous mode [ 58.894228][ T2568] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 59.298520][ T2599] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 59.369234][ T2604] device syzkaller0 entered promiscuous mode [ 59.901110][ T30] audit: type=1400 audit(1718499964.130:118): avc: denied { write } for pid=2628 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 60.037223][ T2637] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 60.191016][ T2651] device syzkaller0 entered promiscuous mode [ 60.627337][ T2697] device syzkaller0 entered promiscuous mode [ 60.959874][ T2709] device syzkaller0 entered promiscuous mode [ 62.114655][ T2816] bpf_get_probe_write_proto: 6 callbacks suppressed [ 62.142261][ T2816] syz-executor.1[2816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.142334][ T2816] syz-executor.1[2816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.321332][ T2845] syz-executor.2[2845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.348923][ T2845] syz-executor.2[2845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.544555][ T2875] syz-executor.1[2875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.563613][ T2875] syz-executor.1[2875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.758008][ T2906] syz-executor.2[2906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.770499][ T2906] syz-executor.2[2906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.001569][ T2944] syz-executor.4[2944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.083843][ T2944] syz-executor.4[2944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.395283][ C0] ================================================================== [ 63.414761][ C0] BUG: KASAN: null-ptr-deref in flush_tlb_func+0x43/0x550 [ 63.421702][ C0] Read of size 8 at addr 0000000000000329 by task rcu_preempt/14 [ 63.429255][ C0] [ 63.431427][ C0] CPU: 0 PID: 14 Comm: rcu_preempt Not tainted 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 63.441056][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 63.450962][ C0] Call Trace: [ 63.454080][ C0] [ 63.456783][ C0] dump_stack_lvl+0x151/0x1b7 [ 63.461277][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 63.466747][ C0] ? get_stack_info+0x3b/0x100 [ 63.471344][ C0] kasan_report+0x16f/0x1c0 [ 63.475687][ C0] ? flush_tlb_func+0x43/0x550 [ 63.480286][ C0] ? flush_tlb_func+0x43/0x550 [ 63.484888][ C0] kasan_check_range+0x293/0x2a0 [ 63.489775][ C0] __kasan_check_read+0x11/0x20 [ 63.494461][ C0] flush_tlb_func+0x43/0x550 [ 63.498884][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 63.503920][ C0] ? sched_clock+0x9/0x10 [ 63.508086][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 63.512778][ C0] flush_smp_call_function_queue+0x222/0x6a0 [ 63.518585][ C0] ? debug_smp_processor_id+0x17/0x20 [ 63.523794][ C0] ? native_flush_tlb_multi+0x210/0x210 [ 63.529179][ C0] generic_smp_call_function_single_interrupt+0x13/0x20 [ 63.535948][ C0] __sysvec_call_function_single+0x63/0x1b0 [ 63.541689][ C0] sysvec_call_function_single+0x41/0xb0 [ 63.547144][ C0] asm_sysvec_call_function_single+0x1b/0x20 [ 63.552969][ C0] RIP: 0010:unwind_next_frame+0x0/0x700 [ 63.558337][ C0] Code: 83 c0 08 5b 41 5e 41 5f 5d c3 44 89 f1 80 e1 07 80 c1 03 38 c1 7c 99 4c 89 f7 e8 8b 9d 7d 00 eb 8f 66 0f 1f 84 00 00 00 00 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 50 49 89 fe 48 ba [ 63.577781][ C0] RSP: 0018:ffffc90000007758 EFLAGS: 00000202 [ 63.583682][ C0] RAX: 0000000000000001 RBX: ffffc90000007760 RCX: 0000000000007701 [ 63.591493][ C0] RDX: dffffc0000000000 RSI: ffffffff8500026d RDI: ffffc90000007760 [ 63.599305][ C0] RBP: ffffc900000077f0 R08: ffffc90000007848 R09: 000000000000000a [ 63.607118][ C0] R10: ffffc90000007850 R11: dffffc0000000001 R12: ffff8881002693c0 [ 63.614926][ C0] R13: ffffffff815f5280 R14: ffffc90000007840 R15: 0000000000000000 [ 63.622745][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 63.627620][ C0] ? __do_softirq+0x26d/0x5bf [ 63.632119][ C0] ? arch_stack_walk+0x10d/0x140 [ 63.636889][ C0] ? __do_softirq+0x26d/0x5bf [ 63.641403][ C0] stack_trace_save+0x113/0x1c0 [ 63.646090][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 63.651032][ C0] ? kfree+0xc8/0x220 [ 63.654851][ C0] ? kmem_cache_free+0x116/0x2e0 [ 63.659630][ C0] ? kmem_cache_free+0x116/0x2e0 [ 63.664401][ C0] ? kmem_cache_free+0x116/0x2e0 [ 63.669173][ C0] kasan_set_track+0x4b/0x70 [ 63.673599][ C0] ? kasan_set_track+0x4b/0x70 [ 63.678198][ C0] ? kasan_set_free_info+0x23/0x40 [ 63.683163][ C0] ? ____kasan_slab_free+0x126/0x160 [ 63.688268][ C0] ? __kasan_slab_free+0x11/0x20 [ 63.693044][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 63.698422][ C0] ? kmem_cache_free+0x116/0x2e0 [ 63.703193][ C0] ? file_free_rcu+0x9f/0xb0 [ 63.707622][ C0] ? rcu_do_batch+0x57a/0xc10 [ 63.712134][ C0] ? rcu_core+0x517/0x1020 [ 63.716397][ C0] ? rcu_core_si+0x9/0x10 [ 63.720554][ C0] ? __do_softirq+0x26d/0x5bf [ 63.725077][ C0] ? ____kasan_slab_free+0x131/0x160 [ 63.730187][ C0] kasan_set_free_info+0x23/0x40 [ 63.734959][ C0] ____kasan_slab_free+0x126/0x160 [ 63.739908][ C0] __kasan_slab_free+0x11/0x20 [ 63.744508][ C0] slab_free_freelist_hook+0xbd/0x190 [ 63.749716][ C0] ? file_free_rcu+0x9f/0xb0 [ 63.754145][ C0] kmem_cache_free+0x116/0x2e0 [ 63.758741][ C0] file_free_rcu+0x9f/0xb0 [ 63.762992][ C0] ? __fput+0x910/0x910 [ 63.767169][ C0] rcu_do_batch+0x57a/0xc10 [ 63.771504][ C0] ? local_bh_enable+0x20/0x20 [ 63.776102][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 63.781399][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 63.786083][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 63.791725][ C0] ? rcu_report_qs_rnp+0x2bf/0x390 [ 63.796673][ C0] rcu_core+0x517/0x1020 [ 63.800754][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 63.805784][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 63.810469][ C0] ? irqtime_account_irq+0x79/0x3c0 [ 63.815503][ C0] rcu_core_si+0x9/0x10 [ 63.819497][ C0] __do_softirq+0x26d/0x5bf [ 63.823849][ C0] do_softirq+0xf6/0x150 [ 63.827918][ C0] [ 63.830697][ C0] [ 63.833472][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 63.838512][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 63.843363][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 63.848399][ C0] ? update_load_avg+0x43a/0x1150 [ 63.853259][ C0] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 63.859423][ C0] __local_bh_enable_ip+0x75/0x80 [ 63.864286][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 63.869063][ C0] sock_map_delete_elem+0xcb/0x130 [ 63.874005][ C0] bpf_prog_029d1888f6cd2729+0x3f/0x554 [ 63.879383][ C0] bpf_trace_run2+0xec/0x210 [ 63.883810][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 63.888606][ C0] ? __perf_event_task_sched_out+0x831/0x980 [ 63.894500][ C0] ? sched_clock+0x9/0x10 [ 63.898667][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 63.903703][ C0] __bpf_trace_tlb_flush+0x23/0x30 [ 63.908649][ C0] switch_mm_irqs_off+0x616/0x9b0 [ 63.913509][ C0] __schedule+0xb2b/0x1590 [ 63.917762][ C0] ? __sched_text_start+0x8/0x8 [ 63.922449][ C0] ? __kasan_check_write+0x14/0x20 [ 63.927396][ C0] ? __kasan_check_write+0x14/0x20 [ 63.932343][ C0] schedule+0x11f/0x1e0 [ 63.936334][ C0] schedule_timeout+0x18c/0x370 [ 63.941030][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 63.946057][ C0] ? console_conditional_schedule+0x30/0x30 [ 63.951782][ C0] ? update_process_times+0x200/0x200 [ 63.956990][ C0] ? prepare_to_swait_event+0x308/0x320 [ 63.962373][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 63.966980][ C0] ? debug_smp_processor_id+0x17/0x20 [ 63.972179][ C0] ? __note_gp_changes+0x4ab/0x920 [ 63.977125][ C0] ? rcu_gp_init+0xc30/0xc30 [ 63.981552][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 63.986602][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 63.991017][ C0] rcu_gp_kthread+0xa4/0x350 [ 63.995440][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 64.000125][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 64.004643][ C0] ? __kasan_check_read+0x11/0x20 [ 64.009499][ C0] ? __kthread_parkme+0xb2/0x200 [ 64.014274][ C0] kthread+0x421/0x510 [ 64.018178][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 64.022691][ C0] ? kthread_blkcg+0xd0/0xd0 [ 64.027121][ C0] ret_from_fork+0x1f/0x30 [ 64.031375][ C0] [ 64.034236][ C0] ================================================================== [ 64.042133][ C0] Disabling lock debugging due to kernel taint [ 64.048168][ C0] general protection fault, probably for non-canonical address 0xdffffc0000000065: 0000 [#1] PREEMPT SMP KASAN [ 64.059839][ C0] KASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f] [ 64.068087][ C0] CPU: 0 PID: 14 Comm: rcu_preempt Tainted: G B 5.15.149-syzkaller-00165-g85445b5a2107 #0 [ 64.079106][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 64.089006][ C0] RIP: 0010:flush_tlb_func+0x4a/0x550 [ 64.094207][ C0] Code: 8b 35 2a 96 cd 7e 65 66 44 8b 25 31 96 cd 7e 49 8d 9e 28 03 00 00 48 89 df be 08 00 00 00 e8 fd 97 7c 00 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 07 96 7c 00 4c 8b 3b 66 44 89 65 [ 64.113661][ C0] RSP: 0018:ffffc90000007580 EFLAGS: 00010006 [ 64.119638][ C0] RAX: 0000000000000065 RBX: 0000000000000329 RCX: ffff8881002693c0 [ 64.127451][ C0] RDX: 0000000080010104 RSI: 0000000000000096 RDI: 00000000ffffffff [ 64.135261][ C0] RBP: ffffc900000075f0 R08: ffffffff8141701b R09: 0000000000000003 [ 64.143080][ C0] R10: fffffbfff0e5284c R11: dffffc0000000001 R12: 1ffff1103ee00000 [ 64.150884][ C0] R13: ffff8881f7137180 R14: 0000000000000001 R15: dffffc0000000000 [ 64.158696][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 64.167463][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 64.173885][ C0] CR2: 0000000020003ff6 CR3: 000000013a022000 CR4: 00000000003506b0 [ 64.181699][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 64.189507][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 64.197317][ C0] Call Trace: [ 64.200444][ C0] [ 64.203135][ C0] ? __die_body+0x62/0xb0 [ 64.207301][ C0] ? die_addr+0x9f/0xd0 [ 64.211294][ C0] ? exc_general_protection+0x311/0x4b0 [ 64.216680][ C0] ? asm_exc_general_protection+0x27/0x30 [ 64.222231][ C0] ? check_panic_on_warn+0x5b/0xb0 [ 64.227175][ C0] ? flush_tlb_func+0x4a/0x550 [ 64.231775][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 64.236809][ C0] ? sched_clock+0x9/0x10 [ 64.240975][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 64.245662][ C0] flush_smp_call_function_queue+0x222/0x6a0 [ 64.251477][ C0] ? debug_smp_processor_id+0x17/0x20 [ 64.256684][ C0] ? native_flush_tlb_multi+0x210/0x210 [ 64.262071][ C0] generic_smp_call_function_single_interrupt+0x13/0x20 [ 64.268854][ C0] __sysvec_call_function_single+0x63/0x1b0 [ 64.274565][ C0] sysvec_call_function_single+0x41/0xb0 [ 64.280030][ C0] asm_sysvec_call_function_single+0x1b/0x20 [ 64.285871][ C0] RIP: 0010:unwind_next_frame+0x0/0x700 [ 64.291226][ C0] Code: 83 c0 08 5b 41 5e 41 5f 5d c3 44 89 f1 80 e1 07 80 c1 03 38 c1 7c 99 4c 89 f7 e8 8b 9d 7d 00 eb 8f 66 0f 1f 84 00 00 00 00 00 <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 50 49 89 fe 48 ba [ 64.310668][ C0] RSP: 0018:ffffc90000007758 EFLAGS: 00000202 [ 64.316572][ C0] RAX: 0000000000000001 RBX: ffffc90000007760 RCX: 0000000000007701 [ 64.324468][ C0] RDX: dffffc0000000000 RSI: ffffffff8500026d RDI: ffffc90000007760 [ 64.332280][ C0] RBP: ffffc900000077f0 R08: ffffc90000007848 R09: 000000000000000a [ 64.340091][ C0] R10: ffffc90000007850 R11: dffffc0000000001 R12: ffff8881002693c0 [ 64.348017][ C0] R13: ffffffff815f5280 R14: ffffc90000007840 R15: 0000000000000000 [ 64.355825][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 64.360687][ C0] ? __do_softirq+0x26d/0x5bf [ 64.365201][ C0] ? arch_stack_walk+0x10d/0x140 [ 64.369973][ C0] ? __do_softirq+0x26d/0x5bf [ 64.374488][ C0] stack_trace_save+0x113/0x1c0 [ 64.379172][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 64.384118][ C0] ? kfree+0xc8/0x220 [ 64.387938][ C0] ? kmem_cache_free+0x116/0x2e0 [ 64.392712][ C0] ? kmem_cache_free+0x116/0x2e0 [ 64.397484][ C0] ? kmem_cache_free+0x116/0x2e0 [ 64.402259][ C0] kasan_set_track+0x4b/0x70 [ 64.406685][ C0] ? kasan_set_track+0x4b/0x70 [ 64.411283][ C0] ? kasan_set_free_info+0x23/0x40 [ 64.416233][ C0] ? ____kasan_slab_free+0x126/0x160 [ 64.421352][ C0] ? __kasan_slab_free+0x11/0x20 [ 64.426124][ C0] ? slab_free_freelist_hook+0xbd/0x190 [ 64.431526][ C0] ? kmem_cache_free+0x116/0x2e0 [ 64.436299][ C0] ? file_free_rcu+0x9f/0xb0 [ 64.440708][ C0] ? rcu_do_batch+0x57a/0xc10 [ 64.445221][ C0] ? rcu_core+0x517/0x1020 [ 64.449472][ C0] ? rcu_core_si+0x9/0x10 [ 64.453641][ C0] ? __do_softirq+0x26d/0x5bf [ 64.458159][ C0] ? ____kasan_slab_free+0x131/0x160 [ 64.463274][ C0] kasan_set_free_info+0x23/0x40 [ 64.468046][ C0] ____kasan_slab_free+0x126/0x160 [ 64.472996][ C0] __kasan_slab_free+0x11/0x20 [ 64.477607][ C0] slab_free_freelist_hook+0xbd/0x190 [ 64.482803][ C0] ? file_free_rcu+0x9f/0xb0 [ 64.487229][ C0] kmem_cache_free+0x116/0x2e0 [ 64.491831][ C0] file_free_rcu+0x9f/0xb0 [ 64.496080][ C0] ? __fput+0x910/0x910 [ 64.500072][ C0] rcu_do_batch+0x57a/0xc10 [ 64.504417][ C0] ? local_bh_enable+0x20/0x20 [ 64.509011][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 64.514308][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 64.518992][ C0] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 64.524634][ C0] ? rcu_report_qs_rnp+0x2bf/0x390 [ 64.529584][ C0] rcu_core+0x517/0x1020 [ 64.533699][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 64.538696][ C0] ? sched_clock_cpu+0x18/0x3b0 [ 64.543384][ C0] ? irqtime_account_irq+0x79/0x3c0 [ 64.548417][ C0] rcu_core_si+0x9/0x10 [ 64.552410][ C0] __do_softirq+0x26d/0x5bf [ 64.556752][ C0] do_softirq+0xf6/0x150 [ 64.560827][ C0] [ 64.563605][ C0] [ 64.566381][ C0] ? __local_bh_enable_ip+0x80/0x80 [ 64.571434][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 64.576275][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 64.581310][ C0] ? update_load_avg+0x43a/0x1150 [ 64.586169][ C0] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 64.592336][ C0] __local_bh_enable_ip+0x75/0x80 [ 64.597194][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 64.601965][ C0] sock_map_delete_elem+0xcb/0x130 [ 64.606917][ C0] bpf_prog_029d1888f6cd2729+0x3f/0x554 [ 64.612295][ C0] bpf_trace_run2+0xec/0x210 [ 64.616722][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 64.621408][ C0] ? __perf_event_task_sched_out+0x831/0x980 [ 64.627226][ C0] ? sched_clock+0x9/0x10 [ 64.631388][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 64.636424][ C0] __bpf_trace_tlb_flush+0x23/0x30 [ 64.641373][ C0] switch_mm_irqs_off+0x616/0x9b0 [ 64.646234][ C0] __schedule+0xb2b/0x1590 [ 64.650509][ C0] ? __sched_text_start+0x8/0x8 [ 64.655181][ C0] ? __kasan_check_write+0x14/0x20 [ 64.660132][ C0] ? __kasan_check_write+0x14/0x20 [ 64.665067][ C0] schedule+0x11f/0x1e0 [ 64.669066][ C0] schedule_timeout+0x18c/0x370 [ 64.673866][ C0] ? __update_idle_core+0x2a0/0x2a0 [ 64.678928][ C0] ? console_conditional_schedule+0x30/0x30 [ 64.684628][ C0] ? update_process_times+0x200/0x200 [ 64.689834][ C0] ? prepare_to_swait_event+0x308/0x320 [ 64.695219][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 64.699817][ C0] ? debug_smp_processor_id+0x17/0x20 [ 64.705023][ C0] ? __note_gp_changes+0x4ab/0x920 [ 64.710082][ C0] ? rcu_gp_init+0xc30/0xc30 [ 64.714511][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 64.719536][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 64.723989][ C0] rcu_gp_kthread+0xa4/0x350 [ 64.728394][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 64.733092][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 64.737601][ C0] ? __kasan_check_read+0x11/0x20 [ 64.742452][ C0] ? __kthread_parkme+0xb2/0x200 [ 64.747226][ C0] kthread+0x421/0x510 [ 64.751131][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 64.755643][ C0] ? kthread_blkcg+0xd0/0xd0 [ 64.760070][ C0] ret_from_fork+0x1f/0x30 [ 64.764327][ C0] [ 64.767214][ C0] Modules linked in: [ 64.770942][ C0] ---[ end trace 783708d65d07cc2b ]--- [ 64.776220][ C0] RIP: 0010:flush_tlb_func+0x4a/0x550 [ 64.781421][ C0] Code: 8b 35 2a 96 cd 7e 65 66 44 8b 25 31 96 cd 7e 49 8d 9e 28 03 00 00 48 89 df be 08 00 00 00 e8 fd 97 7c 00 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 07 96 7c 00 4c 8b 3b 66 44 89 65 [ 64.800870][ C0] RSP: 0018:ffffc90000007580 EFLAGS: 00010006 [ 64.806766][ C0] RAX: 0000000000000065 RBX: 0000000000000329 RCX: ffff8881002693c0 [ 64.814578][ C0] RDX: 0000000080010104 RSI: 0000000000000096 RDI: 00000000ffffffff [ 64.822388][ C0] RBP: ffffc900000075f0 R08: ffffffff8141701b R09: 0000000000000003 [ 64.830198][ C0] R10: fffffbfff0e5284c R11: dffffc0000000001 R12: 1ffff1103ee00000 [ 64.838019][ C0] R13: ffff8881f7137180 R14: 0000000000000001 R15: dffffc0000000000 [ 64.845818][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 64.854784][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 64.861209][ C0] CR2: 0000000020003ff6 CR3: 000000013a022000 CR4: 00000000003506b0 [ 64.869014][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 64.876824][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 64.884662][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 66.024151][ C0] Shutting down cpus with NMI [ 66.028931][ C0] Kernel Offset: disabled [ 66.033059][ C0] Rebooting in 86400 seconds..