last executing test programs: 2.001680299s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000001008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000000c0)='timer_start\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='timer_start\x00', r3}, 0x10) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) (async) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) (async) write$cgroup_pid(r7, &(0x7f0000000340), 0x12) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) (async, rerun: 64) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x7}}]}, {0x0, [0x5f, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000000080)=""/51, 0x37, 0x33, 0x0, 0x102}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000030e, &(0x7f0000000200)=ANY=[@ANYRES16=0x0, @ANYRES32=r9, @ANYBLOB="00000000deff0000b7080000000000007b8af8ff00000000bfa20032fcb4952f0005000000070000b704000000000000850000005700000000000000003274000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x71, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc0000000}, 0x90) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 64) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) ioctl$SIOCSIFHWADDR(r10, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r12}, &(0x7f0000000000), &(0x7f0000000180)=r13}, 0x20) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r14}, 0x10) 1.903888524s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001000a73d36fcc910f8f1555a7f62a80000000000003fb69d51158348e54e96252f7c4a346a3e160000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.590994871s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001000a73d36fcc910f8f1555a7f62a80000000000003fb69d51158348e54e96252f7c4a346a3e160000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 1.192451781s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x2880, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)={@cgroup, r2, 0x6c, 0x1008, 0x0, @link_id}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000340)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 1.059026141s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000040)="7f2bb7bb545f5dea25282913923986e59abd26bfe930583f83853c1dea295592de49156063938d05280f8eba2a1b6690a967b8e1abc97e544d9db9", &(0x7f0000000380)=""/136}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018f200002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r10, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000480)=[0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000000540), 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000600), 0x8, 0xfa, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r11, r10, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x40000, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r7}, 0x10) socketpair(0x2, 0x3, 0x5, &(0x7f0000000000)) sendmsg$tipc(r5, &(0x7f0000000800)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x0) 1.046993663s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000800)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x0, {0x0, 0x2}}, 0x10, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057", @ANYRES64=r3, @ANYBLOB="004ef85b8637af2ea71db9a94a7b614c6699b63eeb78861941343376ac8b55ac6eee91b056e45aa0ebd53e5b833f52f8ae32fee9925bb5cd02ff5ebdf5e9375d58acaf68fc8fcc1097956a0624f2522614ec9c9a7c26c56a4a2af1928336be602c27ae90ebc7b36fba70b3b06245a8886917f04570ea0034d30b305d49c230f194a703886880b7e43cbb286d852ac926d74d170c87b905a8497a8da1446f6e3bdd0d1a5a5f219e50b01a9921e498c68349e0d5bbb0d5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r7}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r12}, 0x10) 1.032133085s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, 0x20000000}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair(0x0, 0x0, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000dc0)=ANY=[@ANYBLOB="183a000003000000000000000000000039a640000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018190000", @ANYRES32=r2, @ANYBLOB="000000000000000018200000", @ANYRES32=r2, @ANYBLOB="19000000ffffff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4d0600000000000000860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e00000000000005784c3f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b27663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3800000000000000009c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb89283a16ff10feea20bdac0000000000000000ca06f256c85591019465f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c455cbeacbed2d418ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a3dc4e97f7fda840bcdd3afaa0d7c3c229de4f0f4ac"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 1.021179867s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.014191788s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000001801000020646c2500000000002020177b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000120000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7910031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) 977.572933ms ago: executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) close(0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 955.165487ms ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7, 0x10001}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x200004405) write$cgroup_int(r1, &(0x7f0000000000)=0x4c, 0xfffffd26) 953.261417ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001000a73d36fcc910f8f1555a7f62a80000000000003fb69d51158348e54e96252f7c4a346a3e160000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 951.285637ms ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) unlink(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup=r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x800}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'dvmrp1\x00', @local}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000040)='ext4_da_write_pages_extent\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0xf, &(0x7f0000000940)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff9}, @generic={0x1f, 0xb, 0x2, 0x3, 0xffffffff}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffc}}, @call={0x85, 0x0, 0x0, 0x4a}, @jmp={0x5, 0x1, 0x0, 0x8, 0x9, 0x1, 0xfffffffffffffff0}], &(0x7f0000000300)='syzkaller\x00', 0x6, 0xe8, &(0x7f0000000580)=""/232, 0x100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0x5, 0x69c, 0x7fff}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000004c0)=[r4, 0xffffffffffffffff, r5, r5, r2, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000780)=[{0x3, 0x2, 0x18, 0x4}, {0x4, 0x2, 0x4, 0x7}, {0x2, 0x5, 0x6, 0x5}, {0x8, 0x5, 0x8, 0x7}, {0x1, 0x5, 0x5, 0xb}, {0x5, 0x4, 0x1, 0x3}], 0x10, 0x3}, 0x90) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) (async) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'geneve0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) (async) sendmsg$unix(r10, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) close(r10) (async) sendmsg$unix(r9, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='mm_page_alloc\x00', r3}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) 934.24954ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f0000000040)=0x800) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) (rerun: 64) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000a40)=""/166}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x18, r0}, 0x18) (async, rerun: 64) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (rerun: 64) write$cgroup_subtree(r6, &(0x7f0000000a40)=ANY=[], 0x9) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000007c0)={0x3e2, 0x0}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) (async, rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='memory.current\x00', 0x0, 0x0) (async, rerun: 64) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0xffffffffffffffff, 0x5207c557, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x1a, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@jmp={0x5, 0x0, 0x3, 0x3, 0x2, 0xfffffffffffffffc}, @alu={0x7, 0x0, 0xa, 0xb, 0x7, 0xffffffffffffffc0}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0xecb, 0x6f, &(0x7f0000000740)=""/111, 0x40f00, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x5, 0x1f}, 0x10, r7, 0xffffffffffffffff, 0x5, &(0x7f0000000880)=[0x1, r8, 0x1, r9, 0x1, r10], &(0x7f00000008c0)=[{0x0, 0x4, 0x2, 0x1}, {0x0, 0x3, 0x6, 0x8}, {0x5, 0x4, 0x2, 0x2}, {0x2, 0x4, 0x2, 0x8}, {0x3, 0x2, 0x2, 0x3}], 0x10, 0x3}, 0x90) 894.349885ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001000a73d36fcc910f8f1555a7f62a80000000000003fb69d51158348e54e96252f7c4a346a3e160000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 765.120355ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xffd, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001000a73d36fcc910f8f1555a7f62a80000000000003fb69d51158348e54e96252f7c4a346a3e160000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x8004745a, 0x2000000c) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 601.95735ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.kill\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[], 0xfdef) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x2000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b79da42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4f000093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e63fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5649209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9eb0641fd6d5e80979a3d985089e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469f242119ad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6d"], &(0x7f0000000100)='GPL\x00'}, 0x41) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000003c0)='ext4_remove_blocks\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r1}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r10, 0x0, 0x0}, 0x61) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000070000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r11}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffc1c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) 466.06369ms ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=';', 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000e80)='c', 0x1}], 0x1}, 0x2000c085) sendmsg$inet(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001000)=[{0x0}], 0x1}, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ff00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0x88) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 410.293109ms ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000b8e9850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r5}, 0x10) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r4}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0185879, &(0x7f0000000040)) (async) write$cgroup_subtree(r0, 0x0, 0x280) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r10}, 0x10) (async) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)=@generic={&(0x7f00000008c0)='./file0\x00', 0x0, 0x18}, 0x18) (async) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r12, &(0x7f0000000200), 0x43400) (async) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x3, '\x00', 0x0, r8, 0x0, 0x2, 0x1}, 0x48) (async) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x11, 0x441, 0x1, 0x0, 0x20, r8, 0x401, '\x00', 0x0, r4, 0x4}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_tracing={0x1a, 0xb, &(0x7f00000002c0)=@raw=[@map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000080)='GPL\x00', 0x2, 0xf6, &(0x7f00000004c0)=""/246, 0x41100, 0x3, '\x00', 0x0, 0x1a, r8, 0x8, &(0x7f0000000840)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x3, 0x8, 0x4}, 0x10, 0x112be, r10, 0x0, &(0x7f0000000ac0)=[0xffffffffffffffff, r6, r11, r12, r6, r13, r14, r1]}, 0x90) 300.141665ms ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.1GB.usage_in_bytes\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='jbd2_write_superblock\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412) 112.584963ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x7, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200)=0xfeffffff, 0x43400) 91.535347ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 75.544189ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000200de030000000000000001040000000e0000f1850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000000)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r7}, 0x10) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000000)=0x80000) (async, rerun: 32) close(r3) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 69.66524ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x7, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, 0x20000000}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000000085000000"], 0x0, 0x0, 0xffffffffffffff97, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f00000010c0)={0x0, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000700)='ext4_free_blocks\x00', r6}, 0x45) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) close(r4) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x5) socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000640)=ANY=[@ANYBLOB="9febd30c013881675479acfdba163201001800090000000000140000001400000002000000000000000100000d00"], &(0x7f0000000680)=""/182, 0x2e, 0xb6, 0x1}, 0x20) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='ext4_evict_inode\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000d90a00000000000073013d00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) 60.299421ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000001801000020646c2500000000002020177b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000120000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7910031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3a200007"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) 37.367375ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000001c00)={&(0x7f0000000840)=@name={0x1e, 0x2, 0x1, {{0x43, 0x4}, 0x2}}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000001b00)="24a09d9aced7ea96c2984183606d69fa2c61f0ca7c5b5490e4c742d7851741905a401df51500a37cc3e906dcca87e2040bb8586484e09ce4e0425b121b9e5f7f4e03e37c2f5e0a4efd554963d00b7fd52036c51ba4bec2589e153403c2adce73837e23f7b4cdc88ace6a07d11028a837bfda1331821bebd85beafb6b1220be810751701c524f5395a68b4bd9958f", 0x8e}], 0x2, &(0x7f0000001bc0)="9645be474d08", 0x6, 0x4004}, 0x4000010) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a0ac4ff00008e006910ba000000000095"], &(0x7f0000000480)='GPL\x00'}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='block_split\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x4e, &(0x7f00000004c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000540), &(0x7f00000005c0), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_ext={0x1c, 0x0, &(0x7f0000000800), 0x0, 0x2, 0x5c, &(0x7f0000000880)=""/92, 0x41100, 0x5, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x3, 0xb, 0x4df021f3, 0xe167}, 0x10, 0x2436c, r4, 0x1, &(0x7f0000000980)=[r2], &(0x7f00000009c0)=[{0x4, 0x4, 0x10, 0xc}], 0x10, 0x8}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x8, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) close(0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_da_update_reserve_space\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) (async) write$cgroup_pid(r10, &(0x7f0000000980), 0x12) 36.192585ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000001180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB='-', @ANYRESDEC], 0x27) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1, 0x1, 0x8e, 0xe7c9}, 0x48) 25.390697ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000003e7100000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="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"/289], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f00000001c0)='ns/time\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) 4.57821ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000023b7007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x7, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000540)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.250' (ED25519) to the list of known hosts. 2024/06/10 10:10:46 fuzzer started 2024/06/10 10:10:46 dialing manager at 10.128.0.163:30010 [ 20.772785][ T30] audit: type=1400 audit(1718014246.712:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.794335][ T30] audit: type=1400 audit(1718014246.742:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.823503][ T30] audit: type=1400 audit(1718014246.762:68): avc: denied { integrity } for pid=293 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.851022][ T293] cgroup: Unknown subsys name 'net' [ 20.854412][ T30] audit: type=1400 audit(1718014246.762:69): avc: denied { integrity } for pid=292 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.878382][ T293] cgroup: Unknown subsys name 'devices' [ 20.878433][ T30] audit: type=1400 audit(1718014246.762:70): avc: denied { mounton } for pid=293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.906433][ T30] audit: type=1400 audit(1718014246.792:71): avc: denied { mount } for pid=293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.911624][ T300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.928484][ T30] audit: type=1400 audit(1718014246.792:72): avc: denied { mounton } for pid=297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.961477][ T30] audit: type=1400 audit(1718014246.792:73): avc: denied { mount } for pid=297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.984688][ T30] audit: type=1400 audit(1718014246.792:74): avc: denied { setattr } for pid=298 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.007810][ T30] audit: type=1400 audit(1718014246.792:75): avc: denied { unmount } for pid=293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.028938][ T299] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.097831][ T293] cgroup: Unknown subsys name 'hugetlb' [ 21.103265][ T293] cgroup: Unknown subsys name 'rlimit' 2024/06/10 10:10:47 starting 5 executor processes [ 22.002124][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.009104][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.016474][ T309] device bridge_slave_0 entered promiscuous mode [ 22.023214][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.030105][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.037349][ T309] device bridge_slave_1 entered promiscuous mode [ 22.134787][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.141710][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.148846][ T311] device bridge_slave_0 entered promiscuous mode [ 22.156693][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.163526][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.170777][ T312] device bridge_slave_0 entered promiscuous mode [ 22.180708][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.187581][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.194705][ T311] device bridge_slave_1 entered promiscuous mode [ 22.205723][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.212624][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.219791][ T312] device bridge_slave_1 entered promiscuous mode [ 22.245224][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.252105][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.259298][ T313] device bridge_slave_0 entered promiscuous mode [ 22.267850][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.274681][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.281865][ T310] device bridge_slave_0 entered promiscuous mode [ 22.288312][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.295136][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.302444][ T313] device bridge_slave_1 entered promiscuous mode [ 22.312210][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.319069][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.326122][ T310] device bridge_slave_1 entered promiscuous mode [ 22.397781][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.404614][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.411782][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.418619][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.518283][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.526609][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.536106][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.543376][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.574852][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.582720][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.602450][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.612834][ T309] device veth0_vlan entered promiscuous mode [ 22.625091][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.632861][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.640077][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.665309][ T309] device veth1_macvtap entered promiscuous mode [ 22.672014][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.680196][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.688179][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.696040][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.702950][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.710138][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.717997][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.724812][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.732237][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.752412][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.760506][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.768907][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.777035][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.784655][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.792543][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.799382][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.806571][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.814251][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.822230][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.829062][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.836397][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.856208][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.864951][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.873626][ T330] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.880481][ T330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.889107][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.910379][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.920662][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.929632][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.936483][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.943833][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.951785][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.959661][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.967836][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.990245][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.998572][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.006706][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.013526][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.020794][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.028740][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.035559][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.042850][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.052038][ T312] device veth0_vlan entered promiscuous mode [ 23.058889][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.066438][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.074097][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.082275][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.089585][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.102905][ T311] device veth0_vlan entered promiscuous mode [ 23.127067][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.135387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.144965][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.152766][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.161002][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.169401][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.177668][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.185558][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.193501][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.201922][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.215280][ T311] device veth1_macvtap entered promiscuous mode [ 23.227755][ T310] device veth0_vlan entered promiscuous mode [ 23.237701][ T313] device veth0_vlan entered promiscuous mode [ 23.247347][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.254596][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.262198][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.270722][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.278802][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.286601][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.287167][ C0] hrtimer: interrupt took 27269 ns [ 23.294528][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.307387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.315151][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.326567][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.334230][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.343753][ T312] device veth1_macvtap entered promiscuous mode [ 23.365890][ T310] device veth1_macvtap entered promiscuous mode [ 23.375108][ T313] device veth1_macvtap entered promiscuous mode [ 23.381830][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.389442][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.397950][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.405196][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.412571][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.422457][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.430606][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.438875][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.447052][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.455206][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.463307][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.471372][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.478940][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.487012][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.494993][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.527622][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.535631][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.544578][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.552697][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.560785][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.568801][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.576838][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.584752][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.593110][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.601309][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.609583][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.617773][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.692311][ T356] device veth1_macvtap left promiscuous mode [ 23.702260][ T357] device veth1_macvtap entered promiscuous mode [ 23.708513][ T357] device macsec0 entered promiscuous mode [ 23.757710][ T365] syz-executor.0[365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.757770][ T365] syz-executor.0[365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.786606][ T365] syz-executor.0[365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 23.798769][ T365] syz-executor.0[365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.097823][ T387] syz-executor.1[387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.159337][ T387] syz-executor.1[387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.389234][ T421] device syzkaller0 entered promiscuous mode [ 25.033215][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.053014][ T476] syz-executor.4[476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.053080][ T476] syz-executor.4[476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.065621][ T476] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 8192 (only 8 groups) [ 25.272844][ T496] syz-executor.3[496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.272905][ T496] syz-executor.3[496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.149440][ T543] device syzkaller0 entered promiscuous mode [ 26.170299][ T541] bridge0: port 3(ip6gretap0) entered blocking state [ 26.178091][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 26.178104][ T30] audit: type=1400 audit(1718014252.122:114): avc: denied { create } for pid=557 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.203650][ T541] bridge0: port 3(ip6gretap0) entered disabled state [ 26.204166][ T541] device ip6gretap0 entered promiscuous mode [ 26.216794][ T541] bridge0: port 3(ip6gretap0) entered blocking state [ 26.223298][ T541] bridge0: port 3(ip6gretap0) entered forwarding state [ 26.351501][ T30] audit: type=1400 audit(1718014252.292:115): avc: denied { create } for pid=566 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 27.651122][ T637] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 27.802797][ T637] device sit0 entered promiscuous mode [ 28.470000][ T684] device macsec0 entered promiscuous mode [ 29.131319][ T30] audit: type=1400 audit(1718014255.072:116): avc: denied { create } for pid=721 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 29.204396][ T30] audit: type=1400 audit(1718014255.142:117): avc: denied { create } for pid=727 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 29.844785][ T781] device pim6reg1 entered promiscuous mode [ 30.092441][ T30] audit: type=1400 audit(1718014256.032:118): avc: denied { cpu } for pid=812 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.537666][ T30] audit: type=1400 audit(1718014256.482:119): avc: denied { create } for pid=839 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 32.181537][ T931] device veth0_vlan left promiscuous mode [ 32.203300][ T931] device veth0_vlan entered promiscuous mode [ 32.610252][ T966] bpf_get_probe_write_proto: 4 callbacks suppressed [ 32.610268][ T966] syz-executor.2[966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.687691][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.505231][ T996] syz-executor.4[996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.636283][ T996] syz-executor.4[996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.160376][ T1032] Â: renamed from pim6reg1 [ 34.289696][ T1045] device veth1_macvtap left promiscuous mode [ 34.301515][ T1045] device veth1_macvtap entered promiscuous mode [ 34.307690][ T1045] device macsec0 entered promiscuous mode [ 34.363749][ T1050] device syzkaller0 entered promiscuous mode [ 34.535308][ T1077] syz-executor.3[1077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.535365][ T1077] syz-executor.3[1077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.547844][ T1077] syz-executor.3[1077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.563439][ T1077] syz-executor.3[1077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.575116][ T1077] syz-executor.3[1077] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.694199][ T1081] device syzkaller0 entered promiscuous mode [ 34.781745][ T30] audit: type=1400 audit(1718014260.722:120): avc: denied { relabelfrom } for pid=1088 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.804349][ T30] audit: type=1400 audit(1718014260.752:121): avc: denied { relabelto } for pid=1088 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.936200][ T1100] device sit0 entered promiscuous mode [ 34.943475][ T30] audit: type=1400 audit(1718014260.882:122): avc: denied { create } for pid=1098 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 36.141992][ T30] audit: type=1400 audit(1718014262.082:123): avc: denied { write } for pid=1176 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.179835][ T30] audit: type=1400 audit(1718014262.122:124): avc: denied { ioctl } for pid=1197 comm="syz-executor.0" path="socket:[15973]" dev="sockfs" ino=15973 ioctlcmd=0x2404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.744412][ T1223] device wg2 entered promiscuous mode [ 36.792213][ T1234] geneve1: tun_chr_ioctl cmd 19271 [ 36.942246][ T1249] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 37.742413][ T1271] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 38.044492][ T1277] device pim6reg1 entered promiscuous mode [ 38.455451][ T1302] device syzkaller0 entered promiscuous mode [ 40.378707][ T1404] syz-executor.4[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.378766][ T1404] syz-executor.4[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.118216][ T1468] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 41.319422][ T1476] device veth1_macvtap left promiscuous mode [ 41.328084][ T1476] device veth1_macvtap entered promiscuous mode [ 41.335319][ T1476] device macsec0 entered promiscuous mode [ 42.638522][ T1542] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 43.062450][ T30] audit: type=1400 audit(1718014269.002:125): avc: denied { ioctl } for pid=1556 comm="syz-executor.0" path="uts:[4026532539]" dev="nsfs" ino=4026532539 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 43.691388][ T1583] device veth1_macvtap left promiscuous mode [ 43.730083][ T1583] device veth1_macvtap entered promiscuous mode [ 43.794122][ T1583] device macsec0 entered promiscuous mode [ 44.066779][ T1600] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 44.226502][ T1618] device veth1_macvtap left promiscuous mode [ 44.238496][ T1618] device macsec0 left promiscuous mode [ 44.280852][ T1618] syz-executor.0 (1618) used greatest stack depth: 21216 bytes left [ 44.437367][ T1645] device syzkaller0 entered promiscuous mode [ 46.909983][ T1846] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 47.752521][ T1884] ªªªªªª: renamed from vlan0 [ 47.890766][ T1892] syz-executor.2[1892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.890821][ T1892] syz-executor.2[1892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.072023][ T1905] syz-executor.0[1905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.213785][ T1905] syz-executor.0[1905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.679409][ T1927] device wg2 entered promiscuous mode [ 50.853084][ T30] audit: type=1400 audit(1718014276.792:126): avc: denied { create } for pid=2040 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 51.485533][ T30] audit: type=1400 audit(1718014277.422:127): avc: denied { create } for pid=2070 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 51.516527][ T30] audit: type=1400 audit(1718014277.462:128): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 51.571479][ T2091] syz-executor.4[2091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.571571][ T2091] syz-executor.4[2091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.584724][ T2091] syz-executor.4[2091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.622021][ T2091] syz-executor.4[2091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.778931][ T2102] device veth1_macvtap left promiscuous mode [ 51.797530][ T2102] device macsec0 left promiscuous mode [ 51.807145][ T2102] device veth1_macvtap entered promiscuous mode [ 51.813287][ T2102] device macsec0 entered promiscuous mode [ 51.833683][ T1035] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 53.216041][ T2188] syz-executor.2[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.216107][ T2188] syz-executor.2[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.309511][ T2188] syz-executor.2[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.397579][ T2188] syz-executor.2[2188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.853546][ T30] audit: type=1400 audit(1718014279.792:129): avc: denied { create } for pid=2232 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 53.991420][ T2237] device pim6reg1 entered promiscuous mode [ 54.143463][ T2244] device sit0 left promiscuous mode [ 54.157856][ T2248] device sit0 entered promiscuous mode [ 55.448438][ T2300] syz-executor.2[2300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.448503][ T2300] syz-executor.2[2300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.472370][ T30] audit: type=1400 audit(1718014281.412:130): avc: denied { create } for pid=2298 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 56.053814][ T2333] device pim6reg1 entered promiscuous mode [ 56.555498][ T2377] syz-executor.3[2377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.555559][ T2377] syz-executor.3[2377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.618813][ T2383] syz-executor.4[2383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.636345][ T2383] syz-executor.4[2383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.026284][ T2456] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.193992][ T2505] device veth1_macvtap left promiscuous mode [ 58.210700][ T2505] device macsec0 left promiscuous mode [ 58.901188][ T309] syz-executor.4 (309) used greatest stack depth: 20384 bytes left [ 59.025941][ T2577] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.032990][ T2577] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.040362][ T2577] device bridge_slave_0 entered promiscuous mode [ 59.047534][ T2577] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.054465][ T2577] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.061933][ T2577] device bridge_slave_1 entered promiscuous mode [ 59.201886][ T2577] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.208779][ T2577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.215851][ T2577] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.222666][ T2577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.249033][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.275913][ T2419] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.290359][ T2419] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.306101][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.314508][ T2419] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.321387][ T2419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.329029][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.344963][ T2419] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.351859][ T2419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.368441][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 59.376637][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 59.393942][ T2406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 59.412128][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.420240][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.427990][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.436437][ T2577] device veth0_vlan entered promiscuous mode [ 59.656706][ T2605] device pim6reg1 entered promiscuous mode [ 59.892453][ T2418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 59.963783][ T2577] device veth1_macvtap entered promiscuous mode [ 60.089032][ T2452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 60.117680][ T2452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 60.213378][ T45] device bridge_slave_1 left promiscuous mode [ 60.224095][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.283707][ T45] device bridge_slave_0 left promiscuous mode [ 60.323030][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.334276][ T45] device veth1_macvtap left promiscuous mode [ 60.460175][ T2449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 60.468443][ T2449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 60.481237][ T2614] device veth0_vlan left promiscuous mode [ 60.509586][ T2614] device veth0_vlan entered promiscuous mode [ 60.575193][ T2452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.575806][ T30] audit: type=1400 audit(1718014286.512:131): avc: denied { mounton } for pid=2577 comm="syz-executor.4" path="/dev/binderfs" dev="devtmpfs" ino=362 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 60.608625][ T2452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.654496][ T2452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.287223][ T2690] device syzkaller0 entered promiscuous mode [ 61.520973][ T2703] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.213488][ T2752] bpf_get_probe_write_proto: 2 callbacks suppressed [ 62.213499][ T2752] syz-executor.4[2752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.222510][ T2752] syz-executor.4[2752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.391619][ T2775] device syzkaller0 entered promiscuous mode [ 62.547988][ T30] audit: type=1400 audit(1718014288.492:132): avc: denied { create } for pid=2790 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 63.348745][ T2882] syz-executor.0[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.348814][ T2882] syz-executor.0[2882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.745689][ T30] audit: type=1400 audit(1718014289.682:133): avc: denied { create } for pid=2901 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 64.154121][ T2941] syz-executor.0[2941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.154185][ T2941] syz-executor.0[2941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.902759][ T2995] syz-executor.3[2995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.939481][ T2995] syz-executor.3[2995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.004433][ T3005] device syzkaller0 entered promiscuous mode [ 65.023649][ T3006] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 65.246781][ T30] audit: type=1400 audit(1718014291.192:134): avc: denied { create } for pid=3021 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 65.316036][ T3032] device syzkaller0 entered promiscuous mode [ 65.460816][ T3035] device syzkaller0 entered promiscuous mode [ 65.695337][ T3066] device veth0_vlan left promiscuous mode [ 65.701512][ T3066] device veth0_vlan entered promiscuous mode [ 65.708318][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.719325][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 65.730274][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.739461][ T3070] syz-executor.1[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.739501][ T3070] syz-executor.1[3070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.859551][ T3086] device syzkaller0 entered promiscuous mode [ 66.068515][ T3103] device pim6reg1 entered promiscuous mode [ 66.219737][ T3115] device syzkaller0 entered promiscuous mode [ 66.408071][ T3131] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.415260][ T3131] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.424389][ T3131] device bridge_slave_0 entered promiscuous mode [ 66.433770][ T3131] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.458717][ T3131] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.472065][ T3141] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 66.496256][ T3131] device bridge_slave_1 entered promiscuous mode [ 66.641227][ T3140] device syzkaller0 entered promiscuous mode [ 66.907930][ T3131] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.914808][ T3131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.921927][ T3131] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.928780][ T3131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.989883][ T30] audit: type=1400 audit(1718014292.932:135): avc: denied { create } for pid=3203 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 67.031408][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.047148][ T2435] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.081651][ T2435] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.287031][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.295212][ T2428] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.302084][ T2428] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.309623][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.317800][ T2428] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.324662][ T2428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.332281][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.340243][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.371314][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.379560][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.390525][ T3131] device veth0_vlan entered promiscuous mode [ 67.400083][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.408199][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.430386][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.437930][ T2435] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.450945][ T3131] device veth1_macvtap entered promiscuous mode [ 67.465393][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.481006][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.489175][ T2428] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.500486][ T45] device bridge_slave_1 left promiscuous mode [ 67.509934][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.524256][ T45] device bridge_slave_0 left promiscuous mode [ 67.531266][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.546099][ T45] device veth1_macvtap left promiscuous mode [ 67.711112][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.719565][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.728069][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.736058][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.763525][ T3237] device syzkaller0 entered promiscuous mode [ 67.798494][ T3243] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 67.827392][ T3243] device pim6reg1 entered promiscuous mode [ 67.848561][ T3255] device pim6reg1 entered promiscuous mode [ 68.180669][ T3286] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 49 (only 8 groups) [ 68.792685][ T3305] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 68.888482][ T3309] bpf_get_probe_write_proto: 2 callbacks suppressed [ 68.888499][ T3309] syz-executor.2[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.902882][ T3310] syz-executor.2[3310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.920840][ T3309] syz-executor.2[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.933442][ T3310] syz-executor.2[3310] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.974012][ T3309] syz-executor.2[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.016646][ T3309] syz-executor.2[3309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.025032][ T3336] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 69.156896][ T3344] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 69.220256][ T3338] device syzkaller0 entered promiscuous mode [ 69.258212][ T3345] device bridge0 entered promiscuous mode [ 70.290042][ T3404] device syzkaller0 entered promiscuous mode [ 70.303324][ T3405] device bridge0 entered promiscuous mode [ 70.379302][ T3439] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 71.981745][ T3559] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 72.208493][ T3593] device wg2 left promiscuous mode [ 72.525178][ T3618] syz-executor.1[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.529104][ T3618] syz-executor.1[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.744874][ T30] audit: type=1400 audit(1718014298.682:136): avc: denied { create } for pid=3615 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 73.608750][ T3650] device syzkaller0 entered promiscuous mode [ 73.726262][ T3684] device vxcan1 entered promiscuous mode [ 75.976114][ C1] sched: RT throttling activated [ 79.150084][ T3811] syz-executor.2[3811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.150184][ T3811] syz-executor.2[3811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.415536][ T3862] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 79.722035][ T3878] device syzkaller0 entered promiscuous mode [ 80.410350][ T3937] device pim6reg1 entered promiscuous mode [ 80.722003][ T4002] syz-executor.2[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.722068][ T4002] syz-executor.2[4002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.959701][ T4024] syz-executor.1[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.979584][ T4024] syz-executor.1[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.407161][ T30] audit: type=1400 audit(1718014307.352:137): avc: denied { create } for pid=4054 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 81.444144][ T4058] syz-executor.2[4058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.444196][ T4058] syz-executor.2[4058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.585351][ T4083] syz-executor.1[4083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.597176][ T4083] syz-executor.1[4083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.617694][ T30] audit: type=1400 audit(1718014307.562:138): avc: denied { create } for pid=4078 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 81.649219][ T30] audit: type=1400 audit(1718014307.562:139): avc: denied { write } for pid=4078 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 81.773133][ T4104] device veth1_macvtap left promiscuous mode [ 81.781598][ T4104] device macsec0 left promiscuous mode [ 82.105717][ T30] audit: type=1400 audit(1718014308.042:140): avc: denied { setopt } for pid=4148 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 82.414337][ T4174] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.421365][ T4174] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.434181][ T4174] device bridge_slave_0 entered promiscuous mode [ 82.451023][ T349] bridge0: port 3(ip6gretap0) entered disabled state [ 82.464460][ T349] device ip6gretap0 left promiscuous mode [ 82.475555][ T349] bridge0: port 3(ip6gretap0) entered disabled state [ 82.492297][ T4174] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.500404][ T4174] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.515476][ T4174] device bridge_slave_1 entered promiscuous mode [ 82.689884][ T4174] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.696781][ T4174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.703848][ T4174] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.710653][ T4174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.851566][ T2419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.862546][ T2419] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.890736][ T2419] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.937596][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.963108][ T2420] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.969991][ T2420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.031816][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.120257][ T2420] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.127140][ T2420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.206853][ T2418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.214619][ T2418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.263197][ T4174] device veth0_vlan entered promiscuous mode [ 83.293461][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.301785][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.310151][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.318140][ T2420] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.329932][ T4174] device veth1_macvtap entered promiscuous mode [ 83.356056][ T4196] device syzkaller0 entered promiscuous mode [ 83.366726][ T2403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 83.375868][ T2403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.384169][ T2403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 83.428121][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 83.437900][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.451336][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.465898][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.482253][ T349] device bridge_slave_1 left promiscuous mode [ 83.499286][ T349] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.524101][ T349] device bridge_slave_0 left promiscuous mode [ 83.552936][ T349] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.932860][ T30] audit: type=1400 audit(1718014309.872:141): avc: denied { read } for pid=4249 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 84.060839][ T4261] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 84.258631][ T4284] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 85.184604][ T30] audit: type=1400 audit(1718014311.122:142): avc: denied { append } for pid=4342 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 85.621137][ T4359] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.671324][ T4359] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.740629][ T4359] device bridge_slave_0 entered promiscuous mode [ 85.797495][ T4359] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.809404][ T4359] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.820972][ T4359] device bridge_slave_1 entered promiscuous mode [ 86.168744][ T4359] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.175621][ T4359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.182718][ T4359] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.189596][ T4359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.344542][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.358570][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.397278][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.427585][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.435518][ T331] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.442372][ T331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.476858][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.484853][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.491714][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.516380][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 86.524219][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 86.555853][ T4359] device veth0_vlan entered promiscuous mode [ 86.564412][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 86.573188][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.580979][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.588715][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.603498][ T4359] device veth1_macvtap entered promiscuous mode [ 86.609875][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 86.617832][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 86.625688][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 86.646201][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.654569][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.663424][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.673516][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.689836][ T45] device bridge_slave_1 left promiscuous mode [ 86.698227][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.719780][ T45] device bridge_slave_0 left promiscuous mode [ 86.728294][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.747157][ T45] device veth0_vlan left promiscuous mode [ 87.100469][ T4462] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.110951][ T4462] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.119114][ T4462] device bridge_slave_0 entered promiscuous mode [ 87.128300][ T4462] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.135143][ T4462] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.142831][ T4462] device bridge_slave_1 entered promiscuous mode [ 87.306593][ T4462] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.313472][ T4462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.320571][ T4462] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.327351][ T4462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.419578][ T2409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.459245][ T2409] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.466904][ T2409] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.532000][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.540938][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.548897][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.555728][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.563189][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.571243][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.578093][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.585287][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.593142][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.605957][ T4462] device veth0_vlan entered promiscuous mode [ 87.628645][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.637592][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.659129][ T4462] device veth1_macvtap entered promiscuous mode [ 87.666787][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.674241][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.681790][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 87.689960][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 87.706852][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 87.727957][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 87.736379][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 87.744600][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 87.752962][ T329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 87.966188][ T4572] bpf_get_probe_write_proto: 18 callbacks suppressed [ 87.966207][ T4572] syz-executor.4[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.972938][ T4572] syz-executor.4[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.995529][ T4573] device syzkaller0 entered promiscuous mode [ 88.090052][ T30] audit: type=1400 audit(1718014314.032:143): avc: denied { create } for pid=4577 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 88.120038][ T4578] device syzkaller0 entered promiscuous mode [ 88.229673][ T45] device bridge_slave_1 left promiscuous mode [ 88.235799][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.250207][ T45] device bridge_slave_0 left promiscuous mode [ 88.260457][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.269614][ T45] device veth1_macvtap left promiscuous mode [ 88.275557][ T45] device veth0_vlan left promiscuous mode [ 88.751564][ T4625] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 89.311427][ T4664] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.319604][ T4664] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.326864][ T4664] device bridge_slave_0 entered promiscuous mode [ 89.337776][ T4664] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.344672][ T4664] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.351841][ T4664] device bridge_slave_1 entered promiscuous mode [ 89.415483][ T4664] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.422353][ T4664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.429549][ T4664] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.436333][ T4664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.460346][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.468552][ T331] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.475895][ T331] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.486812][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.494781][ T2424] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.501638][ T2424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.522535][ T4680] device syzkaller0 entered promiscuous mode [ 89.531126][ T2424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.539396][ T2424] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.546266][ T2424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.573755][ T4664] device veth0_vlan entered promiscuous mode [ 89.580792][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.590800][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.599609][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.607095][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.614431][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.622252][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.639129][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.651042][ T4664] device veth1_macvtap entered promiscuous mode [ 89.680388][ T2429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.699097][ T2436] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 89.710673][ T2436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.947917][ T8] device bridge_slave_1 left promiscuous mode [ 89.953925][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.965735][ T8] device bridge_slave_0 left promiscuous mode [ 89.972146][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.741458][ T4780] device macsec0 entered promiscuous mode [ 92.477090][ T4936] device veth0_vlan left promiscuous mode [ 92.484719][ T4936] device veth0_vlan entered promiscuous mode [ 92.500730][ T2436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.508933][ T2436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.524112][ T2436] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.771681][ T4968] syz-executor.1[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.771742][ T4968] syz-executor.1[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.974973][ T4985] device syzkaller0 entered promiscuous mode [ 93.517103][ T5028] syz-executor.1[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.517146][ T5028] syz-executor.1[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.529512][ T5028] syz-executor.1[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.541313][ T5028] syz-executor.1[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.099116][ T5061] syz-executor.3[5061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.111082][ T5061] syz-executor.3[5061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.656724][ T5096] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.675161][ T5096] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.605179][ T5128] syz-executor.1[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.605242][ T5128] syz-executor.1[5128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.605849][ T5129] syz-executor.1[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.692432][ T5129] syz-executor.1[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.333354][ T30] audit: type=1400 audit(1718014322.272:144): avc: denied { create } for pid=5161 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 96.451100][ T5169] device syzkaller0 entered promiscuous mode [ 97.062877][ T5211] device veth1_macvtap left promiscuous mode [ 99.897898][ T5339] bpf_get_probe_write_proto: 6 callbacks suppressed [ 99.897913][ T5339] syz-executor.2[5339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.904461][ T5339] syz-executor.2[5339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.386918][ T30] audit: type=1400 audit(1718014326.332:145): avc: denied { create } for pid=5364 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 101.523577][ T5434] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 29 (only 8 groups) [ 101.605020][ T5438] device pim6reg1 entered promiscuous mode [ 101.827052][ T5462] syz-executor.2[5462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.856626][ T5513] device pim6reg1 entered promiscuous mode [ 103.008260][ T5530] syz-executor.4[5530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.099195][ T5537] syz-executor.2[5537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.111198][ T5537] syz-executor.2[5537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.171950][ T5560] syz-executor.2[5560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.188920][ T5560] syz-executor.2[5560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.376020][ T5580] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 103.444350][ T5576] device sit0 entered promiscuous mode [ 104.336025][ T5643] device pim6reg1 entered promiscuous mode [ 104.553109][ T5674] syzkaller0: mtu less than device minimum [ 104.812331][ T5693] device veth0_vlan left promiscuous mode [ 104.818421][ T5693] device veth0_vlan entered promiscuous mode [ 105.709614][ T5753] syz-executor.1[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.709677][ T5753] syz-executor.1[5753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.746801][ T5766] device pim6reg1 entered promiscuous mode [ 105.948042][ T5801] syz-executor.2[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.948108][ T5801] syz-executor.2[5801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.610609][ T5844] device syzkaller0 entered promiscuous mode [ 106.676269][ T5851] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 107.537184][ T5892] device syzkaller0 entered promiscuous mode [ 107.578993][ T30] audit: type=1400 audit(1718014333.522:146): avc: denied { create } for pid=5901 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 107.602648][ T5903] syz-executor.1[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.602716][ T5903] syz-executor.1[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.660984][ T5905] syz-executor.3[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.672630][ T5905] syz-executor.3[5905] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.201077][ T5938] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.219852][ T5938] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.227484][ T5938] device bridge_slave_0 entered promiscuous mode [ 108.236972][ T5938] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.243851][ T5938] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.251288][ T5938] device bridge_slave_1 entered promiscuous mode [ 108.294347][ T5938] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.301319][ T5938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.308495][ T5938] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.315336][ T5938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.339365][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.347162][ T5687] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.354194][ T5687] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.377270][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.385380][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.393208][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.400433][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.407692][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.415758][ T5687] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.422598][ T5687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.429742][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.437679][ T5687] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.444498][ T5687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.451700][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.459428][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.467822][ T5938] device veth0_vlan entered promiscuous mode [ 108.479776][ T5938] device veth1_macvtap entered promiscuous mode [ 108.487444][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 108.502630][ T5687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.513999][ T5690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.717513][ T8] device bridge_slave_1 left promiscuous mode [ 108.723642][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.731220][ T8] device bridge_slave_0 left promiscuous mode [ 108.737334][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.744951][ T8] device veth1_macvtap left promiscuous mode [ 108.751568][ T8] device veth0_vlan left promiscuous mode [ 109.385975][ T5982] syz-executor.2 (5982) used greatest stack depth: 20112 bytes left [ 109.845980][ T6021] device sit0 left promiscuous mode [ 109.915145][ T6023] syz-executor.3[6023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.915184][ T6023] syz-executor.3[6023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.415483][ T6118] device pim6reg1 entered promiscuous mode [ 111.354751][ T6183] device vxcan1 entered promiscuous mode [ 111.490985][ T6088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 111.634657][ T6211] bpf_get_probe_write_proto: 2 callbacks suppressed [ 111.634674][ T6211] syz-executor.1[6211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.641327][ T6211] syz-executor.1[6211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.044719][ T6230] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 112.226314][ T6243] wg2: mtu less than device minimum [ 112.436351][ T6249] device pim6reg1 entered promiscuous mode [ 112.616458][ T6257] syz-executor.2[6257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.616521][ T6257] syz-executor.2[6257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.631547][ T30] audit: type=1400 audit(1718014338.572:147): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 112.667533][ T30] audit: type=1400 audit(1718014338.572:148): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 112.831001][ T6270] device macsec0 entered promiscuous mode [ 112.894852][ T6270] device veth1_macvtap entered promiscuous mode [ 112.904608][ T6276] syz-executor.4[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.904664][ T6276] syz-executor.4[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.067208][ T6276] syz-executor.4[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.079702][ T6276] syz-executor.4[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.465939][ T6402] device syzkaller0 entered promiscuous mode [ 115.168329][ T6435] device syzkaller0 entered promiscuous mode [ 115.322018][ T6442] device wg2 entered promiscuous mode [ 116.254369][ T6483] device syzkaller0 entered promiscuous mode [ 116.551792][ T30] audit: type=1400 audit(1718014342.492:149): avc: denied { create } for pid=6484 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 116.779463][ T6510] device wg2 entered promiscuous mode [ 117.538813][ T6525] device syzkaller0 entered promiscuous mode [ 119.153614][ T6546] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.160607][ T6546] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.167798][ T6546] device bridge_slave_0 entered promiscuous mode [ 119.174741][ T6546] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.181875][ T6546] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.189408][ T6546] device bridge_slave_1 entered promiscuous mode [ 119.259285][ T6565] device wg2 entered promiscuous mode [ 119.540112][ T6546] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.546999][ T6546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.554076][ T6546] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.560866][ T6546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.730820][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.738725][ T4383] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.745863][ T4383] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.769057][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 119.815684][ T4368] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.822563][ T4368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.829774][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 119.837957][ T4368] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.844799][ T4368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.852238][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.860088][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.916418][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 119.949608][ T6546] device veth0_vlan entered promiscuous mode [ 119.957648][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.977007][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.993015][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.012152][ T6588] device pim6reg1 entered promiscuous mode [ 120.037732][ T6546] device veth1_macvtap entered promiscuous mode [ 120.053607][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.071818][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 120.083365][ T4383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 120.110766][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 120.120882][ T4368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 120.753039][ T6675] syz-executor.4[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.753102][ T6675] syz-executor.4[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.138916][ T6693] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 121.256040][ T6705] geneve1: tun_chr_ioctl cmd 2147767511 [ 121.265111][ T6705] geneve1: tun_chr_ioctl cmd 1074025680 [ 122.722288][ T6841] syz-executor.1[6841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.722352][ T6841] syz-executor.1[6841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.736970][ T6841] syz-executor.1[6841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.805783][ T6841] syz-executor.1[6841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.207877][ T6858] syz-executor.4[6858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.295900][ T6858] syz-executor.4[6858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.491536][ T6893] syz-executor.0[6893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.505025][ T6893] syz-executor.0[6893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.085057][ T6954] : renamed from veth0_vlan [ 124.379232][ T6987] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 130.607845][ T7158] bpf_get_probe_write_proto: 8 callbacks suppressed [ 130.607861][ T7158] syz-executor.0[7158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.655350][ T7159] syz-executor.0[7159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.673167][ T7160] syz-executor.0[7160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.094308][ T7247] syz-executor.0[7247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.106555][ T7247] syz-executor.0[7247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.296076][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 235.313956][ C1] rcu: 1-...!: (10000 ticks this GP) idle=277/1/0x4000000000000000 softirq=22187/22187 fqs=0 last_accelerate: bf5e/e66f dyntick_enabled: 1 [ 235.328004][ C1] (t=10003 jiffies g=22309 q=12) [ 235.332858][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 10002 jiffies! g22309 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 235.345008][ C1] rcu: Possible timer handling issue on cpu=1 timer-softirq=4647 [ 235.352649][ C1] rcu: rcu_preempt kthread starved for 10005 jiffies! g22309 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 235.363842][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 235.373652][ C1] rcu: RCU grace-period kthread stack dump: [ 235.379380][ C1] task:rcu_preempt state:I stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 235.388418][ C1] Call Trace: [ 235.391532][ C1] [ 235.394314][ C1] __schedule+0xccc/0x1590 [ 235.398562][ C1] ? __sched_text_start+0x8/0x8 [ 235.403251][ C1] ? __kasan_check_write+0x14/0x20 [ 235.408195][ C1] schedule+0x11f/0x1e0 [ 235.412188][ C1] schedule_timeout+0x18c/0x370 [ 235.416872][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 235.421907][ C1] ? console_conditional_schedule+0x30/0x30 [ 235.427637][ C1] ? update_process_times+0x200/0x200 [ 235.432844][ C1] ? prepare_to_swait_event+0x308/0x320 [ 235.438227][ C1] rcu_gp_fqs_loop+0x2af/0xf80 [ 235.442826][ C1] ? debug_smp_processor_id+0x17/0x20 [ 235.448031][ C1] ? __note_gp_changes+0x4ab/0x920 [ 235.452979][ C1] ? rcu_gp_init+0xc30/0xc30 [ 235.457408][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 235.462439][ C1] ? rcu_gp_init+0x9cf/0xc30 [ 235.466867][ C1] rcu_gp_kthread+0xa4/0x350 [ 235.471292][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 235.475981][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 235.480495][ C1] ? __kasan_check_read+0x11/0x20 [ 235.485352][ C1] ? __kthread_parkme+0xb2/0x200 [ 235.490128][ C1] kthread+0x421/0x510 [ 235.494031][ C1] ? wake_nocb_gp+0x1e0/0x1e0 [ 235.498547][ C1] ? kthread_blkcg+0xd0/0xd0 [ 235.502974][ C1] ret_from_fork+0x1f/0x30 [ 235.507229][ C1] [ 235.510088][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 235.516262][ C1] NMI backtrace for cpu 1 [ 235.520425][ C1] CPU: 1 PID: 7333 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 235.530486][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 235.540381][ C1] Call Trace: [ 235.543504][ C1] [ 235.546198][ C1] dump_stack_lvl+0x151/0x1b7 [ 235.550710][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 235.556179][ C1] dump_stack+0x15/0x17 [ 235.560169][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 235.564944][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 235.570931][ C1] ? panic+0x751/0x751 [ 235.574837][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 235.580739][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 235.586557][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 235.592460][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 235.598184][ C1] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 235.604173][ C1] ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230 [ 235.610943][ C1] print_cpu_stall+0x310/0x5f0 [ 235.615545][ C1] rcu_sched_clock_irq+0x989/0x12f0 [ 235.620578][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 235.626568][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 235.631602][ C1] update_process_times+0x198/0x200 [ 235.636635][ C1] tick_sched_timer+0x188/0x240 [ 235.641319][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 235.646704][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 235.651738][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 235.656687][ C1] ? clockevents_program_event+0x22f/0x300 [ 235.662324][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 235.668229][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 235.673004][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 235.678730][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 235.684197][ C1] [ 235.686973][ C1] [ 235.689750][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 235.695572][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 235.700342][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 235.719784][ C1] RSP: 0018:ffffc900016f6d40 EFLAGS: 00000246 [ 235.725683][ C1] RAX: 0000000000000001 RBX: 1ffff920002dedac RCX: 1ffffffff0d1aa9c [ 235.733494][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 235.741307][ C1] RBP: ffffc900016f6df0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 235.749117][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 235.756929][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff920002dedb0 [ 235.764751][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 235.770729][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 235.775680][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 235.781581][ C1] ? save_stack+0x11a/0x1e0 [ 235.785919][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 235.792170][ C1] ? free_unref_page+0xe8/0x750 [ 235.796861][ C1] ? __free_pages+0x61/0xf0 [ 235.801195][ C1] ? __vunmap+0x7bc/0x8f0 [ 235.805360][ C1] ? bpf_prog_calc_tag+0x69a/0x8f0 [ 235.810307][ C1] ? resolve_pseudo_ldimm64+0xe2/0x1240 [ 235.815689][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 235.820462][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 235.825498][ C1] ? page_ext_put+0x1c/0x30 [ 235.829840][ C1] sock_map_delete_elem+0x99/0x130 [ 235.834783][ C1] ? kvfree+0x35/0x40 [ 235.838607][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xa48 [ 235.843981][ C1] bpf_trace_run2+0xec/0x210 [ 235.848411][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 235.853096][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 235.858737][ C1] ? kvfree+0x35/0x40 [ 235.862560][ C1] ? free_unref_page+0x2b3/0x750 [ 235.867330][ C1] ? kvfree+0x35/0x40 [ 235.871147][ C1] __bpf_trace_kfree+0x6f/0x90 [ 235.875749][ C1] ? kvfree+0x35/0x40 [ 235.879567][ C1] kfree+0x1f3/0x220 [ 235.883302][ C1] kvfree+0x35/0x40 [ 235.886945][ C1] __vunmap+0x850/0x8f0 [ 235.890946][ C1] vfree+0x7f/0xb0 [ 235.894499][ C1] bpf_prog_calc_tag+0x69a/0x8f0 [ 235.899297][ C1] ? __bpf_prog_free+0xe0/0xe0 [ 235.903875][ C1] resolve_pseudo_ldimm64+0xe2/0x1240 [ 235.909080][ C1] ? check_attach_btf_id+0x40f/0xef0 [ 235.914200][ C1] ? bpf_check+0x12bf0/0x12bf0 [ 235.918804][ C1] ? check_attach_btf_id+0xef0/0xef0 [ 235.923931][ C1] ? __mark_reg_known+0x1b0/0x1b0 [ 235.928784][ C1] ? security_capable+0x87/0xb0 [ 235.933472][ C1] bpf_check+0x3174/0x12bf0 [ 235.937816][ C1] ? 0xffffffffa002824c [ 235.941800][ C1] ? is_bpf_text_address+0x172/0x190 [ 235.946922][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 235.951786][ C1] ? __kernel_text_address+0x9b/0x110 [ 235.956990][ C1] ? unwind_get_return_address+0x4d/0x90 [ 235.962457][ C1] ? bpf_get_btf_vmlinux+0x60/0x60 [ 235.967406][ C1] ? arch_stack_walk+0xf3/0x140 [ 235.972094][ C1] ? stack_trace_save+0x113/0x1c0 [ 235.976958][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 235.981898][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 235.986854][ C1] ? __stack_depot_save+0x34/0x470 [ 235.991826][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 235.996653][ C1] ? ____kasan_kmalloc+0xdb/0x110 [ 236.001514][ C1] ? __kasan_kmalloc+0x9/0x10 [ 236.006032][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 236.011414][ C1] ? selinux_bpf_prog_alloc+0x51/0x140 [ 236.016705][ C1] ? security_bpf_prog_alloc+0x62/0x90 [ 236.022017][ C1] ? bpf_prog_load+0x9ee/0x1b50 [ 236.026687][ C1] ? __sys_bpf+0x4bc/0x760 [ 236.030936][ C1] ? __x64_sys_bpf+0x7c/0x90 [ 236.035362][ C1] ? do_syscall_64+0x3d/0xb0 [ 236.039840][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.045702][ C1] ? __kasan_kmalloc+0x9/0x10 [ 236.050206][ C1] ? memset+0x35/0x40 [ 236.054023][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 236.058901][ C1] bpf_prog_load+0x12ac/0x1b50 [ 236.063486][ C1] ? map_freeze+0x370/0x370 [ 236.067828][ C1] ? selinux_bpf+0xcb/0x100 [ 236.072163][ C1] ? security_bpf+0x82/0xb0 [ 236.076505][ C1] __sys_bpf+0x4bc/0x760 [ 236.080583][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 236.085789][ C1] ? __kasan_check_read+0x11/0x20 [ 236.090651][ C1] __x64_sys_bpf+0x7c/0x90 [ 236.094904][ C1] do_syscall_64+0x3d/0xb0 [ 236.099155][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.104892][ C1] RIP: 0033:0x7fed8b26ef69 [ 236.109140][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 236.128580][ C1] RSP: 002b:00007fed8a5e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 236.136829][ C1] RAX: ffffffffffffffda RBX: 00007fed8b3a5f80 RCX: 00007fed8b26ef69 [ 236.144634][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 236.152448][ C1] RBP: 00007fed8b2cc6fe R08: 0000000000000000 R09: 0000000000000000 [ 236.160258][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 236.168070][ C1] R13: 000000000000000b R14: 00007fed8b3a5f80 R15: 00007ffcf0483a88 [ 236.175890][ C1] [ 236.178761][ C1] NMI backtrace for cpu 1 [ 236.182911][ C1] CPU: 1 PID: 7333 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 236.192985][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 236.202877][ C1] Call Trace: [ 236.205997][ C1] [ 236.208695][ C1] dump_stack_lvl+0x151/0x1b7 [ 236.213204][ C1] ? io_uring_drop_tctx_refs+0x190/0x190 [ 236.218669][ C1] ? ttwu_do_wakeup+0x187/0x430 [ 236.223358][ C1] dump_stack+0x15/0x17 [ 236.227350][ C1] nmi_cpu_backtrace+0x2f7/0x300 [ 236.232123][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 236.238111][ C1] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 236.243406][ C1] ? __kasan_check_write+0x14/0x20 [ 236.248353][ C1] ? _raw_spin_lock+0x1b0/0x1b0 [ 236.253040][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 236.258946][ C1] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 236.264756][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 236.270662][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 236.276387][ C1] rcu_dump_cpu_stacks+0x1d8/0x330 [ 236.281335][ C1] print_cpu_stall+0x315/0x5f0 [ 236.285933][ C1] rcu_sched_clock_irq+0x989/0x12f0 [ 236.290970][ C1] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 236.296958][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 236.301991][ C1] update_process_times+0x198/0x200 [ 236.307025][ C1] tick_sched_timer+0x188/0x240 [ 236.311711][ C1] ? tick_setup_sched_timer+0x480/0x480 [ 236.317093][ C1] __hrtimer_run_queues+0x41a/0xad0 [ 236.322130][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 236.327073][ C1] ? clockevents_program_event+0x22f/0x300 [ 236.332716][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 236.338620][ C1] hrtimer_interrupt+0x40c/0xaa0 [ 236.343395][ C1] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 236.349122][ C1] sysvec_apic_timer_interrupt+0x95/0xc0 [ 236.354589][ C1] [ 236.357365][ C1] [ 236.360143][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 236.365957][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 236.370731][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 236.390171][ C1] RSP: 0018:ffffc900016f6d40 EFLAGS: 00000246 [ 236.396075][ C1] RAX: 0000000000000001 RBX: 1ffff920002dedac RCX: 1ffffffff0d1aa9c [ 236.403885][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 236.411696][ C1] RBP: ffffc900016f6df0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 236.419507][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 236.427319][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff920002dedb0 [ 236.435139][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 236.441120][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 236.446071][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 236.451969][ C1] ? save_stack+0x11a/0x1e0 [ 236.456309][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 236.462558][ C1] ? free_unref_page+0xe8/0x750 [ 236.467243][ C1] ? __free_pages+0x61/0xf0 [ 236.471584][ C1] ? __vunmap+0x7bc/0x8f0 [ 236.475750][ C1] ? bpf_prog_calc_tag+0x69a/0x8f0 [ 236.480698][ C1] ? resolve_pseudo_ldimm64+0xe2/0x1240 [ 236.486084][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 236.490852][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 236.495888][ C1] ? page_ext_put+0x1c/0x30 [ 236.500228][ C1] sock_map_delete_elem+0x99/0x130 [ 236.505172][ C1] ? kvfree+0x35/0x40 [ 236.508993][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xa48 [ 236.514374][ C1] bpf_trace_run2+0xec/0x210 [ 236.518802][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 236.523490][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 236.529127][ C1] ? kvfree+0x35/0x40 [ 236.532947][ C1] ? free_unref_page+0x2b3/0x750 [ 236.537722][ C1] ? kvfree+0x35/0x40 [ 236.541542][ C1] __bpf_trace_kfree+0x6f/0x90 [ 236.546142][ C1] ? kvfree+0x35/0x40 [ 236.549958][ C1] kfree+0x1f3/0x220 [ 236.553700][ C1] kvfree+0x35/0x40 [ 236.557337][ C1] __vunmap+0x850/0x8f0 [ 236.561329][ C1] vfree+0x7f/0xb0 [ 236.564887][ C1] bpf_prog_calc_tag+0x69a/0x8f0 [ 236.569661][ C1] ? __bpf_prog_free+0xe0/0xe0 [ 236.574265][ C1] resolve_pseudo_ldimm64+0xe2/0x1240 [ 236.579469][ C1] ? check_attach_btf_id+0x40f/0xef0 [ 236.584590][ C1] ? bpf_check+0x12bf0/0x12bf0 [ 236.589190][ C1] ? check_attach_btf_id+0xef0/0xef0 [ 236.594311][ C1] ? __mark_reg_known+0x1b0/0x1b0 [ 236.599170][ C1] ? security_capable+0x87/0xb0 [ 236.603859][ C1] bpf_check+0x3174/0x12bf0 [ 236.608203][ C1] ? 0xffffffffa002824c [ 236.612274][ C1] ? is_bpf_text_address+0x172/0x190 [ 236.617397][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 236.622258][ C1] ? __kernel_text_address+0x9b/0x110 [ 236.627645][ C1] ? unwind_get_return_address+0x4d/0x90 [ 236.633113][ C1] ? bpf_get_btf_vmlinux+0x60/0x60 [ 236.638060][ C1] ? arch_stack_walk+0xf3/0x140 [ 236.642752][ C1] ? stack_trace_save+0x113/0x1c0 [ 236.647607][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 236.652553][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 236.657515][ C1] ? __stack_depot_save+0x34/0x470 [ 236.662451][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 236.667309][ C1] ? ____kasan_kmalloc+0xdb/0x110 [ 236.672168][ C1] ? __kasan_kmalloc+0x9/0x10 [ 236.676684][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 236.682064][ C1] ? selinux_bpf_prog_alloc+0x51/0x140 [ 236.687366][ C1] ? security_bpf_prog_alloc+0x62/0x90 [ 236.692654][ C1] ? bpf_prog_load+0x9ee/0x1b50 [ 236.697339][ C1] ? __sys_bpf+0x4bc/0x760 [ 236.701592][ C1] ? __x64_sys_bpf+0x7c/0x90 [ 236.706020][ C1] ? do_syscall_64+0x3d/0xb0 [ 236.710446][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.716359][ C1] ? __kasan_kmalloc+0x9/0x10 [ 236.720950][ C1] ? memset+0x35/0x40 [ 236.724766][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 236.729627][ C1] bpf_prog_load+0x12ac/0x1b50 [ 236.734230][ C1] ? map_freeze+0x370/0x370 [ 236.738570][ C1] ? selinux_bpf+0xcb/0x100 [ 236.743254][ C1] ? security_bpf+0x82/0xb0 [ 236.747594][ C1] __sys_bpf+0x4bc/0x760 [ 236.751672][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 236.756883][ C1] ? __kasan_check_read+0x11/0x20 [ 236.761742][ C1] __x64_sys_bpf+0x7c/0x90 [ 236.765997][ C1] do_syscall_64+0x3d/0xb0 [ 236.770247][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.775975][ C1] RIP: 0033:0x7fed8b26ef69 [ 236.780230][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 236.799669][ C1] RSP: 002b:00007fed8a5e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 236.807915][ C1] RAX: ffffffffffffffda RBX: 00007fed8b3a5f80 RCX: 00007fed8b26ef69 [ 236.815726][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 236.823630][ C1] RBP: 00007fed8b2cc6fe R08: 0000000000000000 R09: 0000000000000000 [ 236.831435][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 236.839246][ C1] R13: 000000000000000b R14: 00007fed8b3a5f80 R15: 00007ffcf0483a88 [ 236.847064][ C1] [ 265.025402][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [kworker/0:6:1731] [ 265.033554][ C0] Modules linked in: [ 265.037276][ C0] CPU: 0 PID: 1731 Comm: kworker/0:6 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 265.047083][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 265.056989][ C0] Workqueue: events bpf_prog_free_deferred [ 265.062619][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 265.067397][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 265.087358][ C0] RSP: 0018:ffffc90000bb7520 EFLAGS: 00000246 [ 265.093258][ C0] RAX: 0000000000000003 RBX: 1ffff92000176ea8 RCX: ffffffff8154fa3f [ 265.101068][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888114790928 [ 265.108880][ C0] RBP: ffffc90000bb75d0 R08: dffffc0000000000 R09: ffffed10228f2126 [ 265.116690][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 265.124503][ C0] R13: ffff888114790928 R14: 0000000000000003 R15: 1ffff92000176eac [ 265.132313][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 265.141077][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.147501][ C0] CR2: 0000001b2ec22000 CR3: 00000001363d1000 CR4: 00000000003506b0 [ 265.155316][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.163123][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 265.170935][ C0] Call Trace: [ 265.174060][ C0] [ 265.176757][ C0] ? show_regs+0x58/0x60 [ 265.180842][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 265.185909][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 265.191021][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 265.196236][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 265.201175][ C0] ? clockevents_program_event+0x22f/0x300 [ 265.206816][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 265.212720][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 265.217672][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 265.223576][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 265.229210][ C0] [ 265.231987][ C0] [ 265.234784][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.240754][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 265.246839][ C0] ? kvm_wait+0x147/0x180 [ 265.250994][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.256983][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 265.261931][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 265.268006][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 265.273996][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.280249][ C0] ? bpf_jit_free_exec+0x15/0x20 [ 265.285019][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 265.289792][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.294823][ C0] ? ret_from_fork+0x1f/0x30 [ 265.299252][ C0] sock_map_delete_elem+0x99/0x130 [ 265.304198][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.308885][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xa48 [ 265.314266][ C0] bpf_trace_run2+0xec/0x210 [ 265.318694][ C0] ? __stack_depot_save+0x34/0x470 [ 265.323639][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.328326][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.333015][ C0] ? stack_depot_save+0xe/0x10 [ 265.337614][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.342301][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.347073][ C0] ? sock_map_unref+0x352/0x4d0 [ 265.351766][ C0] kfree+0x1f3/0x220 [ 265.355493][ C0] sock_map_unref+0x352/0x4d0 [ 265.360008][ C0] sock_map_delete_elem+0xc1/0x130 [ 265.364954][ C0] ? kvfree+0x35/0x40 [ 265.368771][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0xa48 [ 265.374156][ C0] bpf_trace_run2+0xec/0x210 [ 265.378579][ C0] ? asm_sysvec_call_function_single+0x1b/0x20 [ 265.384577][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.389260][ C0] ? kvfree+0x35/0x40 [ 265.393082][ C0] ? kvfree+0x35/0x40 [ 265.396894][ C0] __bpf_trace_kfree+0x6f/0x90 [ 265.401493][ C0] ? kvfree+0x35/0x40 [ 265.405311][ C0] kfree+0x1f3/0x220 [ 265.409051][ C0] kvfree+0x35/0x40 [ 265.412692][ C0] __vunmap+0x850/0x8f0 [ 265.416685][ C0] vfree+0x7f/0xb0 [ 265.420240][ C0] module_memfree+0x17/0x30 [ 265.424579][ C0] bpf_jit_free_exec+0x15/0x20 [ 265.429182][ C0] bpf_jit_free+0x98/0x240 [ 265.433434][ C0] bpf_prog_free_deferred+0x61e/0x730 [ 265.438641][ C0] process_one_work+0x6bb/0xc10 [ 265.443329][ C0] worker_thread+0xad5/0x12a0 [ 265.447846][ C0] kthread+0x421/0x510 [ 265.451745][ C0] ? worker_clr_flags+0x180/0x180 [ 265.456620][ C0] ? kthread_blkcg+0xd0/0xd0 [ 265.461034][ C0] ret_from_fork+0x1f/0x30 [ 265.465292][ C0] [ 265.468153][ C0] Sending NMI from CPU 0 to CPUs 1: [ 265.473216][ C1] NMI backtrace for cpu 1 [ 265.473225][ C1] CPU: 1 PID: 7333 Comm: syz-executor.3 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 265.473241][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 265.473250][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 265.473268][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 265.473281][ C1] RSP: 0018:ffffc900016f6d40 EFLAGS: 00000246 [ 265.473294][ C1] RAX: 0000000000000001 RBX: 1ffff920002dedac RCX: 1ffffffff0d1aa9c [ 265.473305][ C1] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7138ad4 [ 265.473315][ C1] RBP: ffffc900016f6df0 R08: dffffc0000000000 R09: ffffed103ee2715b [ 265.473326][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 265.473337][ C1] R13: ffff8881f7138ad4 R14: 0000000000000001 R15: 1ffff920002dedb0 [ 265.473348][ C1] FS: 00007fed8a5e96c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 265.473362][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.473379][ C1] CR2: 0000000000000000 CR3: 0000000111bbd000 CR4: 00000000003506a0 [ 265.473393][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.473402][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.473411][ C1] Call Trace: [ 265.473416][ C1] [ 265.473423][ C1] ? show_regs+0x58/0x60 [ 265.473437][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 265.473456][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 265.473474][ C1] ? kvm_wait+0x147/0x180 [ 265.473487][ C1] ? kvm_wait+0x147/0x180 [ 265.473500][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 265.473516][ C1] ? nmi_handle+0xa8/0x280 [ 265.473531][ C1] ? kvm_wait+0x147/0x180 [ 265.473544][ C1] ? default_do_nmi+0x69/0x160 [ 265.473561][ C1] ? exc_nmi+0xaf/0x120 [ 265.473575][ C1] ? end_repeat_nmi+0x16/0x31 [ 265.473594][ C1] ? kvm_wait+0x147/0x180 [ 265.473608][ C1] ? kvm_wait+0x147/0x180 [ 265.473622][ C1] ? kvm_wait+0x147/0x180 [ 265.473635][ C1] [ 265.473639][ C1] [ 265.473643][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 265.473659][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 265.473676][ C1] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 265.473694][ C1] ? save_stack+0x11a/0x1e0 [ 265.473709][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 265.473725][ C1] ? free_unref_page+0xe8/0x750 [ 265.473740][ C1] ? __free_pages+0x61/0xf0 [ 265.473754][ C1] ? __vunmap+0x7bc/0x8f0 [ 265.473767][ C1] ? bpf_prog_calc_tag+0x69a/0x8f0 [ 265.473792][ C1] ? resolve_pseudo_ldimm64+0xe2/0x1240 [ 265.473810][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 265.473827][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 265.473845][ C1] ? page_ext_put+0x1c/0x30 [ 265.473860][ C1] sock_map_delete_elem+0x99/0x130 [ 265.473876][ C1] ? kvfree+0x35/0x40 [ 265.473890][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xa48 [ 265.473903][ C1] bpf_trace_run2+0xec/0x210 [ 265.473919][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 265.473934][ C1] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 265.473951][ C1] ? kvfree+0x35/0x40 [ 265.473963][ C1] ? free_unref_page+0x2b3/0x750 [ 265.473979][ C1] ? kvfree+0x35/0x40 [ 265.473993][ C1] __bpf_trace_kfree+0x6f/0x90 [ 265.474007][ C1] ? kvfree+0x35/0x40 [ 265.474019][ C1] kfree+0x1f3/0x220 [ 265.474036][ C1] kvfree+0x35/0x40 [ 265.474048][ C1] __vunmap+0x850/0x8f0 [ 265.474065][ C1] vfree+0x7f/0xb0 [ 265.474077][ C1] bpf_prog_calc_tag+0x69a/0x8f0 [ 265.474094][ C1] ? __bpf_prog_free+0xe0/0xe0 [ 265.474115][ C1] resolve_pseudo_ldimm64+0xe2/0x1240 [ 265.474131][ C1] ? check_attach_btf_id+0x40f/0xef0 [ 265.474148][ C1] ? bpf_check+0x12bf0/0x12bf0 [ 265.474163][ C1] ? check_attach_btf_id+0xef0/0xef0 [ 265.474179][ C1] ? __mark_reg_known+0x1b0/0x1b0 [ 265.474195][ C1] ? security_capable+0x87/0xb0 [ 265.474213][ C1] bpf_check+0x3174/0x12bf0 [ 265.474238][ C1] ? 0xffffffffa002824c [ 265.474248][ C1] ? is_bpf_text_address+0x172/0x190 [ 265.474264][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 265.474279][ C1] ? __kernel_text_address+0x9b/0x110 [ 265.474295][ C1] ? unwind_get_return_address+0x4d/0x90 [ 265.474311][ C1] ? bpf_get_btf_vmlinux+0x60/0x60 [ 265.474326][ C1] ? arch_stack_walk+0xf3/0x140 [ 265.474345][ C1] ? stack_trace_save+0x113/0x1c0 [ 265.474360][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 265.474381][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 265.474396][ C1] ? __stack_depot_save+0x34/0x470 [ 265.474416][ C1] ? ____kasan_kmalloc+0xed/0x110 [ 265.474430][ C1] ? ____kasan_kmalloc+0xdb/0x110 [ 265.474444][ C1] ? __kasan_kmalloc+0x9/0x10 [ 265.474456][ C1] ? kmem_cache_alloc_trace+0x115/0x210 [ 265.474472][ C1] ? selinux_bpf_prog_alloc+0x51/0x140 [ 265.474488][ C1] ? security_bpf_prog_alloc+0x62/0x90 [ 265.474503][ C1] ? bpf_prog_load+0x9ee/0x1b50 [ 265.474516][ C1] ? __sys_bpf+0x4bc/0x760 [ 265.474529][ C1] ? __x64_sys_bpf+0x7c/0x90 [ 265.474542][ C1] ? do_syscall_64+0x3d/0xb0 [ 265.474556][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.474582][ C1] ? __kasan_kmalloc+0x9/0x10 [ 265.474597][ C1] ? memset+0x35/0x40 [ 265.474610][ C1] ? bpf_obj_name_cpy+0x196/0x1e0 [ 265.474625][ C1] bpf_prog_load+0x12ac/0x1b50 [ 265.474642][ C1] ? map_freeze+0x370/0x370 [ 265.474661][ C1] ? selinux_bpf+0xcb/0x100 [ 265.474675][ C1] ? security_bpf+0x82/0xb0 [ 265.474689][ C1] __sys_bpf+0x4bc/0x760 [ 265.474703][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 265.474721][ C1] ? __kasan_check_read+0x11/0x20 [ 265.474737][ C1] __x64_sys_bpf+0x7c/0x90 [ 265.474751][ C1] do_syscall_64+0x3d/0xb0 [ 265.474765][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.474779][ C1] RIP: 0033:0x7fed8b26ef69 [ 265.474792][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 265.474804][ C1] RSP: 002b:00007fed8a5e90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 265.474818][ C1] RAX: ffffffffffffffda RBX: 00007fed8b3a5f80 RCX: 00007fed8b26ef69 [ 265.474829][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 265.474839][ C1] RBP: 00007fed8b2cc6fe R08: 0000000000000000 R09: 0000000000000000 [ 265.474848][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 265.474856][ C1] R13: 000000000000000b R14: 00007fed8b3a5f80 R15: 00007ffcf0483a88 [ 265.474871][ C1]