last executing test programs: 3.755288737s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111890000000000180000000000000000000000000004009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x80000000, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2d}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000840)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xef}, 0x108000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 3.107175546s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffdef) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000002c0)}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 2.894112778s ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd63"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10201, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001d18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r7}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.503936918s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x62}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00'}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000140), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0xe000) 2.410940002s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x3e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x4, 0x7, 0xa34, 0x8, r2, 0x800, '\x00', 0x0, r3, 0x4, 0x2, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000000), 0x9) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8feffffb703000000000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r10}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='btrfs_reserve_ticket\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.events\x00', 0x275a, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) 2.314911387s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000200)=ANY=[@ANYRESOCT=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r4}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x40049409, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000f40)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 2.259315675s ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)={[{0x2d, 'freezer'}, {0x2b, 'cpuacct'}, {0x2b, 'net'}, {0x2d, 'net_prio'}, {0x2b, 'cpuset'}, {0x2d, 'perf_event'}, {0x2b, 'net_prio'}, {0x2b, 'rdma'}]}, 0x45) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x20) 2.216377532s ago: executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 1.469270366s ago: executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 1.423063433s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpuacct'}, {0x2b, 'blkio'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'net_cls'}]}, 0x23) 1.388929178s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffdef) perf_event_open(0x0, 0x0, 0x4000000000000000, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f00000002c0)}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 1.3163607s ago: executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 1.290689363s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 1.233847222s ago: executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000340)={0x5, 0x80, 0xfa, 0x0, 0x7f, 0x6, 0x0, 0x0, 0x18410, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x200, 0x5, 0x6, 0x3, 0x3, 0x2, 0x9b, 0x0, 0x8, 0x0, 0x6}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020701200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r7}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000780)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.200755667s ago: executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x3, 0x4, 0x2, 0x5, 0x801, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r0, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x41, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0xeb, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) r8 = perf_event_open$cgroup(&(0x7f00000004c0)={0x4, 0x80, 0x7f, 0x1, 0x8, 0x77, 0x0, 0x800, 0x5c010, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000002c0), 0xa}, 0x80, 0x401, 0x40, 0x3, 0x100, 0x2, 0x8, 0x0, 0x4, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r2, 0x7) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x1f, 0x1, 0xa4, 0x27, 0x0, 0x4, 0x80, 0xc, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x7fffffffffffffff}, 0x109, 0x3, 0x676, 0x4, 0x59f, 0xb84a, 0x8, 0x0, 0x101, 0x0, 0x20000}, 0xffffffffffffffff, 0x6, r8, 0x2) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r11}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.059876119s ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x2e, 0xc9, &(0x7f0000000200)="0d488e6c2a53f53508beeb431552edf344b441dabc539d506d436e17f35045d009c6fb7779bccbbe47a161c7bc31", &(0x7f00000004c0)=""/201, 0x5, 0x0, 0xa1, 0xf, &(0x7f00000005c0)="e6a05fef6f619af38f9813d1f9e000a15a63a236c8459781ff338d59cbecc823aaf5c71172ba24d3babbc4477ffdc8121fcd71e49329d03f8897107cf20e2525bd85ac6c8214f6fe1cb33c958534eb617be50d01aa4b2aad8ab453be8660e32ed171c516c23743133b7ec253c0ac640290a9e32cf917daf602d720d8b8a87ad5620de8f0852407aed09589695e37aacc6ba86fe6bc80495c1515be65736e784948", &(0x7f0000000680)="72add7c9909e74c2cde3f781bc82b4", 0x0, 0x0, 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000000)=0x8000) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[], 0xc000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 803.740538ms ago: executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111890000000000180000000000000000000000000004009500000000000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x80000000, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2d}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000840)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x56d, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xef}, 0x108000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 770.116283ms ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff8000}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5a, &(0x7f0000000140)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f00000004c0)=""/162, 0x0, 0xa2, 0x0, 0x9}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x9a2, 0x4, 0x8b2c, 0x18, r2, 0x9, '\x00', r3, r4, 0x1, 0x2, 0x4, 0xd}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8000, 0x0, 0xd, 0x40, r0, 0x5, '\x00', r3, r5, 0x3, 0x3, 0x5, 0x5}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x2e, 0xc9, &(0x7f0000000200)="0d488e6c2a53f53508beeb431552edf344b441dabc539d506d436e17f35045d009c6fb7779bccbbe47a161c7bc31", &(0x7f00000004c0)=""/201, 0x5, 0x0, 0xa1, 0xf, &(0x7f00000005c0)="e6a05fef6f619af38f9813d1f9e000a15a63a236c8459781ff338d59cbecc823aaf5c71172ba24d3babbc4477ffdc8121fcd71e49329d03f8897107cf20e2525bd85ac6c8214f6fe1cb33c958534eb617be50d01aa4b2aad8ab453be8660e32ed171c516c23743133b7ec253c0ac640290a9e32cf917daf602d720d8b8a87ad5620de8f0852407aed09589695e37aacc6ba86fe6bc80495c1515be65736e784948", &(0x7f0000000680)="72add7c9909e74c2cde3f781bc82b4", 0x0, 0x0, 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x13, 0x4, &(0x7f0000000180)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0xda, &(0x7f0000000340)=""/218, 0x41100, 0x20, '\x00', 0x0, 0x5, r8, 0x8, &(0x7f0000000440)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r8, 0x3, &(0x7f0000000480)=[r6, r8], &(0x7f0000000780)=[{0x2, 0x4, 0x6, 0x7}, {0x2, 0x5, 0xe, 0x1ac504cd97535c62}, {0x2, 0x1, 0x9, 0x6}], 0x10, 0x4}, 0x90) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r11}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000880)={r8, r9, 0x0, r10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x401c5820, &(0x7f0000000000)=0x8000) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[], 0xc000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) 686.413266ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x62}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00'}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000140), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0xe000) 499.924234ms ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 479.992777ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000000)=0x8000) write$cgroup_subtree(r2, &(0x7f0000000080)=ANY=[], 0xc000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) 473.735808ms ago: executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 259.948331ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x2d, 'cpuacct'}, {0x2b, 'blkio'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'net_cls'}]}, 0x23) 151.943757ms ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) 136.45208ms ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r4, &(0x7f0000000240), 0x0}, 0x20) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 107.224804ms ago: executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 103.578355ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='ext4_es_insert_delayed_block\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x2009) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 63.267801ms ago: executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000600), &(0x7f0000000200)='%ps \x00'}, 0x20) sendmsg$tipc(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) 14.669788ms ago: executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r5}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r6, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 0s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.53' (ED25519) to the list of known hosts. 2024/06/08 13:46:06 fuzzer started 2024/06/08 13:46:06 dialing manager at 10.128.0.163:30010 [ 21.113549][ T30] audit: type=1400 audit(1717854366.529:66): avc: denied { node_bind } for pid=283 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.134288][ T30] audit: type=1400 audit(1717854366.529:67): avc: denied { name_bind } for pid=283 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 21.169988][ T30] audit: type=1400 audit(1717854366.579:68): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.177050][ T293] cgroup: Unknown subsys name 'net' [ 21.201240][ T293] cgroup: Unknown subsys name 'devices' [ 21.208575][ T30] audit: type=1400 audit(1717854366.579:69): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.232696][ T30] audit: type=1400 audit(1717854366.579:70): avc: denied { integrity } for pid=293 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 21.243188][ T299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.255148][ T30] audit: type=1400 audit(1717854366.579:71): avc: denied { mounton } for pid=293 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.274498][ T298] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.286332][ T30] audit: type=1400 audit(1717854366.579:72): avc: denied { mount } for pid=293 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.316486][ T30] audit: type=1400 audit(1717854366.609:73): avc: denied { unmount } for pid=293 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.336963][ T30] audit: type=1400 audit(1717854366.619:74): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.360062][ T30] audit: type=1400 audit(1717854366.679:75): avc: denied { relabelto } for pid=299 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.393093][ T293] cgroup: Unknown subsys name 'hugetlb' [ 21.398562][ T293] cgroup: Unknown subsys name 'rlimit' 2024/06/08 13:46:07 starting 5 executor processes [ 22.240775][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.247684][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.255303][ T309] device bridge_slave_0 entered promiscuous mode [ 22.263657][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.270597][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.277985][ T309] device bridge_slave_1 entered promiscuous mode [ 22.309895][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.317228][ T308] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.324812][ T308] device bridge_slave_0 entered promiscuous mode [ 22.332725][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.339655][ T308] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.347146][ T308] device bridge_slave_1 entered promiscuous mode [ 22.372201][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.379156][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.386755][ T310] device bridge_slave_0 entered promiscuous mode [ 22.394691][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.401672][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.408836][ T310] device bridge_slave_1 entered promiscuous mode [ 22.465085][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.471987][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.479533][ T311] device bridge_slave_0 entered promiscuous mode [ 22.497158][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.504038][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.511676][ T311] device bridge_slave_1 entered promiscuous mode [ 22.551734][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.558585][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.566201][ T312] device bridge_slave_0 entered promiscuous mode [ 22.587141][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.594045][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.601361][ T312] device bridge_slave_1 entered promiscuous mode [ 22.738806][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.745813][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.753033][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.759877][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.776335][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.783211][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.790301][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.797138][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.818300][ T308] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.825267][ T308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.832389][ T308] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.839134][ T308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.850819][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.857690][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.864823][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.872021][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.918409][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.925923][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.933192][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.940182][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.947285][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.954508][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.962046][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.969582][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.976695][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.984779][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.992137][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.013305][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.020816][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.029011][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.035882][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.043290][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.051375][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.058204][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.065431][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.073680][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.080512][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.122736][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.132293][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.140448][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.147316][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.154499][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.163457][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.170378][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.177592][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.185457][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.193495][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.200333][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.207566][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.215378][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.223223][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.231330][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.257770][ T309] device veth0_vlan entered promiscuous mode [ 23.264943][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.273410][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.281542][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.288382][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.296197][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.304346][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.312426][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.319270][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.326582][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.333846][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.341380][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.349465][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.357531][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.364388][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.371596][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.379673][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.387674][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.394531][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.401724][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.409590][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.417524][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.425405][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.433363][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.441575][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.449711][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.457565][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.465539][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.473626][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.481782][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.489294][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.496671][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.510975][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.519245][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.527570][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.535674][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.555627][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.564053][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.572496][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.580750][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.588918][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.597259][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.611402][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.618752][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.626358][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.634921][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.644012][ T311] device veth0_vlan entered promiscuous mode [ 23.651495][ T309] device veth1_macvtap entered promiscuous mode [ 23.667657][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.675212][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.683561][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.692684][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.700766][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.710842][ T310] device veth0_vlan entered promiscuous mode [ 23.719146][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.727197][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.747386][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.755789][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.763304][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.770639][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.779161][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.787661][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.796067][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.811788][ T311] device veth1_macvtap entered promiscuous mode [ 23.825343][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.833459][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.840849][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.848617][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.856183][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.863916][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.871827][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.879981][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.888586][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.895968][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.903545][ T312] device veth0_vlan entered promiscuous mode [ 23.922761][ T308] device veth0_vlan entered promiscuous mode [ 23.929308][ T310] device veth1_macvtap entered promiscuous mode [ 23.941021][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.949190][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.957022][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.965148][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.973376][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.981566][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.001235][ T312] device veth1_macvtap entered promiscuous mode [ 24.022324][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.030669][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.062963][ T308] device veth1_macvtap entered promiscuous mode [ 24.080895][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.098490][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.107379][ C1] hrtimer: interrupt took 25892 ns [ 24.130371][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.138734][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.147199][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.155691][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.164303][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.173105][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.182566][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.211656][ T342] device veth0_vlan left promiscuous mode [ 24.218058][ T342] device veth0_vlan entered promiscuous mode [ 24.230739][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.240867][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.249422][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.258162][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.274573][ T343] device veth0_vlan left promiscuous mode [ 24.281746][ T343] device veth0_vlan entered promiscuous mode [ 24.987411][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 25.666649][ T380] device veth0_vlan left promiscuous mode [ 25.672533][ T380] device veth0_vlan entered promiscuous mode [ 25.679500][ T381] device veth0_vlan left promiscuous mode [ 25.695590][ T381] device veth0_vlan entered promiscuous mode [ 25.704738][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.723386][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.732266][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.739624][ T384] device veth0_vlan left promiscuous mode [ 25.746176][ T384] device veth0_vlan entered promiscuous mode [ 25.892880][ T387] device veth0_vlan left promiscuous mode [ 25.899684][ T387] device veth0_vlan entered promiscuous mode [ 26.123275][ T396] device veth0_vlan left promiscuous mode [ 26.136788][ T396] device veth0_vlan entered promiscuous mode [ 26.245315][ T401] device veth0_vlan left promiscuous mode [ 26.252629][ T401] device veth0_vlan entered promiscuous mode [ 26.495885][ T412] device veth0_vlan left promiscuous mode [ 26.505810][ T412] device veth0_vlan entered promiscuous mode [ 26.520002][ T415] device veth0_vlan left promiscuous mode [ 26.534742][ T415] device veth0_vlan entered promiscuous mode [ 26.543274][ T416] device veth0_vlan left promiscuous mode [ 26.559240][ T416] device veth0_vlan entered promiscuous mode [ 26.772051][ T434] device veth0_vlan left promiscuous mode [ 26.782115][ T434] device veth0_vlan entered promiscuous mode [ 26.938233][ T448] device veth0_vlan left promiscuous mode [ 26.944276][ T448] device veth0_vlan entered promiscuous mode [ 26.953923][ T451] device veth0_vlan left promiscuous mode [ 26.960374][ T451] device veth0_vlan entered promiscuous mode [ 27.173378][ T454] device veth0_vlan left promiscuous mode [ 27.180760][ T454] device veth0_vlan entered promiscuous mode [ 27.187993][ T457] device veth0_vlan left promiscuous mode [ 27.194588][ T457] device veth0_vlan entered promiscuous mode [ 27.319797][ T460] device veth0_vlan left promiscuous mode [ 27.326869][ T460] device veth0_vlan entered promiscuous mode [ 27.509206][ T473] device veth0_vlan left promiscuous mode [ 27.515473][ T473] device veth0_vlan entered promiscuous mode [ 27.522940][ T479] device veth0_vlan left promiscuous mode [ 27.528967][ T479] device veth0_vlan entered promiscuous mode [ 27.618291][ T485] device veth0_vlan left promiscuous mode [ 27.628391][ T485] device veth0_vlan entered promiscuous mode [ 27.755915][ T494] device veth0_vlan left promiscuous mode [ 27.792279][ T494] device veth0_vlan entered promiscuous mode [ 27.984157][ T515] device veth0_vlan left promiscuous mode [ 27.991307][ T515] device veth0_vlan entered promiscuous mode [ 28.133559][ T518] device veth0_vlan left promiscuous mode [ 28.139837][ T518] device veth0_vlan entered promiscuous mode [ 28.149432][ T520] device veth0_vlan left promiscuous mode [ 28.155990][ T520] device veth0_vlan entered promiscuous mode [ 28.269276][ T527] device veth0_vlan left promiscuous mode [ 28.281126][ T527] device veth0_vlan entered promiscuous mode [ 28.344416][ T528] device syzkaller0 entered promiscuous mode [ 28.578982][ T548] device veth0_vlan left promiscuous mode [ 28.585660][ T548] device veth0_vlan entered promiscuous mode [ 28.595601][ T549] device veth0_vlan left promiscuous mode [ 28.606666][ T549] device veth0_vlan entered promiscuous mode [ 28.803075][ T553] device veth0_vlan left promiscuous mode [ 28.809570][ T553] device veth0_vlan entered promiscuous mode [ 29.006086][ T309] syz-executor.0 (309) used greatest stack depth: 20912 bytes left [ 29.006732][ T562] device veth0_vlan left promiscuous mode [ 29.020128][ T562] device veth0_vlan entered promiscuous mode [ 29.144954][ T568] device veth0_vlan left promiscuous mode [ 29.151266][ T568] device veth0_vlan entered promiscuous mode [ 29.239536][ T572] device veth0_vlan left promiscuous mode [ 29.249945][ T572] device veth0_vlan entered promiscuous mode [ 29.381955][ T583] device veth0_vlan left promiscuous mode [ 29.394000][ T583] device veth0_vlan entered promiscuous mode [ 29.586955][ T591] device veth0_vlan left promiscuous mode [ 29.593311][ T591] device veth0_vlan entered promiscuous mode [ 29.706069][ T609] device syzkaller0 entered promiscuous mode [ 29.754513][ T613] device veth0_vlan left promiscuous mode [ 29.760664][ T613] device veth0_vlan entered promiscuous mode [ 29.768210][ T616] device veth0_vlan left promiscuous mode [ 29.774846][ T616] device veth0_vlan entered promiscuous mode [ 29.898229][ T552] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.912606][ T552] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.920033][ T552] device bridge_slave_0 entered promiscuous mode [ 29.951288][ T552] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.958238][ T552] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.965949][ T552] device bridge_slave_1 entered promiscuous mode [ 30.151398][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 30.151422][ T30] audit: type=1400 audit(1717854375.569:104): avc: denied { write } for pid=635 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.184891][ T30] audit: type=1400 audit(1717854375.599:105): avc: denied { read } for pid=635 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.310097][ T629] device veth0_vlan left promiscuous mode [ 30.316785][ T629] device veth0_vlan entered promiscuous mode [ 30.334357][ T640] device veth0_vlan left promiscuous mode [ 30.350484][ T640] device veth0_vlan entered promiscuous mode [ 30.469667][ T30] audit: type=1400 audit(1717854375.879:106): avc: denied { setopt } for pid=645 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.596282][ T637] device veth0_vlan left promiscuous mode [ 30.611979][ T637] device veth0_vlan entered promiscuous mode [ 30.625090][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.665425][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.703761][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.805194][ T653] device veth0_vlan left promiscuous mode [ 30.811767][ T653] device veth0_vlan entered promiscuous mode [ 30.949189][ T657] device veth0_vlan left promiscuous mode [ 30.971465][ T657] device veth0_vlan entered promiscuous mode [ 30.993408][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.004676][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 31.016996][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 31.179678][ T671] device veth0_vlan left promiscuous mode [ 31.198018][ T671] device veth0_vlan entered promiscuous mode [ 31.250843][ T674] device syzkaller0 entered promiscuous mode [ 31.279696][ T30] audit: type=1400 audit(1717854376.689:107): avc: denied { relabelfrom } for pid=673 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.302494][ T674] syzkaller0: tun_net_xmit 1280 [ 31.307666][ T674] syzkaller0: create flow: hash 4034920271 index 1 [ 31.316339][ T30] audit: type=1400 audit(1717854376.689:108): avc: denied { relabelto } for pid=673 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.342092][ T673] syzkaller0: delete flow: hash 4034920271 index 1 [ 31.457071][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.466814][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.487480][ T10] device bridge_slave_1 left promiscuous mode [ 31.497363][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.534140][ T10] device bridge_slave_0 left promiscuous mode [ 31.566232][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.623625][ T10] device veth1_macvtap left promiscuous mode [ 31.632712][ T10] device veth0_vlan left promiscuous mode [ 31.995388][ T691] device veth0_vlan left promiscuous mode [ 32.002474][ T691] device veth0_vlan entered promiscuous mode [ 32.133968][ T695] device veth0_vlan left promiscuous mode [ 32.147448][ T695] device veth0_vlan entered promiscuous mode [ 32.156363][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.165251][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.174813][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.181732][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.189266][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.197905][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.206455][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.213468][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.231081][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 32.238908][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.247492][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.255763][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.264576][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.296531][ T699] device syzkaller0 entered promiscuous mode [ 32.357926][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.373811][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.395637][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.408342][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.417319][ T552] device veth0_vlan entered promiscuous mode [ 32.462957][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.470295][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.488623][ T552] device veth1_macvtap entered promiscuous mode [ 32.496021][ T30] audit: type=1400 audit(1717854377.909:109): avc: denied { read } for pid=716 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.501002][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.527674][ T30] audit: type=1400 audit(1717854377.909:110): avc: denied { open } for pid=716 comm="syz-executor.4" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.541157][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.559508][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 32.566889][ T30] audit: type=1400 audit(1717854377.909:111): avc: denied { ioctl } for pid=716 comm="syz-executor.4" path="/dev/ppp" dev="devtmpfs" ino=133 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.603037][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.616787][ T30] audit: type=1400 audit(1717854378.029:112): avc: denied { write } for pid=718 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.637094][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.666175][ T30] audit: type=1400 audit(1717854378.079:113): avc: denied { cpu } for pid=722 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.678385][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.693661][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.901119][ T737] device veth0_vlan left promiscuous mode [ 32.913585][ T737] device veth0_vlan entered promiscuous mode [ 33.058582][ T742] device veth0_vlan left promiscuous mode [ 33.067399][ T742] device veth0_vlan entered promiscuous mode [ 33.158627][ T745] device veth0_vlan left promiscuous mode [ 33.167242][ T745] device veth0_vlan entered promiscuous mode [ 33.306854][ T752] device veth0_vlan left promiscuous mode [ 33.319684][ T752] device veth0_vlan entered promiscuous mode [ 33.501201][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.509483][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.517450][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.525781][ T775] device wg2 entered promiscuous mode [ 33.585237][ T782] device syzkaller0 entered promiscuous mode [ 33.747597][ T790] device syzkaller0 entered promiscuous mode [ 33.853286][ T792] device veth0_vlan left promiscuous mode [ 33.863053][ T792] device veth0_vlan entered promiscuous mode [ 33.887284][ T790] syzkaller0: tun_net_xmit 1280 [ 33.915645][ T790] syzkaller0: create flow: hash 4034920271 index 1 [ 33.974132][ T789] syzkaller0: delete flow: hash 4034920271 index 1 [ 34.132923][ T804] device veth0_vlan left promiscuous mode [ 34.139087][ T804] device veth0_vlan entered promiscuous mode [ 34.368764][ T822] device veth0_vlan left promiscuous mode [ 34.378362][ T822] device veth0_vlan entered promiscuous mode [ 34.396758][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.416095][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.453362][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.584638][ T837] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't shrink FS - resize aborted [ 34.687358][ T840] device veth0_vlan left promiscuous mode [ 34.693930][ T840] device veth0_vlan entered promiscuous mode [ 35.186722][ T849] device veth0_vlan left promiscuous mode [ 35.211644][ T849] device veth0_vlan entered promiscuous mode [ 35.472307][ T311] syz-executor.4 (311) used greatest stack depth: 19488 bytes left [ 35.619780][ T858] device veth0_vlan left promiscuous mode [ 35.632730][ T858] device veth0_vlan entered promiscuous mode [ 35.676169][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.689976][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.763273][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.949614][ T868] device veth0_vlan left promiscuous mode [ 35.955860][ T868] device veth0_vlan entered promiscuous mode [ 36.036605][ T864] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.065005][ T864] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.081417][ T864] device bridge_slave_0 entered promiscuous mode [ 36.143220][ T864] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.150108][ T864] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.215956][ T864] device bridge_slave_1 entered promiscuous mode [ 36.374646][ T869] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.381793][ T869] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.407522][ T869] device bridge_slave_0 entered promiscuous mode [ 36.446084][ T869] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.496863][ T869] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.541395][ T869] device bridge_slave_1 entered promiscuous mode [ 36.559526][ T117] device bridge_slave_1 left promiscuous mode [ 36.567458][ T117] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.625149][ T117] device bridge_slave_0 left promiscuous mode [ 36.643612][ T117] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.673172][ T117] device veth1_macvtap left promiscuous mode [ 36.679023][ T117] device veth0_vlan left promiscuous mode [ 37.644714][ T909] device veth0_vlan left promiscuous mode [ 37.654790][ T909] device veth0_vlan entered promiscuous mode [ 37.682809][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.744046][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.766392][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.774495][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 37.774511][ T30] audit: type=1400 audit(1717854383.189:115): avc: denied { create } for pid=915 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 37.923048][ T917] device veth0_vlan left promiscuous mode [ 37.929074][ T917] device veth0_vlan entered promiscuous mode [ 37.936661][ T919] device macsec0 entered promiscuous mode [ 37.977257][ T920] device veth0_vlan left promiscuous mode [ 37.988488][ T920] device veth0_vlan entered promiscuous mode [ 38.007353][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.049020][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.092275][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.128676][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.137412][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.144317][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.153169][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.257537][ T928] device veth0_vlan left promiscuous mode [ 38.269739][ T928] device veth0_vlan entered promiscuous mode [ 38.281261][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.289503][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.326931][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.333857][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.455468][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.463468][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.471026][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.479327][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.494353][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.501365][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.516652][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.527971][ T948] syz-executor.3[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.528046][ T948] syz-executor.3[948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.540015][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.566892][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.573821][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.633443][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.643167][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.660137][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.672132][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.692295][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.721691][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.729761][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.738242][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.746748][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.761524][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.769819][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.796458][ T864] device veth0_vlan entered promiscuous mode [ 38.818814][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.848600][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.857718][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.866422][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.874948][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 38.883030][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.891379][ T869] device veth0_vlan entered promiscuous mode [ 38.920517][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.945109][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.953013][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.960464][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.975799][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 38.985490][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.001488][ T864] device veth1_macvtap entered promiscuous mode [ 39.086824][ T971] device veth0_vlan left promiscuous mode [ 39.093296][ T971] device veth0_vlan entered promiscuous mode [ 39.101482][ T869] device veth1_macvtap entered promiscuous mode [ 39.111521][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.120397][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 39.133280][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.141496][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.149176][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.158535][ T978] syz-executor.3[978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.158599][ T978] syz-executor.3[978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.164664][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.189596][ T978] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 39.190544][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.208160][ T344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.217535][ T973] device veth1_macvtap left promiscuous mode [ 39.318193][ T976] device veth0_vlan left promiscuous mode [ 39.325774][ T976] device veth0_vlan entered promiscuous mode [ 39.357261][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 39.381556][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.400154][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.446331][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.634964][ T30] audit: type=1400 audit(1717854385.049:116): avc: denied { write } for pid=1010 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.721790][ T1011] device veth0_vlan left promiscuous mode [ 39.727756][ T1011] device veth0_vlan entered promiscuous mode [ 39.735669][ T610] device bridge_slave_1 left promiscuous mode [ 39.754055][ T1017] syz-executor.4[1017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.754128][ T1017] syz-executor.4[1017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.765964][ T610] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.804795][ T610] device bridge_slave_0 left promiscuous mode [ 39.830303][ T610] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.876242][ T610] device veth1_macvtap left promiscuous mode [ 39.882423][ T610] device veth0_vlan left promiscuous mode [ 40.006102][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.018863][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.035808][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.126200][ T1024] device veth0_vlan left promiscuous mode [ 40.134559][ T1024] device veth0_vlan entered promiscuous mode [ 40.288390][ T1045] syz-executor.0[1045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.288462][ T1045] syz-executor.0[1045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.674545][ T1061] device veth0_vlan left promiscuous mode [ 40.698674][ T1061] device veth0_vlan entered promiscuous mode [ 40.829587][ T1065] device veth0_vlan left promiscuous mode [ 40.845493][ T1065] device veth0_vlan entered promiscuous mode [ 41.040722][ T1083] device veth0_vlan left promiscuous mode [ 41.071773][ T1083] device veth0_vlan entered promiscuous mode [ 41.322519][ T30] audit: type=1400 audit(1717854386.739:117): avc: denied { create } for pid=1115 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 41.661337][ T1129] device veth0_vlan left promiscuous mode [ 41.722387][ T1129] device veth0_vlan entered promiscuous mode [ 42.175355][ T1151] device veth0_vlan left promiscuous mode [ 42.188741][ T1151] device veth0_vlan entered promiscuous mode [ 42.478733][ T1158] device veth0_vlan left promiscuous mode [ 42.528124][ T1158] device veth0_vlan entered promiscuous mode [ 42.721780][ T1182] device veth0_vlan left promiscuous mode [ 42.739762][ T1182] device veth0_vlan entered promiscuous mode [ 43.181074][ T1203] device veth0_vlan left promiscuous mode [ 43.187078][ T1203] device veth0_vlan entered promiscuous mode [ 43.234589][ T1199] device veth0_vlan left promiscuous mode [ 43.258810][ T1199] device veth0_vlan entered promiscuous mode [ 43.296642][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.311984][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.322124][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.815047][ T1226] EXT4-fs warning (device sda1): verify_group_input:171: Bad blocks count 0 [ 43.882505][ T1222] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.889568][ T1222] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.897711][ T1222] device bridge_slave_0 entered promiscuous mode [ 43.907522][ T1222] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.914907][ T1222] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.926440][ T1222] device bridge_slave_1 entered promiscuous mode [ 44.008072][ T1222] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.015159][ T1222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.022285][ T1222] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.029130][ T1222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.112901][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.151510][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.260229][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.270740][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.350081][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 44.370574][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 44.381257][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 44.388240][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 44.396082][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 44.404626][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 44.414602][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 44.421501][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 44.429092][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 44.437398][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 44.515767][ T117] device bridge_slave_1 left promiscuous mode [ 44.521916][ T117] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.529759][ T117] device bridge_slave_0 left promiscuous mode [ 44.535988][ T117] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.544281][ T117] device veth1_macvtap left promiscuous mode [ 44.550267][ T117] device veth0_vlan left promiscuous mode [ 44.694289][ T1247] device veth0_vlan left promiscuous mode [ 44.700735][ T1247] device veth0_vlan entered promiscuous mode [ 44.708620][ T1248] device veth0_vlan left promiscuous mode [ 44.714931][ T1248] device veth0_vlan entered promiscuous mode [ 44.725212][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 44.735047][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 44.770835][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.779554][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.802412][ T1222] device veth0_vlan entered promiscuous mode [ 44.811696][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.823001][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.844688][ T1222] device veth1_macvtap entered promiscuous mode [ 44.947752][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.972064][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.979416][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 45.120625][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 45.131352][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.138822][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.147312][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.155791][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.164153][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.313478][ T1272] device veth0_vlan left promiscuous mode [ 45.320848][ T1272] device veth0_vlan entered promiscuous mode [ 45.463122][ T1277] device veth0_vlan left promiscuous mode [ 45.526464][ T1277] device veth0_vlan entered promiscuous mode [ 45.763375][ T1292] device veth0_vlan left promiscuous mode [ 45.771561][ T1292] device veth0_vlan entered promiscuous mode [ 45.779188][ T1290] device veth0_vlan left promiscuous mode [ 45.785683][ T1290] device veth0_vlan entered promiscuous mode [ 45.926833][ T1307] device veth0_vlan left promiscuous mode [ 45.941281][ T1307] device veth0_vlan entered promiscuous mode [ 46.376732][ T1354] device syzkaller0 entered promiscuous mode [ 46.513470][ T1357] device veth0_vlan left promiscuous mode [ 46.531971][ T1357] device veth0_vlan entered promiscuous mode [ 46.571756][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.581687][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.591987][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.653001][ T30] audit: type=1400 audit(1717854392.069:118): avc: denied { create } for pid=1371 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.032018][ T30] audit: type=1400 audit(1717854392.449:119): avc: denied { create } for pid=1397 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 47.328095][ T1411] device veth0_vlan left promiscuous mode [ 47.351195][ T1411] device veth0_vlan entered promiscuous mode [ 47.360632][ T30] audit: type=1400 audit(1717854392.769:120): avc: denied { create } for pid=1416 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 47.399604][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 47.408997][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 47.428540][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 47.500882][ T1425] ------------[ cut here ]------------ [ 47.506258][ T1425] Please remove unsupported %[ 47.510715][ T1425] WARNING: CPU: 0 PID: 1425 at lib/vsprintf.c:2667 format_decode+0x12d2/0x1f10 [ 47.519551][ T1425] Modules linked in: [ 47.523392][ T1425] CPU: 0 PID: 1425 Comm: syz-executor.2 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 47.533480][ T1425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 47.543440][ T1425] RIP: 0010:format_decode+0x12d2/0x1f10 [ 47.548921][ T1425] Code: 7b 04 01 48 b8 00 00 00 00 00 fc ff df 41 0f b6 04 07 84 c0 0f 85 30 0c 00 00 41 0f be 36 48 c7 c7 00 7a 84 85 e8 0e 27 b9 fe <0f> 0b e9 01 fa ff ff 48 8b 4c 24 18 80 e1 07 38 c1 0f 8c e3 ed ff [ 47.568435][ T1425] RSP: 0018:ffffc90000c77620 EFLAGS: 00010246 [ 47.574287][ T1425] RAX: a8c612d0c1982a00 RBX: 00000000ffffffdb RCX: ffff8881148793c0 [ 47.582100][ T1425] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 47.589888][ T1425] RBP: ffffc90000c77710 R08: ffffffff815760e5 R09: ffffed103ee04e93 [ 47.597760][ T1425] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff0a00ffffff00 [ 47.605599][ T1425] R13: ffff0000ffffff00 R14: ffffc90000c7794c R15: 1ffff9200018ef29 [ 47.613423][ T1425] FS: 00007f9a7bf486c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 47.622271][ T1425] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 47.628593][ T1425] CR2: 00007ffc93dd8018 CR3: 0000000123acc000 CR4: 00000000003506b0 [ 47.636440][ T1425] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 47.644259][ T1425] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 47.652081][ T1425] Call Trace: [ 47.655155][ T1425] [ 47.657930][ T1425] ? show_regs+0x58/0x60 [ 47.662043][ T1425] ? __warn+0x160/0x2f0 [ 47.666004][ T1425] ? format_decode+0x12d2/0x1f10 [ 47.670776][ T1425] ? report_bug+0x3d9/0x5b0 [ 47.675154][ T1425] ? format_decode+0x12d2/0x1f10 [ 47.679895][ T1425] ? handle_bug+0x41/0x70 [ 47.684101][ T1425] ? exc_invalid_op+0x1b/0x50 [ 47.688567][ T1425] ? asm_exc_invalid_op+0x1b/0x20 [ 47.693479][ T1425] ? __wake_up_klogd+0xd5/0x110 [ 47.698117][ T1425] ? format_decode+0x12d2/0x1f10 [ 47.703017][ T1425] ? __kernel_text_address+0x9b/0x110 [ 47.708184][ T1425] ? vsnprintf+0x1c70/0x1c70 [ 47.712631][ T1425] ? bstr_printf+0x1b6/0x10c0 [ 47.717120][ T1425] ? memcpy+0x56/0x70 [ 47.720966][ T1425] bstr_printf+0x130/0x10c0 [ 47.725280][ T1425] ? bpf_bprintf_cleanup+0xc0/0xc0 [ 47.730223][ T1425] ? vbin_printf+0x1bc0/0x1bc0 [ 47.734854][ T1425] ? bpf_trace_printk+0x122/0x330 [ 47.739685][ T1425] ? memcpy+0x56/0x70 [ 47.743559][ T1425] bpf_trace_printk+0x1b5/0x330 [ 47.748195][ T1425] ? kmem_cache_alloc+0xf5/0x200 [ 47.753010][ T1425] ? ktime_get+0xf1/0x160 [ 47.757174][ T1425] ? bpf_probe_write_user+0xf0/0xf0 [ 47.762205][ T1425] ? do_syscall_64+0x3d/0xb0 [ 47.766679][ T1425] ? ktime_get+0xf1/0x160 [ 47.770847][ T1425] bpf_prog_12183cdb1cd51dab+0x2e/0xdec [ 47.776276][ T1425] bpf_test_run+0x478/0xa10 [ 47.780574][ T1425] ? convert___skb_to_skb+0x570/0x570 [ 47.785804][ T1425] ? eth_type_trans+0x2c6/0x600 [ 47.790561][ T1425] ? eth_get_headlen+0x240/0x240 [ 47.795361][ T1425] ? convert___skb_to_skb+0x44/0x570 [ 47.800538][ T1425] bpf_prog_test_run_skb+0xb41/0x1420 [ 47.805802][ T1425] ? anon_inode_getfd+0x33/0x40 [ 47.810533][ T1425] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 47.816287][ T1425] ? __kasan_check_write+0x14/0x20 [ 47.821300][ T1425] ? fput_many+0x160/0x1b0 [ 47.825572][ T1425] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 47.831692][ T1425] bpf_prog_test_run+0x3b0/0x630 [ 47.836414][ T1425] ? bpf_prog_query+0x220/0x220 [ 47.841127][ T1425] ? selinux_bpf+0xd2/0x100 [ 47.845438][ T1425] ? security_bpf+0x82/0xb0 [ 47.849804][ T1425] __sys_bpf+0x525/0x760 [ 47.853910][ T1425] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 47.859073][ T1425] ? __kasan_check_read+0x11/0x20 [ 47.864089][ T1425] __x64_sys_bpf+0x7c/0x90 [ 47.868295][ T1425] do_syscall_64+0x3d/0xb0 [ 47.872566][ T1425] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 47.878270][ T1425] RIP: 0033:0x7f9a7cbcdf69 [ 47.882545][ T1425] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 47.902010][ T1425] RSP: 002b:00007f9a7bf480c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.910204][ T1425] RAX: ffffffffffffffda RBX: 00007f9a7cd04f80 RCX: 00007f9a7cbcdf69 [ 47.918045][ T1425] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 47.925851][ T1425] RBP: 00007f9a7cc2b6fe R08: 0000000000000000 R09: 0000000000000000 [ 47.933665][ T1425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 47.941489][ T1425] R13: 000000000000000b R14: 00007f9a7cd04f80 R15: 00007ffd79868a98 [ 47.949267][ T1425] [ 47.952162][ T1425] ---[ end trace bc413bdf040a6f3e ]--- [ 47.986170][ T1448] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 48.024660][ T1448] device syzkaller0 entered promiscuous mode [ 48.190547][ T1475] device veth0_vlan left promiscuous mode [ 48.196814][ T1475] device veth0_vlan entered promiscuous mode [ 48.204756][ T1478] device veth0_vlan left promiscuous mode [ 48.213083][ T1478] device veth0_vlan entered promiscuous mode [ 48.224496][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.233984][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.241732][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.315122][ T1484] syz-executor.3[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.315194][ T1484] syz-executor.3[1484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.358785][ T1480] device veth0_vlan left promiscuous mode [ 48.390636][ T1480] device veth0_vlan entered promiscuous mode [ 48.564624][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.573080][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.580866][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.589730][ T1496] device veth0_vlan left promiscuous mode [ 48.598235][ T1496] device veth0_vlan entered promiscuous mode [ 48.645051][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.658597][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.669877][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 48.922863][ T1516] device veth0_vlan left promiscuous mode [ 48.929164][ T1516] device veth0_vlan entered promiscuous mode [ 48.938294][ T1517] device veth0_vlan left promiscuous mode [ 48.944717][ T1517] device veth0_vlan entered promiscuous mode [ 48.958436][ T1518] device veth0_vlan left promiscuous mode [ 48.971372][ T1518] device veth0_vlan entered promiscuous mode [ 49.192664][ T1545] device veth0_vlan left promiscuous mode [ 49.199365][ T1545] device veth0_vlan entered promiscuous mode [ 49.354228][ T1562] device veth0_vlan left promiscuous mode [ 49.361200][ T1562] device veth0_vlan entered promiscuous mode [ 49.518405][ T1565] device veth0_vlan left promiscuous mode [ 49.525767][ T1565] device veth0_vlan entered promiscuous mode [ 49.681430][ T1582] device veth0_vlan left promiscuous mode [ 49.687655][ T1582] device veth0_vlan entered promiscuous mode [ 49.698138][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.706830][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.714511][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.773839][ T1596] syz-executor.3[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.773906][ T1596] syz-executor.3[1596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.879690][ T1594] device veth0_vlan left promiscuous mode [ 49.898436][ T1594] device veth0_vlan entered promiscuous mode [ 49.910379][ T1591] device veth0_vlan left promiscuous mode [ 49.918821][ T1591] device veth0_vlan entered promiscuous mode [ 49.951716][ T1599] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 49.987590][ T1599] device syzkaller0 entered promiscuous mode [ 50.032652][ T1603] device veth0_vlan left promiscuous mode [ 50.055790][ T1603] device veth0_vlan entered promiscuous mode [ 50.599848][ T1642] device veth0_vlan left promiscuous mode [ 50.606185][ T1642] device veth0_vlan entered promiscuous mode [ 50.921153][ T1657] device veth0_vlan left promiscuous mode [ 50.944635][ T1657] device veth0_vlan entered promiscuous mode [ 51.243544][ T1670] device veth0_vlan left promiscuous mode [ 51.257561][ T1670] device veth0_vlan entered promiscuous mode [ 51.265587][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.290638][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.315259][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.340144][ T1674] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.398313][ T1679] O3ãc¤±: renamed from bridge_slave_0 [ 51.497968][ T1693] device veth0_vlan left promiscuous mode [ 51.506472][ T1693] device veth0_vlan entered promiscuous mode [ 51.761658][ T1711] device veth0_vlan left promiscuous mode [ 51.769999][ T1711] device veth0_vlan entered promiscuous mode [ 51.990323][ T1732] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.023508][ T1732] O3ãc¤±: renamed from bridge_slave_0 [ 52.156744][ T1738] device syzkaller0 entered promiscuous mode [ 53.188348][ T1793] syz-executor.3[1793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.188423][ T1793] syz-executor.3[1793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.227678][ T1796] device veth0_vlan left promiscuous mode [ 53.227972][ T1795] syz-executor.3[1795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.245282][ T1795] syz-executor.3[1795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.270546][ T1796] device veth0_vlan entered promiscuous mode [ 53.567499][ T1822] device veth0_vlan left promiscuous mode [ 53.573681][ T1822] device veth0_vlan entered promiscuous mode [ 53.582751][ T1800] device veth0_vlan left promiscuous mode [ 53.591492][ T1800] device veth0_vlan entered promiscuous mode [ 53.621174][ T1823] device veth0_vlan left promiscuous mode [ 53.631778][ T1823] device veth0_vlan entered promiscuous mode [ 53.708356][ T1842] device pim6reg1 entered promiscuous mode [ 54.795046][ T1864] device veth0_vlan left promiscuous mode [ 54.805837][ T1864] device veth0_vlan entered promiscuous mode [ 54.986500][ T1875] device veth0_vlan left promiscuous mode [ 55.011643][ T1875] device veth0_vlan entered promiscuous mode [ 55.142261][ T1898] device syzkaller0 entered promiscuous mode [ 55.243885][ T1906] device vxcan1 entered promiscuous mode [ 55.941862][ T1925] device veth0_vlan left promiscuous mode [ 55.948974][ T1925] device veth0_vlan entered promiscuous mode [ 56.208871][ T1944] device veth0_vlan left promiscuous mode [ 56.249371][ T1944] device veth0_vlan entered promiscuous mode [ 56.307517][ T1948] device veth0_vlan left promiscuous mode [ 56.335084][ T1948] device veth0_vlan entered promiscuous mode [ 56.430825][ T1957] device vxcan1 entered promiscuous mode [ 56.600880][ T1956] device veth0_vlan left promiscuous mode [ 56.624635][ T1956] device veth0_vlan entered promiscuous mode [ 57.339088][ T1997] device veth0_vlan left promiscuous mode [ 57.345993][ T1997] device veth0_vlan entered promiscuous mode [ 57.602259][ T2000] device veth0_vlan left promiscuous mode [ 57.608113][ T2000] device veth0_vlan entered promiscuous mode [ 57.652084][ T2003] device veth0_vlan left promiscuous mode [ 57.657982][ T2003] device veth0_vlan entered promiscuous mode [ 57.672336][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.680589][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.748239][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.785619][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.826451][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.862273][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.037977][ T2026] device veth0_vlan left promiscuous mode [ 58.081625][ T2026] device veth0_vlan entered promiscuous mode [ 58.322373][ T2035] device veth0_vlan left promiscuous mode [ 58.328649][ T2035] device veth0_vlan entered promiscuous mode [ 58.572210][ T2043] device veth0_vlan left promiscuous mode [ 58.598338][ T2043] device veth0_vlan entered promiscuous mode [ 58.715752][ T2052] device veth0_vlan left promiscuous mode [ 58.740525][ T2052] device veth0_vlan entered promiscuous mode [ 58.842068][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.850320][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.879073][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.041000][ T2075] device veth0_vlan left promiscuous mode [ 59.085491][ T2075] device veth0_vlan entered promiscuous mode [ 59.339512][ T2079] device veth0_vlan left promiscuous mode [ 59.361764][ T2079] device veth0_vlan entered promiscuous mode [ 59.559204][ T2091] device veth0_vlan left promiscuous mode [ 59.580237][ T2091] device veth0_vlan entered promiscuous mode [ 60.437397][ T2152] device veth0_vlan left promiscuous mode [ 60.472165][ T2152] device veth0_vlan entered promiscuous mode [ 60.550532][ T2160] device veth0_vlan left promiscuous mode [ 60.587953][ T2160] device veth0_vlan entered promiscuous mode [ 60.683295][ T2166] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.858396][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.858476][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.951213][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.967100][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.026541][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.047468][ T2175] syz-executor.4[2175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.204012][ T2180] device veth0_vlan left promiscuous mode [ 61.232707][ T2180] device veth0_vlan entered promiscuous mode [ 61.532038][ T2204] device veth0_vlan left promiscuous mode [ 61.539138][ T2204] device veth0_vlan entered promiscuous mode [ 61.738624][ T2206] device veth0_vlan left promiscuous mode [ 61.753078][ T2206] device veth0_vlan entered promiscuous mode [ 61.987081][ T2228] syz-executor.2[2228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.987158][ T2228] syz-executor.2[2228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.108858][ T2228] syz-executor.2[2228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.160201][ T2232] syz-executor.2[2232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.619504][ T2264] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.653894][ T2265] device veth0_vlan left promiscuous mode [ 62.660235][ T2265] device veth0_vlan entered promiscuous mode [ 62.842685][ T2268] device veth0_vlan left promiscuous mode [ 62.849864][ T2268] device veth0_vlan entered promiscuous mode [ 62.956127][ T30] audit: type=1400 audit(1717854408.369:121): avc: denied { create } for pid=2286 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 62.960292][ T2277] device syzkaller0 entered promiscuous mode [ 63.364144][ T2309] device syzkaller0 entered promiscuous mode [ 63.602209][ T2318] device veth0_vlan left promiscuous mode [ 63.610146][ T2318] device veth0_vlan entered promiscuous mode [ 63.706583][ T2324] device syzkaller0 entered promiscuous mode [ 63.972102][ T2336] device veth0_vlan left promiscuous mode [ 63.991347][ T2336] device veth0_vlan entered promiscuous mode [ 64.283100][ T2363] device veth0_vlan left promiscuous mode [ 64.291608][ T2363] device veth0_vlan entered promiscuous mode [ 64.439742][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.455948][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.489207][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.510584][ T2370] device veth0_vlan left promiscuous mode [ 64.526290][ T2370] device veth0_vlan entered promiscuous mode [ 64.817961][ T2382] device veth0_vlan left promiscuous mode [ 64.825433][ T2382] device veth0_vlan entered promiscuous mode [ 64.923510][ T2386] device syzkaller0 entered promiscuous mode [ 64.970718][ T2394] device syzkaller0 entered promiscuous mode [ 65.552656][ T2409] device veth0_vlan left promiscuous mode [ 65.571954][ T2409] device veth0_vlan entered promiscuous mode [ 65.793134][ T2418] device syzkaller0 entered promiscuous mode [ 65.994627][ T2424] device veth0_vlan left promiscuous mode [ 66.001265][ T2424] device veth0_vlan entered promiscuous mode [ 66.137663][ T2430] device veth0_vlan left promiscuous mode [ 66.151761][ T2430] device veth0_vlan entered promiscuous mode [ 66.477862][ T2448] device veth0_vlan left promiscuous mode [ 66.484072][ T2448] device veth0_vlan entered promiscuous mode [ 66.563860][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.583367][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.591414][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.615627][ T2457] device syzkaller0 entered promiscuous mode [ 66.708526][ T2467] device veth0_vlan left promiscuous mode [ 66.714773][ T2467] device veth0_vlan entered promiscuous mode [ 66.816128][ T2473] device syzkaller0 entered promiscuous mode [ 66.980401][ T2480] device veth0_vlan left promiscuous mode [ 66.989984][ T2480] device veth0_vlan entered promiscuous mode [ 67.305636][ T2498] device veth0_vlan left promiscuous mode [ 67.351666][ T2498] device veth0_vlan entered promiscuous mode [ 67.506935][ T2503] device veth0_vlan left promiscuous mode [ 67.531270][ T2503] device veth0_vlan entered promiscuous mode [ 67.544292][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.564354][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.584976][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.864711][ T2521] device pim6reg1 entered promiscuous mode [ 68.627718][ T2540] device veth0_vlan left promiscuous mode [ 68.673169][ T2540] device veth0_vlan entered promiscuous mode [ 68.723150][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.742779][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.755209][ T30] audit: type=1400 audit(1717854414.169:122): avc: denied { remove_name } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 68.779022][ T1817] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.830443][ T30] audit: type=1400 audit(1717854414.169:123): avc: denied { rename } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.948297][ T2547] device veth0_vlan left promiscuous mode [ 68.955720][ T2547] device veth0_vlan entered promiscuous mode [ 69.357353][ T2575] device veth0_vlan left promiscuous mode [ 69.368350][ T2575] device veth0_vlan entered promiscuous mode [ 69.402036][ T2576] device veth0_vlan left promiscuous mode [ 69.411997][ T2576] device veth0_vlan entered promiscuous mode [ 69.721424][ T2589] device veth0_vlan left promiscuous mode [ 69.735104][ T2589] device veth0_vlan entered promiscuous mode [ 69.757615][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.780834][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.822274][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.856627][ T2590] device veth0_vlan left promiscuous mode [ 69.889520][ T2590] device veth0_vlan entered promiscuous mode [ 69.898210][ T2587] device veth0_vlan left promiscuous mode [ 69.936720][ T2587] device veth0_vlan entered promiscuous mode [ 70.018697][ T2598] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.335967][ T2621] device syzkaller0 entered promiscuous mode [ 70.562367][ T2624] device veth0_vlan left promiscuous mode [ 70.574767][ T2624] device veth0_vlan entered promiscuous mode [ 70.655503][ T2626] device syzkaller0 entered promiscuous mode [ 70.841169][ T2642] device veth0_vlan left promiscuous mode [ 70.847850][ T2642] device veth0_vlan entered promiscuous mode [ 71.154993][ T2659] device veth0_vlan left promiscuous mode [ 71.164503][ T2659] device veth0_vlan entered promiscuous mode [ 71.294894][ T2665] device veth0_vlan left promiscuous mode [ 71.301415][ T2665] device veth0_vlan entered promiscuous mode [ 71.473706][ T2669] device veth0_vlan left promiscuous mode [ 71.495675][ T2669] device veth0_vlan entered promiscuous mode [ 71.631307][ T2673] device veth0_vlan left promiscuous mode [ 71.638600][ T2673] device veth0_vlan entered promiscuous mode [ 71.813372][ T2678] device veth0_vlan left promiscuous mode [ 71.887004][ T2678] device veth0_vlan entered promiscuous mode [ 72.125971][ T2692] device veth0_vlan left promiscuous mode [ 72.132253][ T2692] device veth0_vlan entered promiscuous mode [ 72.197660][ T2707] device syzkaller0 entered promiscuous mode [ 72.362111][ T2709] device veth0_vlan left promiscuous mode [ 72.372014][ T2709] device veth0_vlan entered promiscuous mode [ 72.524724][ T2722] device veth0_vlan left promiscuous mode [ 72.541934][ T2722] device veth0_vlan entered promiscuous mode [ 72.815184][ T2730] device veth0_vlan left promiscuous mode [ 72.902717][ T2730] device veth0_vlan entered promiscuous mode [ 73.466356][ T2758] device syzkaller0 entered promiscuous mode [ 73.619634][ T2760] device veth0_vlan left promiscuous mode [ 73.657788][ T2760] device veth0_vlan entered promiscuous mode [ 74.264589][ T2782] device veth0_vlan left promiscuous mode [ 74.275228][ T2782] device veth0_vlan entered promiscuous mode [ 74.300502][ T2784] device veth0_vlan left promiscuous mode [ 74.312329][ T2784] device veth0_vlan entered promiscuous mode [ 74.473376][ T2804] device syzkaller0 entered promiscuous mode [ 75.093665][ T2820] device veth0_vlan left promiscuous mode [ 75.102243][ T2820] device veth0_vlan entered promiscuous mode [ 75.122049][ T2821] device veth0_vlan left promiscuous mode [ 75.134880][ T2821] device veth0_vlan entered promiscuous mode [ 75.502838][ T2846] device veth0_vlan left promiscuous mode [ 75.535142][ T2846] device veth0_vlan entered promiscuous mode [ 75.757446][ T2850] device veth0_vlan left promiscuous mode [ 75.795890][ T2850] device veth0_vlan entered promiscuous mode [ 75.833199][ T1816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.850650][ T1816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.901233][ T1816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.384813][ T2883] device veth0_vlan left promiscuous mode [ 76.391986][ T2883] device veth0_vlan entered promiscuous mode [ 76.553906][ T2886] device veth0_vlan left promiscuous mode [ 76.560814][ T2886] device veth0_vlan entered promiscuous mode [ 76.584798][ T2894] device syzkaller0 entered promiscuous mode [ 76.674366][ T30] audit: type=1400 audit(1717854422.089:124): avc: denied { create } for pid=2905 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 76.915029][ T2911] device veth0_vlan left promiscuous mode [ 76.925154][ T2911] device veth0_vlan entered promiscuous mode [ 77.135159][ T2927] bond_slave_1: mtu less than device minimum [ 77.152265][ T2928] device veth0_vlan left promiscuous mode [ 77.160629][ T2928] device veth0_vlan entered promiscuous mode [ 77.230495][ T2935] device syzkaller0 entered promiscuous mode [ 77.580188][ T2956] device veth0_vlan left promiscuous mode [ 77.601063][ T2956] device veth0_vlan entered promiscuous mode [ 77.721543][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.734707][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.774609][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.128362][ T2967] device veth0_vlan left promiscuous mode [ 78.136238][ T2967] device veth0_vlan entered promiscuous mode [ 78.274150][ T2978] device veth0_vlan left promiscuous mode [ 78.310295][ T2978] device veth0_vlan entered promiscuous mode [ 78.445404][ T2975] device syzkaller0 entered promiscuous mode [ 78.487778][ T2996] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 78.652514][ T3004] device veth0_vlan left promiscuous mode [ 78.658430][ T3004] device veth0_vlan entered promiscuous mode [ 78.688854][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.697503][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.705514][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.977689][ T3015] device veth0_vlan left promiscuous mode [ 78.995890][ T3015] device veth0_vlan entered promiscuous mode [ 79.229552][ T3018] device veth0_vlan left promiscuous mode [ 79.291033][ T3018] device veth0_vlan entered promiscuous mode [ 80.027684][ T3058] device veth0_vlan left promiscuous mode [ 80.039622][ T3058] device veth0_vlan entered promiscuous mode [ 80.251456][ T3074] device veth0_vlan left promiscuous mode [ 80.257664][ T3074] device veth0_vlan entered promiscuous mode [ 80.743832][ T3087] device veth0_vlan left promiscuous mode [ 80.764024][ T3087] device veth0_vlan entered promiscuous mode [ 80.808141][ T1819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.823876][ T1819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.871355][ T1819] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.525809][ T3125] device veth0_vlan left promiscuous mode [ 81.547157][ T3125] device veth0_vlan entered promiscuous mode [ 82.105159][ T3152] device sit0 entered promiscuous mode [ 83.081137][ T3191] device veth0_vlan left promiscuous mode [ 83.120015][ T3191] device veth0_vlan entered promiscuous mode [ 83.189201][ T3197] device sit0 entered promiscuous mode [ 83.250556][ T30] audit: type=1400 audit(1717854428.659:125): avc: denied { create } for pid=3206 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 83.909148][ T3208] device veth0_vlan left promiscuous mode [ 83.921346][ T30] audit: type=1400 audit(1717854429.339:126): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 83.948494][ T3208] device veth0_vlan entered promiscuous mode [ 84.214543][ T3241] bpf_get_probe_write_proto: 14 callbacks suppressed [ 84.214564][ T3241] syz-executor.3[3241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.264498][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.272494][ T3241] syz-executor.3[3241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.277540][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.398676][ T3236] device veth0_vlan left promiscuous mode [ 84.436766][ T3236] device veth0_vlan entered promiscuous mode [ 84.476978][ T3239] device veth0_vlan left promiscuous mode [ 84.495860][ T3239] device veth0_vlan entered promiscuous mode [ 84.590120][ T3244] device pim6reg1 entered promiscuous mode [ 84.955678][ T3257] device veth0_vlan left promiscuous mode [ 85.061068][ T3257] device veth0_vlan entered promiscuous mode [ 85.116204][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.124856][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.138961][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.283029][ T3271] device veth0_vlan left promiscuous mode [ 85.328002][ T3271] device veth0_vlan entered promiscuous mode [ 199.120046][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.2:3280] [ 199.128520][ C0] Modules linked in: [ 199.132254][ C0] CPU: 0 PID: 3280 Comm: syz-executor.2 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 199.143692][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 199.153607][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 199.158362][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 199.178321][ C0] RSP: 0018:ffffc90000007800 EFLAGS: 00000246 [ 199.184221][ C0] RAX: 0000000000000001 RBX: 1ffff92000000f04 RCX: 1ffffffff0d1aa9c [ 199.192035][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 199.199948][ C0] RBP: ffffc900000078b0 R08: dffffc0000000000 R09: ffffed103ee0715b [ 199.207760][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 199.215573][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff92000000f08 [ 199.223556][ C0] FS: 00007f9a7bf486c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 199.232326][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.238749][ C0] CR2: 0000000100000000 CR3: 0000000126a83000 CR4: 00000000003506b0 [ 199.246565][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.254370][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 199.262189][ C0] Call Trace: [ 199.265302][ C0] [ 199.268008][ C0] ? show_regs+0x58/0x60 [ 199.272080][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 199.277020][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 199.282145][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 199.287354][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 199.292391][ C0] ? clockevents_program_event+0x236/0x300 [ 199.298185][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 199.304078][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 199.309052][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 199.314926][ C0] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 199.320565][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 199.326559][ C0] ? kvm_wait+0x147/0x180 [ 199.330721][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 199.336871][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 199.341749][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 199.347690][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 199.353896][ C0] ? debug_smp_processor_id+0x17/0x20 [ 199.359102][ C0] ? irqtime_account_irq+0xdc/0x3c0 [ 199.364140][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 199.368911][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 199.373947][ C0] ? free_fib_info_rcu+0x13c/0x180 [ 199.378979][ C0] sock_map_delete_elem+0x99/0x130 [ 199.383925][ C0] ? free_fib_info_rcu+0x13c/0x180 [ 199.389004][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x1a0 [ 199.394433][ C0] bpf_trace_run2+0xec/0x210 [ 199.398857][ C0] ? bpf_trace_run1+0x1c0/0x1c0 [ 199.403542][ C0] ? free_fib_info_rcu+0x13c/0x180 [ 199.408488][ C0] ? __alloc_reserved_percpu+0x30/0x30 [ 199.413869][ C0] ? __kasan_slab_free+0x11/0x20 [ 199.418643][ C0] ? free_fib_info_rcu+0x13c/0x180 [ 199.423593][ C0] __bpf_trace_kfree+0x6f/0x90 [ 199.428198][ C0] ? free_fib_info_rcu+0x13c/0x180 [ 199.433223][ C0] kfree+0x1f3/0x220 [ 199.436958][ C0] ? fib_nh_common_release+0x21c/0x250 [ 199.442340][ C0] ? free_fib_info+0x90/0x90 [ 199.446941][ C0] free_fib_info_rcu+0x13c/0x180 [ 199.451715][ C0] ? free_fib_info+0x90/0x90 [ 199.456138][ C0] rcu_do_batch+0x57a/0xc10 [ 199.460482][ C0] ? local_bh_enable+0x20/0x20 [ 199.465084][ C0] ? note_gp_changes+0x1e7/0x260 [ 199.469851][ C0] ? __run_timers+0x996/0xa10 [ 199.474373][ C0] rcu_core+0x517/0x1020 [ 199.478447][ C0] ? rcu_cpu_kthread_park+0x90/0x90 [ 199.483485][ C0] rcu_core_si+0x9/0x10 [ 199.487470][ C0] __do_softirq+0x26d/0x5bf [ 199.491833][ C0] __irq_exit_rcu+0x50/0xf0 [ 199.496166][ C0] irq_exit_rcu+0x9/0x10 [ 199.500228][ C0] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 199.505705][ C0] [ 199.508483][ C0] [ 199.511396][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 199.517191][ C0] RIP: 0010:free_unref_page_prepare+0x1de/0x7d0 [ 199.523266][ C0] Code: 89 df e8 c5 6a 05 00 48 8b 03 4c 89 f3 48 c1 eb 08 49 c1 ee 0b 41 83 e6 08 4e 8d 74 30 08 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 <74> 08 4c 89 f7 e8 98 6a 05 00 4d 8b 36 80 e3 3c 89 d9 49 d3 ee 41 [ 199.542800][ C0] RSP: 0018:ffffc900012d6fe0 EFLAGS: 00000246 [ 199.548689][ C0] RAX: 1ffff11000ffff90 RBX: 0000000000001145 RCX: 0000000000000000 [ 199.556498][ C0] RDX: 0000000000000200 RSI: 00000000000000ff RDI: ffffed10228b6800 [ 199.564400][ C0] RBP: ffffc900012d7050 R08: dffffc0000000000 R09: ffffed10228b6600 [ 199.572217][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 199.580021][ C0] R13: ffffea0004516cc0 R14: ffff888007fffc80 R15: 0000000000000000 [ 199.588017][ C0] ? _raw_spin_lock+0xc0/0x1b0 [ 199.592618][ C0] free_unref_page+0xe8/0x750 [ 199.597208][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 199.602862][ C0] ? mark_free_pages+0x3b0/0x3b0 [ 199.608057][ C0] ? free_vmap_area_noflush+0x5c0/0xa20 [ 199.613436][ C0] ? free_vmap_area_noflush+0x61a/0xa20 [ 199.618907][ C0] __free_pages+0x61/0xf0 [ 199.623184][ C0] __vunmap+0x7bc/0x8f0 [ 199.627166][ C0] ? __vmalloc_node_range+0x5a9/0x8d0 [ 199.632372][ C0] vfree+0x7f/0xb0 [ 199.635939][ C0] bpf_prog_calc_tag+0x69a/0x8f0 [ 199.640799][ C0] ? __bpf_prog_free+0xe0/0xe0 [ 199.645392][ C0] resolve_pseudo_ldimm64+0xe2/0x1240 [ 199.650597][ C0] ? check_attach_btf_id+0x40f/0xef0 [ 199.655836][ C0] ? bpf_check+0x12bf0/0x12bf0 [ 199.660624][ C0] ? check_attach_btf_id+0xef0/0xef0 [ 199.666010][ C0] ? bpf_check+0x2bb2/0x12bf0 [ 199.670524][ C0] bpf_check+0x3174/0x12bf0 [ 199.674869][ C0] ? irqentry_exit+0x30/0x40 [ 199.679371][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 199.685016][ C0] ? 0xffffffffa002c000 [ 199.689007][ C0] ? is_bpf_text_address+0x172/0x190 [ 199.694153][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 199.699087][ C0] ? __kernel_text_address+0x9b/0x110 [ 199.704284][ C0] ? unwind_get_return_address+0x4d/0x90 [ 199.709752][ C0] ? bpf_get_btf_vmlinux+0x60/0x60 [ 199.714877][ C0] ? arch_stack_walk+0xf3/0x140 [ 199.719561][ C0] ? stack_trace_save+0x113/0x1c0 [ 199.724419][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 199.729364][ C0] ? _raw_spin_lock+0xa4/0x1b0 [ 199.734129][ C0] ? __stack_depot_save+0x34/0x470 [ 199.739048][ C0] ? ____kasan_kmalloc+0xed/0x110 [ 199.743907][ C0] ? ____kasan_kmalloc+0xdb/0x110 [ 199.748766][ C0] ? __kasan_kmalloc+0x9/0x10 [ 199.753280][ C0] ? kmem_cache_alloc_trace+0x115/0x210 [ 199.758662][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 199.763959][ C0] ? security_bpf_prog_alloc+0x62/0x90 [ 199.769248][ C0] ? bpf_prog_load+0x9ee/0x1b50 [ 199.773947][ C0] ? __sys_bpf+0x4bc/0x760 [ 199.778368][ C0] ? __x64_sys_bpf+0x7c/0x90 [ 199.782801][ C0] ? do_syscall_64+0x3d/0xb0 [ 199.787227][ C0] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.793131][ C0] ? irqentry_exit+0x30/0x40 [ 199.797542][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 199.803185][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 199.809318][ C0] ? memset+0x35/0x40 [ 199.813132][ C0] ? bpf_obj_name_cpy+0x196/0x1e0 [ 199.817993][ C0] bpf_prog_load+0x12ac/0x1b50 [ 199.822593][ C0] ? map_freeze+0x370/0x370 [ 199.826932][ C0] ? selinux_bpf+0xcb/0x100 [ 199.831270][ C0] ? security_bpf+0x82/0xb0 [ 199.835606][ C0] __sys_bpf+0x4bc/0x760 [ 199.839737][ C0] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 199.844985][ C0] ? __kasan_check_read+0x11/0x20 [ 199.849938][ C0] __x64_sys_bpf+0x7c/0x90 [ 199.854183][ C0] do_syscall_64+0x3d/0xb0 [ 199.858435][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 199.864079][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.869803][ C0] RIP: 0033:0x7f9a7cbcdf69 [ 199.874100][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 199.893673][ C0] RSP: 002b:00007f9a7bf480c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.901919][ C0] RAX: ffffffffffffffda RBX: 00007f9a7cd04f80 RCX: 00007f9a7cbcdf69 [ 199.909728][ C0] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 199.917626][ C0] RBP: 00007f9a7cc2b6fe R08: 0000000000000000 R09: 0000000000000000 [ 199.925436][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 199.933250][ C0] R13: 000000000000000b R14: 00007f9a7cd04f80 R15: 00007ffd79868a98 [ 199.941067][ C0] [ 199.943959][ C0] Sending NMI from CPU 0 to CPUs 1: [ 199.948995][ C1] NMI backtrace for cpu 1 [ 199.949006][ C1] CPU: 1 PID: 3284 Comm: syz-executor.0 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 199.949026][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 199.949035][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 199.949057][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 199.949070][ C1] RSP: 0018:ffffc9000117f6c0 EFLAGS: 00000246 [ 199.949085][ C1] RAX: 0000000000000003 RBX: 1ffff9200022fedc RCX: ffffffff8154fa3f [ 199.949097][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888125c10928 [ 199.949109][ C1] RBP: ffffc9000117f770 R08: dffffc0000000000 R09: ffffed1024b82126 [ 199.949121][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 199.949133][ C1] R13: ffff888125c10928 R14: 0000000000000003 R15: 1ffff9200022fee0 [ 199.949145][ C1] FS: 00007f2f6c13c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 199.949160][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.949172][ C1] CR2: 00007f2f6cef5000 CR3: 0000000127907000 CR4: 00000000003506a0 [ 199.949187][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.949197][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 199.949207][ C1] Call Trace: [ 199.949213][ C1] [ 199.949220][ C1] ? show_regs+0x58/0x60 [ 199.949238][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 199.949259][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 199.949280][ C1] ? kvm_wait+0x147/0x180 [ 199.949295][ C1] ? kvm_wait+0x147/0x180 [ 199.949310][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 199.949329][ C1] ? nmi_handle+0xa8/0x280 [ 199.949346][ C1] ? kvm_wait+0x147/0x180 [ 199.949361][ C1] ? default_do_nmi+0x69/0x160 [ 199.949379][ C1] ? exc_nmi+0xaf/0x120 [ 199.949395][ C1] ? end_repeat_nmi+0x16/0x31 [ 199.949413][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 199.949434][ C1] ? kvm_wait+0x147/0x180 [ 199.949449][ C1] ? kvm_wait+0x147/0x180 [ 199.949464][ C1] ? kvm_wait+0x147/0x180 [ 199.949479][ C1] [ 199.949484][ C1] [ 199.949489][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 199.949506][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 199.949523][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 199.949543][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 199.949564][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 199.949586][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 199.949606][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 199.949625][ C1] ? __stack_depot_save+0x34/0x470 [ 199.949644][ C1] ? __kasan_slab_alloc+0x63/0xe0 [ 199.949663][ C1] sock_map_delete_elem+0x99/0x130 [ 199.949683][ C1] ? sock_map_unref+0x352/0x4d0 [ 199.949700][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x1a0 [ 199.949715][ C1] bpf_trace_run2+0xec/0x210 [ 199.949734][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 199.949752][ C1] ? sock_map_unref+0x352/0x4d0 [ 199.949770][ C1] ? sock_map_unref+0x352/0x4d0 [ 199.949788][ C1] __bpf_trace_kfree+0x6f/0x90 [ 199.949804][ C1] ? sock_map_unref+0x352/0x4d0 [ 199.949822][ C1] kfree+0x1f3/0x220 [ 199.949841][ C1] sock_map_unref+0x352/0x4d0 [ 199.949867][ C1] sock_map_delete_elem+0xc1/0x130 [ 199.949885][ C1] ? kvfree+0x35/0x40 [ 199.949901][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x1a0 [ 199.949914][ C1] bpf_trace_run2+0xec/0x210 [ 199.949933][ C1] ? bpf_trace_run1+0x1c0/0x1c0 [ 199.949950][ C1] ? kvfree+0x35/0x40 [ 199.949964][ C1] ? migrate_enable+0x1c1/0x2a0 [ 199.949983][ C1] ? kvfree+0x35/0x40 [ 199.949998][ C1] __bpf_trace_kfree+0x6f/0x90 [ 199.950014][ C1] ? kvfree+0x35/0x40 [ 199.950028][ C1] kfree+0x1f3/0x220 [ 199.950045][ C1] ? bpf_map_update_value+0x35c/0x3c0 [ 199.950062][ C1] kvfree+0x35/0x40 [ 199.950077][ C1] map_update_elem+0x653/0x770 [ 199.950095][ C1] __sys_bpf+0x405/0x760 [ 199.950111][ C1] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 199.950132][ C1] ? __kasan_check_read+0x11/0x20 [ 199.950151][ C1] __x64_sys_bpf+0x7c/0x90 [ 199.950167][ C1] do_syscall_64+0x3d/0xb0 [ 199.950183][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.950200][ C1] RIP: 0033:0x7f2f6cdc1f69 [ 199.950215][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 199.950227][ C1] RSP: 002b:00007f2f6c13c0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.950244][ C1] RAX: ffffffffffffffda RBX: 00007f2f6cef8f80 RCX: 00007f2f6cdc1f69 [ 199.950256][ C1] RDX: 0000000000000020 RSI: 00000000200004c0 RDI: 0000000000000002 [ 199.950266][ C1] RBP: 00007f2f6ce1f6fe R08: 0000000000000000 R09: 0000000000000000 [ 199.950277][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 199.950286][ C1] R13: 000000000000000b R14: 00007f2f6cef8f80 R15: 00007fffed437018 [ 199.950302][ C1]