last executing test programs: 3.516137232s ago: executing program 3 (id=1444): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1b, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000240), 0x12) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r3}, 0x10) getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x34, &(0x7f0000000040)=r6, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000d80)={r6, &(0x7f0000000380)="2570edcec94e470f39a9ab5cb2856f3b09d49a3b8ee65cb8af87668a93f1030c8fd0e0d0ccef795c8fd18aa257", 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x15, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 3.502145192s ago: executing program 3 (id=1445): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB, @ANYRES64=0x0], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}, 0x141, 0x0, 0x0, 0x9412282791e1baa6, 0x101, 0x6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x800c6613, &(0x7f0000000040)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x18, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000000000000000000000008500000017000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 3.397498906s ago: executing program 3 (id=1449): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[], &(0x7f0000000040)=""/247, 0x18, 0xf7, 0x1}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8995, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000ec5f39bb850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000001b80)=ANY=[]) 3.191862655s ago: executing program 3 (id=1450): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000940)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f2c0000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500020000000000950000000000000036bc58af49d36c96533036348183e35149847293250f091bfce2e67e7668253e8cbea1cb93eb8f305a68ce35087a0cba4ed9127147de75a4d2a74fe93b0c052f0d7019bf31f5263796cfca2c24905b2db14fb2e93b4da1c55953611277e0015da9e74a8c306a"], &(0x7f0000000000)='GPL\x00', 0x4, 0xf1, &(0x7f0000000440)=""/241}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x6, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 3.128094877s ago: executing program 3 (id=1453): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f2c0000000000000018100000", @ANYRES32=r0, @ANYRES16=r0, @ANYRES32=r0], &(0x7f0000000000)='GPL\x00', 0x4, 0xf1, &(0x7f0000000440)=""/241, 0x0, 0x6f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff34}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='9p_client_req\x00'}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0xd, &(0x7f0000000040)=r5, 0x3b) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x62, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa007346111", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000140)="b9ff03076804268cb89e14f088a847e0ffff20000000000000007f141416ac1414", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x18, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1f00}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c764360000000100", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_int(r6, &(0x7f0000000200), 0x42400) write$cgroup_pid(r6, &(0x7f0000000040), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000002000000000000000720c000085000000b2000000852000000200000018220000", @ANYRES32=r0, @ANYBLOB="0000d500010100009500000000230000"], &(0x7f0000000180)='GPL\x00', 0x77e, 0xb9, &(0x7f00000002c0)=""/185, 0x41000, 0x1, '\x00', r2, 0x0, r5, 0x8, &(0x7f00000003c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x1, 0x10, 0x1000, 0x884}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000540)=[r6, r0, r0, r0, r0], &(0x7f0000000580)=[{0x4, 0x3, 0xc, 0x6}, {0x8000, 0x3, 0x10, 0x5}]}, 0x90) 3.127949627s ago: executing program 3 (id=1454): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x11, 0x4, 0x4, 0x3}, 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0xd004e000, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000240), 0x20000000, 0x2}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002f000000620a00ff000000007500000000000000950000000000000018100000e9b922ff749b9c60138fd7b6cb11febea519ea4a8ad3b45b261ab737d9609755a4ce18d1a1d09d40beaacba9d649e16ae951134d373f8ff03a1169f5ac", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 2.172864364s ago: executing program 1 (id=1462): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x3, 0x10, &(0x7f0000000000)) 2.092597318s ago: executing program 1 (id=1464): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x40047440, 0x327abfb181a5388f) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xd5) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76, 0x0, 0xffffffffffffffff, 0xffffff33}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000540)=0x4000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xa4, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x1e}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000e7ff0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.025518091s ago: executing program 0 (id=1465): bpf$ITER_CREATE(0x21, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000480)=r0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001980)=ANY=[@ANYBLOB="1800000000000008000000000000000061102000000000009500000000000000edc60efa8fb07ee3aa86aa0ac85a240a50fd81cc0000353b1c40989996bf0a366b078c09ee51e467a909e8c6bc"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) close(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000001a00)=""/122}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4814) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.813915239s ago: executing program 0 (id=1470): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0xb69b, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="d153b7edc47487731960cb175e334207dd201835ff375adeac141061bcc2c8e4710a70de331a66fad994fed060a4b38859685a4010385b", @ANYRES8=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x8, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000004c0)='tlb_flush\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), 0x0}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000600)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8001}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x800c6613, 0xfffffffffffffffe) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfc2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x48) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r9, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r6, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)='%ps \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000a40000400000000000080000184a0000ffffffff000000000000000018400000fdffffff000000000010000018160000", @ANYRES32, @ANYBLOB="000000000000000085200000040000009500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xd, 0x7, 0x8001}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000007c0)=[r2, r9, r2, r10], &(0x7f00000008c0)=[{0x3, 0x2, 0xe, 0x2}, {0x4, 0x1, 0x9, 0x2}, {0x5, 0x5, 0x0, 0x8}, {0x2, 0x3, 0x8, 0x8}, {0x2, 0x20002, 0x9, 0x5}, {0x3, 0x1, 0x3, 0x1}, {0x2, 0x5, 0x3, 0xc}, {0x0, 0x3, 0x7, 0xa}], 0x10, 0xd6f}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r8}, &(0x7f0000000800), &(0x7f0000000840)=r11}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000300000000000000000000030000000003000000020000000000000000000000000000010500000010000000010000000000000c00000000005f"], 0x0, 0x4f}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) 1.813112009s ago: executing program 1 (id=1472): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x34100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffd2a) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 1.51333669s ago: executing program 0 (id=1476): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000600), &(0x7f0000000640)=r1}, 0x1c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000b00)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800020}, 0xffffffffffffff45) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x22, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="1804000000004000000000000000ee00001801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="e6", 0x1}], 0x1}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r8, 0x4) sendmsg$unix(r6, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000540)="8b", 0x1}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) close(r7) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000017c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'ipvlan1\x00', 0x3131}) ioctl$TUNSETNOCSUM(r5, 0x8923, 0x20000000) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000140)=[{0x30, 0x4}, {0x6, 0xff}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x20ce, 0x3ff, 0x10001, 0x1c00, 0x1, 0x8, '\x00', r0, 0xffffffffffffffff, 0x4, 0x5, 0x5, 0x5}, 0x48) 1.5124908s ago: executing program 2 (id=1477): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000940)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f2c0000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500020000000000950000000000000036bc58af49d36c96533036348183e35149847293250f091bfce2e67e7668253e8cbea1cb93eb8f305a68ce35087a0cba4ed9127147de75a4d2a74fe93b0c052f0d7019bf31f5263796cfca2c24905b2db14fb2e93b4da1c55953611277e0015da9e74a8c306a"], &(0x7f0000000000)='GPL\x00', 0x4, 0xf1, &(0x7f0000000440)=""/241}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x8, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 1.345282277s ago: executing program 2 (id=1480): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x401, 0x7, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000640)}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) socketpair(0x6, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.26019688s ago: executing program 2 (id=1481): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x57}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a21", 0xf}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007f"], 0xfdef) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff}, 0xc) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$tipc(r6, &(0x7f00000027c0)={&(0x7f0000000100)=@name, 0x10, 0x0, 0x5f434b9043865884}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='devices.list\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0c0583b, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) close(r0) 801.975528ms ago: executing program 2 (id=1483): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000022c0)={r0, 0x0, 0xcd, 0x47, &(0x7f0000002400)="870edc1befa5357f036e3d10c6a0cf0531d7e9f2ac75792abd424af8fc846e9c17efed8507d02f456046d6247049a7b7f9adb704906f2004057e0a518636574a462be9196ecd95edc2068f8e609349a8df333097884db46f527de7145b711feec3e738bede6f0158d09a0eaf0e30288c08a5419b7f567b6c9eea82c216f36e866108f3b2ce7b9e9c9cf9d4e2ff35832acda19a0465c8cffcd746c983dff5e30ecf6737ec80d8f9e9f74dc5c43fbbb03548c6b6b77bc013e82bc4ff1afe2f1ece7763d21f23ed167f9b69fb51cd", &(0x7f0000001200)=""/71, 0xffe, 0x0, 0xc, 0x1000, &(0x7f00000001c0)="769395f1b5ffaf95d4c11481", &(0x7f00000012c0)="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", 0x2, 0x0, 0xfd}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000002}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@const={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x2}, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, &(0x7f0000000340)=""/4083, 0x3e, 0xff3, 0xfffffffe}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000080000000000000001000084060000000000000001"], 0x0, 0x42}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x11, &(0x7f0000002340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x4a82ad3e0289b622}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[], 0x6) 801.038358ms ago: executing program 1 (id=1484): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='ext4_request_blocks\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_insert_delayed_block\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/787], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x1f2f, 0xf, 0x2f, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r5, 0x0, 0x20000000}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2009) 800.794578ms ago: executing program 4 (id=1485): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair(0x10, 0x3, 0x10, &(0x7f0000000000)) 726.964441ms ago: executing program 4 (id=1486): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x9}, 0x0, 0x20000000000000, r0, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x4, 0x4e, &(0x7f0000000200)=""/78, 0x40f00, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000d00)=[0xffffffffffffffff, r3, r3], &(0x7f0000000d40), 0x10, 0x8000}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x0, 0x1, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001340)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 631.538255ms ago: executing program 0 (id=1487): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffc61) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xfffffe59) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x13, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013600000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc7, &(0x7f0000000340)=""/199, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000001fc0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) 440.052442ms ago: executing program 4 (id=1488): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x9, &(0x7f0000000240)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7a, 0x3, 0xff60}, [@call={0x5d, 0x0, 0x0, 0x1000000}, @exit, @map_fd={0x18, 0x0, 0x1, 0xa}, @jmp, @alu={0x4, 0x1, 0x5, 0x3, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f0000000140)='GPL\x00', 0x2, 0x95, &(0x7f0000000180)=""/149}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x3e}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x10}]}}, 0x0, 0x26}, 0x20) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0xffffffffffffff29) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@ldst={0x4, 0x0, 0x4}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, r1, 0x3, 0x3, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x838, 0x100, 0x508, r2, 0x1, '\x00', 0x0, r1, 0x5, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x1d}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 439.627802ms ago: executing program 2 (id=1489): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{}, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x0, 0x4, 0x0, 0x3, 0x0, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f00000004c0)=ANY=[@ANYRES64], &(0x7f0000000000)='GPL\x00', 0x80000010, 0x0, 0x0, 0x0, 0x5b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xcc0, 0xfffffffffffffde6, &(0x7f00000001c0)="348b0d151f8218e3c73697e4080049c416b90900000093291cfc5e8b99005e8b9900", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) close(0xffffffffffffffff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="561a00000000000061110c00000000001800000000000000040000e40c7893b3e1d4c88d10c80b77"], &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) unlink(&(0x7f0000000140)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x48, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080, 0x0, 0x0, 0x3, 0x0, 0xffff, 0x100, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_merged\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xb, 0x39, &(0x7f0000000000)=ANY=[@ANYBLOB="9bb29f740000000005008000ffff"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x90) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000a) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x4, 0x200}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000e40000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='ext4_writepages\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 415.290323ms ago: executing program 4 (id=1490): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)='%pi6 \x00'}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@bloom_filter={0x1e, 0x427ecc5e, 0x7, 0x0, 0x1000, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x53, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f0000000440), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xee, 0xee, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x2, [{0x4, 0x1, 0x5a7}], "1b8b"}, @struct={0x7, 0x8, 0x0, 0x4, 0x0, 0x7, [{0xc, 0x1, 0x60}, {0xf, 0x5, 0x18000000}, {0x10, 0x5, 0x7}, {0x10, 0x0, 0x3}, {0xb, 0x5, 0x7fffffff}, {0x3, 0x5, 0x3800000}, {0x9, 0x1, 0x6}, {0x7, 0x5, 0x2}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xd, 0x3}, {0xf}, {0xb}, {0x2, 0x5}]}, @restrict={0x8}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @ptr={0x10, 0x0, 0x0, 0x2, 0x1}, @fwd={0x4}, @typedef={0xd, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x5f, 0x30, 0x61, 0x30, 0xb212a83fbd1f4aa9, 0x2e, 0x61]}}, &(0x7f0000000680)=""/14, 0x111, 0xe, 0x0, 0x100}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x20, &(0x7f0000000cc0)={&(0x7f0000000b40)=""/196, 0xc4, 0x0, &(0x7f0000000c40)=""/125, 0x7d}}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x1d, &(0x7f0000000d40)=@raw=[@alu={0x4, 0x1, 0xc, 0x4, 0x4, 0x1, 0x4}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @jmp={0x5, 0x1, 0xa, 0x4, 0x4, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff01}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f0000000e40)='GPL\x00', 0x9, 0x1000, &(0x7f0000001800)=""/4096, 0x40f00, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x3, 0x6, 0x7ff, 0x4}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000f00)=[0x1, r4, 0xffffffffffffffff, r4], &(0x7f0000000f40)=[{0x4, 0x1, 0xc, 0xb}, {0x3, 0x5, 0x9, 0x4}, {0x3, 0x1, 0x7, 0xb}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0xc, 0x10, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x1, 0x0, 0xa, 0x4, 0xfffffffffffffff4, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, &(0x7f0000000200), 0x40f00, 0x20, '\x00', r5, 0x15, r6, 0x8, &(0x7f0000000940)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x3, 0x7fff, 0x6}, 0x10, r7, r8, 0x8, 0x0, &(0x7f0000001040)=[{0x5, 0x1, 0x0, 0xc}, {0x1, 0x4, 0xa, 0xc}, {0x3, 0x2, 0x6, 0x1}, {0x5, 0x4, 0x7, 0x3}, {0x1, 0x1, 0x0, 0x8}, {0x3, 0x1, 0x10, 0xd}, {0x0, 0x1, 0x10, 0xc}, {0x2, 0x3, 0xe, 0x7}], 0x10, 0xa93}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x20, &(0x7f0000000680)={&(0x7f0000000500)=""/104, 0x68, 0x0, &(0x7f0000000580)=""/243, 0xf3}}, 0x10) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@generic={&(0x7f0000000700)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@o_path={&(0x7f00000007c0)='./file0\x00', 0x0, 0x18, r1}, 0x18) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5dcc, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x1}, 0x48) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r14, 0x40086602, &(0x7f0000000040)) r15 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x0, 0x17, &(0x7f0000000a40)=ANY=[@ANYRES32=r15, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc09000000000000b6090100000000006500000000000000180100002020702500000000002020207b9af8ff00000000cd9100000000000037010000f8ffffffb702000008000000b70300000000000004000000060000003f93000000000000b5030000000000008500000076000000b7000000000000009500000000000000f9831b41"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r16 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)=@generic={&(0x7f00000008c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x8, 0x1e, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3f}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_val={0x18, 0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}, @alu={0x7, 0x0, 0xa, 0x6, 0x2, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffff6d3, 0x0, 0x0, 0x0, 0xef5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000200)='GPL\x00', 0x95, 0xd8, &(0x7f00000003c0)=""/216, 0x40f00, 0x30, '\x00', r5, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0xc, 0x7, 0x5}, 0x10, r9, 0xffffffffffffffff, 0x8, &(0x7f0000000940)=[r10, r11, r12, r0, r13, r14, r15, r16], &(0x7f0000000980)=[{0x1, 0x2, 0x0, 0x1}, {0x0, 0x3, 0x9, 0x9}, {0x4, 0x4, 0x7, 0x2}, {0x4, 0x5, 0x9, 0xa}, {0x4, 0x3, 0x8, 0x1}, {0x2, 0x3, 0xb, 0x2}, {0x3, 0x4, 0xa, 0x7}, {0x4, 0x4, 0x6}], 0x10, 0xfffffffa}, 0x90) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT], 0x31) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x7, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x10, 0x4}, @volatile={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, 0x0, 0x53}, 0x20) 333.694157ms ago: executing program 4 (id=1491): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000940)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="000000000000001f2c0000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500020000000000950000000000000036bc58af49d36c96533036348183e35149847293250f091bfce2e67e7668253e8cbea1cb93eb8f305a68ce35087a0cba4ed9127147de75a4d2a74fe93b0c052f0d7019bf31f5263796cfca2c24905b2db14fb2e93b4da1c55953611277e0015da9e74a8c306a"], &(0x7f0000000000)='GPL\x00', 0x4, 0xf1, &(0x7f0000000440)=""/241}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x9, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 234.654411ms ago: executing program 1 (id=1492): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x9, 0x401, 0x7, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000640)}, 0x1c) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000640)}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00'}) socketpair(0x6, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) (async) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 234.133281ms ago: executing program 0 (id=1493): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], 0x0, 0xc6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xc8, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x6, [@func={0x8, 0x0, 0x0, 0xc, 0x3}, @restrict={0x2, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0x6, 0x1}]}, @func={0x2, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x30, 0x30, 0x5f, 0x0]}}, &(0x7f0000000540)=""/168, 0x5e, 0xa8, 0x0, 0x5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0xd, &(0x7f0000000800)=ANY=[@ANYBLOB="186600000100000002000000800000001800000002000000000000000200000018110000c60b3c773a9a0a5202267207cc023c89e13c30f5b10bc8b4e9112df0ae9b3195294418c6898ee7269d46ccb8b36d578120e0f135cc96353d9f5c70666c", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f0000000140)='GPL\x00', 0x6, 0x0, 0xfffffffffffffffc, 0x0, 0x4f, '\x00', r1, 0x25, r2, 0x8, &(0x7f0000000640)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0xd, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f00000006c0)=[{0x4, 0x3, 0x3, 0x7}, {0x2, 0x5, 0x88fd, 0x7}, {0x0, 0x1, 0x8, 0xb}, {0x0, 0x3, 0xe, 0xb}, {0x5, 0x5, 0x7, 0x9}, {0x3, 0x4, 0x10}, {0x5, 0x2, 0xc}, {0x1, 0x4, 0x0, 0x3edb735722ae345f}], 0x10, 0x5}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4c}, [@generic={0x5, 0x4, 0xe, 0x6, 0x10001}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10, 0xffffffffffffffff, r3}, 0x90) 187.850912ms ago: executing program 4 (id=1494): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x34100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_freezer_state(r1, &(0x7f0000000140)='FREEZING\x00', 0x9) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffd2a) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu&\t\t') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 184.865972ms ago: executing program 0 (id=1495): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb010018000000000000005c0000005c00000002000000000000000200000408000000000000000200000000000000000000000300000000000000000000000400000d000000000c000000030000000a0000000100000008000000010000000c000000040000000000000000000004"], 0x0, 0x76}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r4, &(0x7f0000000880)="00e7", &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r3], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r5}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNSETNOCSUM(r0, 0x8923, 0x10000001) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002900000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000640)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x0, 0x2, 0x95, &(0x7f0000000180)=""/149, 0x0, 0x20}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0}}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="11030300ffff"], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0x7, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffd3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x1) write$cgroup_type(r1, &(0x7f0000000140), 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000200"/32], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0xf}, 0x90) 141.951534ms ago: executing program 2 (id=1496): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair(0x10, 0x3, 0x10, &(0x7f0000000000)) 0s ago: executing program 1 (id=1497): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='GPL\x00'}, 0xfffffffffffffc74) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x14, 0x0, 0x0, &(0x7f0000000700)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r1}, &(0x7f00000005c0)=0x3, &(0x7f0000000600)}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000d80)={0xffffffffffffffff, &(0x7f0000000bc0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x11, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x5, 0x0, 0x3}}, [@map_val={0x18, 0x4}], {{0x7, 0x1, 0xc, 0x9, 0x4}, {0x6, 0x0, 0x5, 0x8}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x5, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4, 0x1, 0xb, 0x9, 0x0, 0x0, 0xc}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'rose0\x00', @broadcast}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c250000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r3}, &(0x7f0000000080), &(0x7f0000000200)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYRES64=r0, @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r5}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.200' (ED25519) to the list of known hosts. [ 21.460243][ T23] audit: type=1400 audit(1719787552.970:66): avc: denied { mounton } for pid=341 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.462099][ T341] cgroup1: Unknown subsys name 'net' [ 21.482785][ T23] audit: type=1400 audit(1719787552.980:67): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.488004][ T341] cgroup1: Unknown subsys name 'net_prio' [ 21.510434][ T23] audit: type=1400 audit(1719787553.030:68): avc: denied { read } for pid=144 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 21.515649][ T341] cgroup1: Unknown subsys name 'devices' [ 21.544215][ T23] audit: type=1400 audit(1719787553.060:69): avc: denied { unmount } for pid=341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.713126][ T341] cgroup1: Unknown subsys name 'hugetlb' [ 21.718748][ T341] cgroup1: Unknown subsys name 'rlimit' [ 21.944672][ T23] audit: type=1400 audit(1719787553.460:70): avc: denied { setattr } for pid=341 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.967740][ T23] audit: type=1400 audit(1719787553.460:71): avc: denied { mounton } for pid=341 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.992424][ T23] audit: type=1400 audit(1719787553.460:72): avc: denied { mount } for pid=341 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.999888][ T344] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.024117][ T23] audit: type=1400 audit(1719787553.550:73): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.049466][ T23] audit: type=1400 audit(1719787553.550:74): avc: denied { write } for pid=344 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.078384][ T23] audit: type=1400 audit(1719787553.600:75): avc: denied { read } for pid=341 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.111012][ T341] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.363112][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.369954][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.377572][ T351] device bridge_slave_0 entered promiscuous mode [ 22.385753][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.392620][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.399926][ T351] device bridge_slave_1 entered promiscuous mode [ 22.488786][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.495660][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.503102][ T353] device bridge_slave_0 entered promiscuous mode [ 22.518216][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.525060][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.532451][ T353] device bridge_slave_1 entered promiscuous mode [ 22.591826][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.599306][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.606651][ T352] device bridge_slave_0 entered promiscuous mode [ 22.617335][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.624189][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.631511][ T352] device bridge_slave_1 entered promiscuous mode [ 22.640401][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.647227][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.654782][ T355] device bridge_slave_0 entered promiscuous mode [ 22.665002][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.671838][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.679147][ T355] device bridge_slave_1 entered promiscuous mode [ 22.721951][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.728782][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.736268][ T354] device bridge_slave_0 entered promiscuous mode [ 22.746425][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.753284][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.760624][ T354] device bridge_slave_1 entered promiscuous mode [ 22.893333][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.900271][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.907393][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.914168][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.929342][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.936364][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.943476][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.950243][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.991536][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.998629][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.005767][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.012671][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.024685][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.031611][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.038724][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.045510][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.096299][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.103150][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.110291][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.117017][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.128768][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.135940][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.142929][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.149873][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.157413][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.164770][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.171896][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.178852][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.185958][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.193137][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.200067][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.221114][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.229260][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.236101][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.243337][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.251692][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.258504][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.265860][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.273737][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.290377][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.297661][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.324112][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.332083][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.338890][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.346702][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.354682][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.361517][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.380260][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.387548][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.408701][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.416174][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.424208][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.432906][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.440762][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.448718][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.456640][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.464866][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.472860][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.479695][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.486913][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.495112][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.503126][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.509935][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.530302][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.538524][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.547161][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.555127][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.563081][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.570391][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.577657][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.585870][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.593891][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.600724][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.608056][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.616454][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.624928][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.631784][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.656546][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.664710][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.672865][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.679674][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.688743][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.696934][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.704943][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.711767][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.718941][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.727066][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.734957][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.750198][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.758183][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.766272][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.774321][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.782492][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.790637][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.827103][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.835396][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.847811][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.856351][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.864215][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.872159][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.879937][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.888014][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.895839][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.924135][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.932314][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.941230][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.949341][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.957348][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.965471][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.973636][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.981921][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.989889][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.998281][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.006420][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.038124][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.047116][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.057311][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.110611][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.118424][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.127573][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.136687][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.145080][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.153404][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.164340][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.172674][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.210583][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.218622][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.227974][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.265781][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.274415][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.283925][ T388] [ 24.284996][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.286188][ T388] ********************************************************** [ 24.296839][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.310089][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.323090][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.332464][ T388] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 24.340856][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.344682][ T388] ** ** [ 24.356276][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.367395][ T381] cgroup: syz.2.3 (381) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.368867][ T388] ** trace_printk() being used. Allocating extra memory. ** [ 24.385121][ T381] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 24.419515][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.420676][ T388] ** ** [ 24.435621][ T388] ** This means that this is a DEBUG kernel and it is ** [ 24.443329][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.477705][ T388] ** unsafe for production use. ** [ 24.494368][ T388] ** ** [ 24.502727][ T388] ** If you see this message and you are not debugging ** [ 24.504139][ T381] syz.2.3 (381) used greatest stack depth: 20792 bytes left [ 24.518034][ T388] ** the kernel, report this immediately to your vendor! ** [ 24.525257][ T388] ** ** [ 24.533071][ T388] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 24.541622][ T388] ********************************************************** [ 24.821668][ C0] hrtimer: interrupt took 13603 ns [ 24.882246][ T424] device syzkaller0 entered promiscuous mode [ 24.894716][ T424] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 26.581882][ T23] kauditd_printk_skb: 37 callbacks suppressed [ 26.581893][ T23] audit: type=1400 audit(1719787558.090:113): avc: denied { create } for pid=518 comm="syz.4.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 26.622363][ T519] device syzkaller0 entered promiscuous mode [ 26.751731][ T23] audit: type=1400 audit(1719787558.270:114): avc: denied { create } for pid=536 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 27.276297][ T23] audit: type=1400 audit(1719787558.790:115): avc: denied { append } for pid=553 comm="syz.3.69" name="ppp" dev="devtmpfs" ino=9857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.428549][ T568] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 40704 (only 8 groups) [ 27.777800][ T579] device syzkaller0 entered promiscuous mode [ 27.812995][ T23] audit: type=1400 audit(1719787559.320:116): avc: denied { relabelfrom } for pid=578 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.865512][ T23] audit: type=1400 audit(1719787559.320:117): avc: denied { relabelto } for pid=578 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.033086][ T23] audit: type=1400 audit(1719787559.520:118): avc: denied { attach_queue } for pid=596 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.769983][ T669] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 30.230351][ T23] audit: type=1400 audit(1719787561.740:119): avc: denied { create } for pid=695 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 30.572357][ T23] audit: type=1400 audit(1719787562.090:120): avc: denied { create } for pid=712 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 30.680030][ T23] audit: type=1400 audit(1719787562.190:121): avc: denied { sys_admin } for pid=714 comm="syz.0.133" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 31.150080][ T23] audit: type=1400 audit(1719787562.660:122): avc: denied { create } for pid=741 comm="syz.2.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 31.293856][ T744] device syzkaller0 entered promiscuous mode [ 31.577084][ T767] device syzkaller0 entered promiscuous mode [ 31.788364][ T769] device syzkaller0 entered promiscuous mode [ 32.367936][ T797] device syzkaller0 entered promiscuous mode [ 32.573041][ T23] audit: type=1400 audit(1719787564.090:123): avc: denied { create } for pid=814 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 32.630351][ T23] audit: type=1400 audit(1719787564.110:124): avc: denied { create } for pid=814 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 35.056505][ T890] bridge0: port 3(erspan0) entered blocking state [ 35.154748][ T890] bridge0: port 3(erspan0) entered disabled state [ 35.249959][ T890] device erspan0 entered promiscuous mode [ 35.257579][ T890] bridge0: port 3(erspan0) entered blocking state [ 35.263848][ T890] bridge0: port 3(erspan0) entered forwarding state [ 35.537142][ T903] device syzkaller0 entered promiscuous mode [ 35.573445][ T23] audit: type=1400 audit(1719787567.090:125): avc: denied { create } for pid=906 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 35.670778][ T23] audit: type=1400 audit(1719787567.190:126): avc: denied { create } for pid=923 comm="syz.4.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 35.919423][ T938] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.943010][ T938] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.949852][ T938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.819150][ T972] syz.1.227[972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.819268][ T972] syz.1.227[972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.835901][ T23] audit: type=1400 audit(1719787568.350:127): avc: denied { create } for pid=973 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 37.072034][ T994] syz.4.235[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.072091][ T994] syz.4.235[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.123305][ T994] syz.4.235[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.572267][ T994] syz.4.235[994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.727583][ T998] device syzkaller0 entered promiscuous mode [ 38.567202][ T1036] device pim6reg1 entered promiscuous mode [ 40.845034][ T1126] device pim6reg1 entered promiscuous mode [ 41.100365][ T23] audit: type=1400 audit(1719787572.610:128): avc: denied { write } for pid=1137 comm="syz.1.291" name="ppp" dev="devtmpfs" ino=9857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 41.662469][ T1168] device pim6reg1 entered promiscuous mode [ 41.997358][ T1194] device syzkaller0 entered promiscuous mode [ 42.387489][ T1211] device syzkaller0 entered promiscuous mode [ 42.535488][ T23] audit: type=1400 audit(1719787574.050:129): avc: denied { create } for pid=1199 comm="syz.2.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 43.545065][ T1251] bridge0: port 3(veth0_to_batadv) entered blocking state [ 43.561951][ T1251] bridge0: port 3(veth0_to_batadv) entered disabled state [ 43.576501][ T1257] sock: process `syz.0.333' is using obsolete setsockopt SO_BSDCOMPAT [ 43.606897][ T1251] device veth0_to_batadv entered promiscuous mode [ 43.645849][ T1251] bridge0: port 3(veth0_to_batadv) entered blocking state [ 43.652820][ T1251] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 43.925419][ T1263] 7Ս֕: renamed from syzkaller0 [ 44.697906][ T1304] bridge0: port 3(erspan0) entered blocking state [ 44.707133][ T1301] syz.4.350[1301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.707236][ T1301] syz.4.350[1301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.710800][ T1304] bridge0: port 3(erspan0) entered disabled state [ 44.754371][ T1304] device erspan0 entered promiscuous mode [ 44.763910][ T1304] bridge0: port 3(erspan0) entered blocking state [ 44.770230][ T1304] bridge0: port 3(erspan0) entered forwarding state [ 45.147931][ T23] audit: type=1400 audit(1719787576.660:130): avc: denied { ioctl } for pid=1336 comm="syz.1.363" path="uts:[4026532530]" dev="nsfs" ino=4026532530 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.843106][ T1366] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.850221][ T1366] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.892407][ T1375] bridge0: port 4(syz_tun) entered blocking state [ 45.898967][ T1375] bridge0: port 4(syz_tun) entered disabled state [ 45.940918][ T1375] device syz_tun entered promiscuous mode [ 45.946993][ T1375] bridge0: port 4(syz_tun) entered blocking state [ 45.953269][ T1375] bridge0: port 4(syz_tun) entered forwarding state [ 45.966421][ T1380] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.973299][ T1380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.980501][ T1380] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.987331][ T1380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.044777][ T1380] device bridge0 entered promiscuous mode [ 46.151015][ T1391] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 46.175068][ T1390] device syzkaller0 entered promiscuous mode [ 46.293487][ T1397] device syzkaller0 entered promiscuous mode [ 47.051711][ T1436] device wg2 entered promiscuous mode [ 47.057025][ T1436] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 47.566471][ T1462] device syzkaller0 entered promiscuous mode [ 48.633496][ T23] audit: type=1400 audit(1719787580.130:131): avc: denied { write } for pid=1513 comm="syz.2.432" name="cgroup.subtree_control" dev="cgroup2" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 48.887585][ T23] audit: type=1400 audit(1719787580.150:132): avc: denied { create } for pid=1511 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 48.958314][ T23] audit: type=1400 audit(1719787580.190:133): avc: denied { open } for pid=1513 comm="syz.2.432" path="" dev="cgroup2" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.255594][ T1545] syzkaller0: activation failed [ 49.270872][ T1545] device syzkaller0 entered promiscuous mode [ 50.316674][ T1584] device syzkaller0 entered promiscuous mode [ 50.359091][ T1581] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 50.936320][ T1605] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 52.394575][ T23] audit: type=1400 audit(1719787583.910:134): avc: denied { create } for pid=1666 comm="syz.3.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 53.411717][ T1716] device pim6reg1 entered promiscuous mode [ 55.803133][ T1384] syz.4.382 (1384) used greatest stack depth: 19576 bytes left [ 56.822150][ T1833] device pim6reg1 entered promiscuous mode [ 59.086007][ T1906] device syzkaller0 entered promiscuous mode [ 59.531126][ T1923] syz.4.570[1923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.531227][ T1923] syz.4.570[1923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.976830][ T1938] device syzkaller0 entered promiscuous mode [ 60.048087][ T23] audit: type=1400 audit(1719787591.520:135): avc: denied { create } for pid=1940 comm="syz.4.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 60.154932][ T23] audit: type=1400 audit(1719787591.520:136): avc: denied { create } for pid=1940 comm="syz.4.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 60.245233][ T23] audit: type=1400 audit(1719787591.740:137): avc: denied { create } for pid=1947 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 60.470439][ T1959] syz.1.584[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.471397][ T1959] syz.1.584[1959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.528659][ T1964] syz.1.584[1964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.832964][ T1964] syz.1.584[1964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.297722][ T1976] cgroup: fork rejected by pids controller in /syz3 [ 61.946758][ T2016] bridge0: port 3(veth0_to_batadv) entered disabled state [ 61.954007][ T2016] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.961053][ T2016] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.974063][ T2016] bridge0: port 3(veth0_to_batadv) entered blocking state [ 61.981153][ T2016] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 61.988341][ T2016] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.995128][ T2016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.002244][ T2016] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.009087][ T2016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.020470][ T2016] device bridge0 entered promiscuous mode [ 62.209635][ T2008] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.230486][ T2008] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.267247][ T2008] device bridge_slave_0 entered promiscuous mode [ 62.323141][ T2008] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.332438][ T2008] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.358109][ T2008] device bridge_slave_1 entered promiscuous mode [ 62.680997][ T2043] cgroup: fork rejected by pids controller in /syz1 [ 62.688356][ T2008] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.695247][ T2008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.702368][ T2008] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.709204][ T2008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.790928][ T535] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.800891][ T535] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.824392][ T9] device bridge_slave_1 left promiscuous mode [ 62.831802][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.852293][ T9] device bridge_slave_0 left promiscuous mode [ 62.868485][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.165555][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.175435][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.204992][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.215696][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.224059][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.230920][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.239077][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.247441][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.256613][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.263498][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.285944][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.296057][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.317567][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.331390][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.374002][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 63.392836][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.498129][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 63.510860][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.560863][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 63.578021][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.658916][ T2161] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.684563][ T2161] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.695107][ T2161] device bridge_slave_0 entered promiscuous mode [ 63.777111][ T2161] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.800770][ T2161] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.819768][ T2161] device bridge_slave_1 entered promiscuous mode [ 63.828167][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 63.840262][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.858740][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 63.870862][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.969810][ T2182] cgroup: fork rejected by pids controller in /syz4 [ 64.233465][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.244192][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.340637][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.358970][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.387967][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.394851][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.403008][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.411338][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.419486][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.426351][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.442272][ T9] bridge0: port 3(erspan0) entered disabled state [ 64.457168][ T9] device erspan0 left promiscuous mode [ 64.463625][ T9] bridge0: port 3(erspan0) entered disabled state [ 64.654586][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.664450][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.679102][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.699530][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 65.058675][ T2216] device syzkaller0 entered promiscuous mode [ 65.101060][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 65.108953][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.185706][ T2219] device syzkaller0 left promiscuous mode [ 65.286627][ T9] device bridge_slave_1 left promiscuous mode [ 65.294598][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.302655][ T9] device bridge_slave_0 left promiscuous mode [ 65.313645][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.468989][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 65.477229][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.600372][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.619090][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.627510][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.636305][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.748544][ T2213] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.760964][ T2213] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.771241][ T2213] device bridge_slave_0 entered promiscuous mode [ 65.787897][ T2213] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.795113][ T2213] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.802768][ T2213] device bridge_slave_1 entered promiscuous mode [ 66.196378][ T2239] cgroup: fork rejected by pids controller in /syz0 [ 66.264244][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.276582][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.313263][ T107] cfg80211: failed to load regulatory.db [ 66.441073][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.449366][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.486438][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.493323][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.537871][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.563865][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.601414][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.608262][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.637639][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.645770][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.653778][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.680461][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.689012][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.731969][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.751996][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.804106][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.869387][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.903870][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 66.912157][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.197872][ T23] audit: type=1400 audit(1719787598.710:138): avc: denied { create } for pid=2379 comm="syz.1.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 67.473156][ T2384] ip6_tunnel: non-ECT from db5b:6861:58bb:cfc8:875a:6596:9ff5:7b00 with DS=0x31 [ 67.531492][ T2391] device syzkaller0 entered promiscuous mode [ 67.629050][ T2362] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.643234][ T2362] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.655789][ T2362] device bridge_slave_0 entered promiscuous mode [ 67.663230][ T9] device veth0_to_batadv left promiscuous mode [ 67.671015][ T9] bridge0: port 3(veth0_to_batadv) entered disabled state [ 67.682083][ T9] device bridge_slave_1 left promiscuous mode [ 67.688211][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.703808][ T9] device bridge_slave_0 left promiscuous mode [ 67.710426][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.826344][ T2362] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.833685][ T2362] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.841157][ T2362] device bridge_slave_1 entered promiscuous mode [ 68.163860][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 68.171691][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 68.204993][ T2438] device wg2 left promiscuous mode [ 68.217497][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 68.226934][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 68.235326][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.242191][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.250318][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 68.258921][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.267095][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.273976][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.289987][ T2438] device wg2 entered promiscuous mode [ 68.301690][ T2438] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 68.313800][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.337814][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.346465][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.355129][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.363379][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.490183][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.498428][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.512741][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.521487][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.561215][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.569426][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.683830][ T2454] device syzkaller0 entered promiscuous mode [ 68.704544][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.713730][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.722615][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.731477][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.783364][ T23] audit: type=1400 audit(1719787600.300:139): avc: denied { mounton } for pid=2362 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=11144 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 69.243187][ T2478] device syzkaller0 entered promiscuous mode [ 69.506141][ T9] device bridge_slave_1 left promiscuous mode [ 69.526742][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.538541][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.651664][ T2495] syz.0.700 uses obsolete (PF_INET,SOCK_PACKET) [ 70.684156][ T2546] EXT4-fs warning (device sda1): ext4_block_to_path:107: block 4284481534 > max in inode 1980 [ 71.285483][ T2573] ip6_tunnel: non-ECT from 0000:0000:0005:0000:875a:6596:9ff5:7b00 with DS=0x9f [ 71.572145][ T2594] device syzkaller0 entered promiscuous mode [ 71.742422][ T2604] device bridge0 entered promiscuous mode [ 72.038765][ T2627] device syzkaller0 entered promiscuous mode [ 72.359403][ T2644] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.366554][ T2644] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.709505][ T2642] syz.3.756[2642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.769568][ T2642] syz.3.756[2642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.454363][ T2713] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.473990][ T2729] ref_ctr_offset mismatch. inode: 0x7c1 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x7604 [ 74.505802][ T2713] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.513829][ T2713] device bridge_slave_0 entered promiscuous mode [ 74.547001][ T2713] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.560420][ T2713] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.568527][ T2713] device bridge_slave_1 entered promiscuous mode [ 74.767519][ T2713] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.774441][ T2713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.781533][ T2713] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.788360][ T2713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.985042][ T9] device bridge_slave_1 left promiscuous mode [ 74.995459][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.004294][ T9] device bridge_slave_0 left promiscuous mode [ 75.010331][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.375381][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.398144][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.417168][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.748976][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.770727][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.795466][ T440] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.802485][ T440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.813374][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.821789][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 75.842420][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 75.851533][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.002903][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 76.011678][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.080282][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.088089][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.201213][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.209319][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.477211][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.485909][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.495651][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.504034][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 76.515440][ T2799] bridge0: port 4(syz_tun) entered disabled state [ 76.523191][ T2799] bridge0: port 3(erspan0) entered disabled state [ 76.529860][ T2799] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.537900][ T2799] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.556719][ T2799] device bridge0 left promiscuous mode [ 77.752626][ T23] audit: type=1400 audit(1719787609.270:140): avc: denied { create } for pid=2830 comm="syz.3.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 77.944924][ T2822] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.960198][ T2822] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.977934][ T2822] device bridge_slave_0 entered promiscuous mode [ 78.067983][ T2822] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.075703][ T2822] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.083561][ T2822] device bridge_slave_1 entered promiscuous mode [ 78.301322][ T2850] syz.3.832[2850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.301376][ T2850] syz.3.832[2850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.332522][ T2822] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.350408][ T2822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.357542][ T2822] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.364309][ T2822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.384373][ T2851] device wg2 entered promiscuous mode [ 78.463900][ T9] device bridge_slave_1 left promiscuous mode [ 78.469987][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.507429][ T9] device bridge_slave_0 left promiscuous mode [ 78.513773][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.844909][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.870493][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.890863][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.943555][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.964461][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.980484][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.987348][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.021217][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.049838][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.068665][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.075568][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.144618][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.153187][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.161541][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.170100][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.207897][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.221974][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.245807][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.263611][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.344765][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.361147][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.393960][ T2881] syz.3.844[2881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.424710][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.447487][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.456253][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.472149][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.069172][ T2932] device wg2 entered promiscuous mode [ 80.636019][ T23] audit: type=1400 audit(1719787612.150:141): avc: denied { create } for pid=2970 comm="syz.4.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 82.042675][ T23] audit: type=1400 audit(1719787613.560:142): avc: denied { ioctl } for pid=3023 comm="syz.1.901" path="socket:[23946]" dev="sockfs" ino=23946 ioctlcmd=0x54d4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 83.341708][ T23] audit: type=1400 audit(1719787614.860:143): avc: denied { create } for pid=3096 comm="syz.0.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 83.408231][ T23] audit: type=1400 audit(1719787614.910:144): avc: denied { create } for pid=3106 comm="syz.3.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 84.147444][ T3134] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 84.161824][ T23] audit: type=1400 audit(1719787615.680:145): avc: denied { create } for pid=3135 comm="syz.0.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 84.649299][ T23] audit: type=1400 audit(1719787616.160:146): avc: denied { create } for pid=3160 comm="syz.4.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 85.774056][ T3197] device syzkaller0 entered promiscuous mode [ 86.305915][ T3228] bridge0: port 3(veth0_to_batadv) entered blocking state [ 86.403172][ T3228] bridge0: port 3(veth0_to_batadv) entered disabled state [ 86.442965][ T3228] device veth0_to_batadv entered promiscuous mode [ 86.449472][ T3228] bridge0: port 3(veth0_to_batadv) entered blocking state [ 86.456477][ T3228] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 86.511199][ T3228] device veth0_to_batadv left promiscuous mode [ 86.517669][ T3228] bridge0: port 3(veth0_to_batadv) entered disabled state [ 88.243549][ T3280] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.250636][ T3280] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.280779][ T3283] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.287628][ T3283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.294815][ T3283] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.301669][ T3283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.346363][ T3283] device bridge0 entered promiscuous mode [ 89.402425][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.764004][ T352] device syz_tun left promiscuous mode [ 89.769298][ T352] bridge0: port 4(syz_tun) entered disabled state [ 89.905238][ T3350] device syzkaller0 entered promiscuous mode [ 89.983594][ T3346] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.991064][ T3346] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.998814][ T3346] device bridge_slave_0 entered promiscuous mode [ 90.011597][ T3346] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.019605][ T3346] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.027770][ T3346] device bridge_slave_1 entered promiscuous mode [ 90.271607][ T3346] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.278480][ T3346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.285625][ T3346] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.292474][ T3346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.343202][ T179] device erspan0 left promiscuous mode [ 90.348488][ T179] bridge0: port 3(erspan0) entered disabled state [ 90.474964][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.490738][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.525151][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.601205][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.619846][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.656426][ T440] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.663322][ T440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.671387][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.679608][ T440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.687979][ T440] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.694824][ T440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.714450][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.723693][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.740840][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.749301][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.772966][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.781422][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.789743][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.798330][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.885277][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.906470][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.938474][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.962435][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.003392][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.011605][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.051546][ T179] device bridge_slave_1 left promiscuous mode [ 91.057536][ T179] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.121117][ T179] device bridge_slave_0 left promiscuous mode [ 91.172143][ T179] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.733190][ T3397] device pim6reg1 entered promiscuous mode [ 92.000795][ T3418] bridge0: mtu greater than device maximum [ 92.335349][ T3441] syz.2.1053[3441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.373545][ T3439] device syzkaller0 entered promiscuous mode [ 92.825483][ T3474] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.539201][ T3628] device syzkaller0 entered promiscuous mode [ 96.492858][ T23] audit: type=1400 audit(1719787628.010:147): avc: denied { create } for pid=3683 comm="syz.1.1151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 97.643617][ T23] audit: type=1400 audit(1719787629.160:148): avc: denied { sys_nice } for pid=3753 comm="syz.1.1178" capability=23 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 97.861086][ T3747] device syzkaller0 entered promiscuous mode [ 98.054161][ T3776] bridge0: port 3(erspan0) entered blocking state [ 98.075760][ T3776] bridge0: port 3(erspan0) entered disabled state [ 98.098855][ T3776] device erspan0 entered promiscuous mode [ 98.106711][ T3776] bridge0: port 3(erspan0) entered blocking state [ 98.113078][ T3776] bridge0: port 3(erspan0) entered forwarding state [ 98.135493][ T23] audit: type=1400 audit(1719787629.650:149): avc: denied { create } for pid=3784 comm="syz.3.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 98.490564][ T3809] bridge0: port 3(erspan0) entered blocking state [ 98.499030][ T3809] bridge0: port 3(erspan0) entered disabled state [ 98.522919][ T3809] device erspan0 entered promiscuous mode [ 98.533736][ T3809] bridge0: port 3(erspan0) entered blocking state [ 98.540144][ T3809] bridge0: port 3(erspan0) entered forwarding state [ 98.893653][ T3840] device syzkaller0 entered promiscuous mode [ 99.888079][ T23] audit: type=1400 audit(1719787631.400:150): avc: denied { ioctl } for pid=3896 comm="syz.0.1241" path="" dev="cgroup2" ino=242 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.042100][ T3903] device syzkaller0 entered promiscuous mode [ 100.402147][ T3910] device syzkaller0 entered promiscuous mode [ 100.452807][ T3912] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.591779][ T3925] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 5 (only 8 groups) [ 100.720203][ T23] audit: type=1400 audit(1719787632.230:151): avc: denied { create } for pid=3928 comm="syz.0.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 101.835759][ T3990] bridge0: port 3(veth0_to_batadv) entered blocking state [ 101.844539][ T3990] bridge0: port 3(veth0_to_batadv) entered disabled state [ 101.852272][ T3990] device veth0_to_batadv entered promiscuous mode [ 101.858739][ T3990] bridge0: port 3(veth0_to_batadv) entered blocking state [ 101.865692][ T3990] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 101.881820][ T3981] device veth0_to_batadv left promiscuous mode [ 101.901157][ T3981] bridge0: port 3(veth0_to_batadv) entered disabled state [ 102.415704][ T4036] bridge0: port 4(veth0_to_batadv) entered blocking state [ 102.423394][ T4036] bridge0: port 4(veth0_to_batadv) entered disabled state [ 102.463707][ T4036] device veth0_to_batadv entered promiscuous mode [ 102.472081][ T4036] bridge0: port 4(veth0_to_batadv) entered blocking state [ 102.479062][ T4036] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 102.488518][ T4044] device veth0_to_batadv left promiscuous mode [ 102.494867][ T4044] bridge0: port 4(veth0_to_batadv) entered disabled state [ 102.749604][ T4057] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 40704 (only 8 groups) [ 103.637539][ T4089] bridge0: port 4(veth0_to_batadv) entered blocking state [ 103.689972][ T4089] bridge0: port 4(veth0_to_batadv) entered disabled state [ 103.717943][ T4089] device veth0_to_batadv entered promiscuous mode [ 103.737814][ T4089] bridge0: port 4(veth0_to_batadv) entered blocking state [ 103.744856][ T4089] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 104.416084][ T4133] device syzkaller0 entered promiscuous mode [ 104.455087][ T4125] device veth0_to_batadv left promiscuous mode [ 104.461773][ T4125] bridge0: port 4(veth0_to_batadv) entered disabled state [ 105.744223][ T4190] device pim6reg1 entered promiscuous mode [ 107.714127][ T4255] device wg2 left promiscuous mode [ 109.707671][ T4349] device syzkaller0 entered promiscuous mode [ 110.516661][ T4395] device syzkaller0 entered promiscuous mode [ 111.592218][ T4444] device syzkaller0 entered promiscuous mode [ 113.781774][ T4542] syz_tun: refused to change device tx_queue_len [ 114.880124][ C1] ================================================================== [ 114.888140][ C1] BUG: KASAN: use-after-free in enqueue_timer+0xb7/0x300 [ 114.894972][ C1] Write of size 8 at addr ffff8881de4a71c8 by task syz.3.1454/4459 [ 114.902688][ C1] [ 114.904873][ C1] CPU: 1 PID: 4459 Comm: syz.3.1454 Not tainted 5.4.276-syzkaller-00020-g4275fce9fe94 #0 [ 114.914495][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 114.924394][ C1] Call Trace: [ 114.927511][ C1] [ 114.930211][ C1] dump_stack+0x1d8/0x241 [ 114.934378][ C1] ? perf_prepare_sample+0x1500/0x1500 [ 114.939668][ C1] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 114.945310][ C1] ? printk+0xd1/0x111 [ 114.949216][ C1] ? enqueue_timer+0xb7/0x300 [ 114.953731][ C1] ? wake_up_klogd+0xb2/0xf0 [ 114.958164][ C1] ? enqueue_timer+0xb7/0x300 [ 114.962669][ C1] print_address_description+0x8c/0x600 [ 114.968051][ C1] ? panic+0x89d/0x89d [ 114.971960][ C1] ? enqueue_timer+0xb7/0x300 [ 114.976477][ C1] __kasan_report+0xf3/0x120 [ 114.980897][ C1] ? enqueue_timer+0xb7/0x300 [ 114.985409][ C1] kasan_report+0x30/0x60 [ 114.989576][ C1] enqueue_timer+0xb7/0x300 [ 114.993918][ C1] internal_add_timer+0x240/0x430 [ 114.998780][ C1] __mod_timer+0x6f1/0x13e0 [ 115.003117][ C1] ? mod_timer_pending+0x20/0x20 [ 115.007889][ C1] ? round_jiffies+0x99/0xb0 [ 115.012321][ C1] ? can_stat_update+0xb15/0xbb0 [ 115.017092][ C1] ? asan.module_dtor+0x20/0x20 [ 115.021774][ C1] call_timer_fn+0x36/0x390 [ 115.026114][ C1] ? asan.module_dtor+0x20/0x20 [ 115.030803][ C1] __run_timers+0x879/0xbe0 [ 115.035144][ C1] ? enqueue_timer+0x300/0x300 [ 115.039746][ C1] ? check_preemption_disabled+0x9f/0x320 [ 115.045297][ C1] ? debug_smp_processor_id+0x20/0x20 [ 115.050507][ C1] ? lapic_next_event+0x5b/0x70 [ 115.055194][ C1] run_timer_softirq+0x63/0xf0 [ 115.059792][ C1] __do_softirq+0x23b/0x6b7 [ 115.064133][ C1] irq_exit+0x195/0x1c0 [ 115.068126][ C1] smp_apic_timer_interrupt+0x11a/0x460 [ 115.073506][ C1] apic_timer_interrupt+0xf/0x20 [ 115.078273][ C1] [ 115.081067][ C1] RIP: 0010:__sanitizer_cov_trace_cmp8+0x4/0x70 [ 115.087132][ C1] Code: 77 cf 89 f8 89 f6 48 c7 44 0a 08 04 00 00 00 48 89 44 0a 10 48 89 74 0a 18 4c 89 44 0a 20 49 ff c1 4c 89 09 c3 90 4c 8b 04 24 <65> 48 8b 15 d4 52 9e 7e 65 8b 05 d9 52 9e 7e a9 00 01 1f 00 74 01 [ 115.106685][ C1] RSP: 0018:ffff8881d98bf7d8 EFLAGS: 00000207 ORIG_RAX: ffffffffffffff13 [ 115.114928][ C1] RAX: ffffffff83aaa939 RBX: 000000000000144d RCX: 0000000000040000 [ 115.122736][ C1] RDX: ffffc900033f9000 RSI: 000000000000144d RDI: 000000000000144d [ 115.130548][ C1] RBP: ffff8881d98bf910 R08: ffffffff83aaa9ec R09: 0000000000000003 [ 115.138360][ C1] R10: ffffffffffffffff R11: dffffc0000000001 R12: 0000000000000002 [ 115.146181][ C1] R13: dffffc0000000000 R14: 1ffff1103b317f12 R15: 000000000000144d [ 115.153996][ C1] ? inet_twsk_purge+0x6ec/0x870 [ 115.158761][ C1] ? inet_twsk_purge+0x639/0x870 [ 115.163536][ C1] inet_twsk_purge+0x6ec/0x870 [ 115.168145][ C1] ? pcpu_block_update+0x589/0x8c0 [ 115.173084][ C1] ? find_next_bit+0x7b/0x100 [ 115.177593][ C1] ? pcpu_free_area+0x82b/0x9d0 [ 115.182282][ C1] ? __inet_twsk_schedule+0x130/0x130 [ 115.187582][ C1] ? tcp_sk_exit+0x260/0x260 [ 115.192000][ C1] tcp_sk_exit_batch+0x28/0x90 [ 115.196600][ C1] ? tcp_sk_exit+0x260/0x260 [ 115.201027][ C1] setup_net+0x639/0x990 [ 115.205108][ C1] ? copy_net_ns+0x510/0x510 [ 115.209532][ C1] ? copy_net_ns+0x179/0x510 [ 115.213958][ C1] copy_net_ns+0x30d/0x510 [ 115.218219][ C1] create_new_namespaces+0x47a/0x570 [ 115.223338][ C1] copy_namespaces+0x169/0x1b0 [ 115.227938][ C1] copy_process+0x12da/0x3230 [ 115.232461][ C1] ? fork_idle+0x290/0x290 [ 115.236704][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 115.241736][ C1] _do_fork+0x197/0x900 [ 115.245731][ C1] ? copy_process+0x3230/0x3230 [ 115.250420][ C1] ? check_preemption_disabled+0x153/0x320 [ 115.256057][ C1] __x64_sys_clone+0x26b/0x2c0 [ 115.260657][ C1] ? __x64_sys_perf_event_open+0xc0/0xc0 [ 115.266126][ C1] ? __ia32_sys_vfork+0x110/0x110 [ 115.271112][ C1] ? switch_fpu_return+0x1d4/0x410 [ 115.276057][ C1] ? fput_many+0x15e/0x1b0 [ 115.280310][ C1] do_syscall_64+0xca/0x1c0 [ 115.284656][ C1] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 115.290377][ C1] RIP: 0033:0x7f75ba774b99 [ 115.294632][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.314071][ C1] RSP: 002b:00007f75b99f5ff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 115.322341][ C1] RAX: ffffffffffffffda RBX: 00007f75ba902fa0 RCX: 00007f75ba774b99 [ 115.330123][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000d004e000 [ 115.337935][ C1] RBP: 00007f75ba7f577e R08: 0000000000000000 R09: 0000000000000000 [ 115.345762][ C1] R10: 0000000020000140 R11: 0000000000000206 R12: 0000000000000000 [ 115.353569][ C1] R13: 000000000000000b R14: 00007f75ba902fa0 R15: 00007ffc01e1f1e8 [ 115.361374][ C1] [ 115.363535][ C1] Allocated by task 4574: [ 115.367711][ C1] __kasan_kmalloc+0x171/0x210 [ 115.372313][ C1] kmem_cache_alloc+0xd9/0x250 [ 115.376911][ C1] sk_prot_alloc+0x63/0x3e0 [ 115.381252][ C1] sk_alloc+0x35/0x2f0 [ 115.385158][ C1] tipc_sk_create+0xfb/0x18b0 [ 115.389669][ C1] __sock_create+0x3cb/0x7a0 [ 115.394105][ C1] __sys_socketpair+0x28f/0x6e0 [ 115.398784][ C1] __x64_sys_socketpair+0x97/0xb0 [ 115.403639][ C1] do_syscall_64+0xca/0x1c0 [ 115.407982][ C1] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 115.413700][ C1] [ 115.415874][ C1] Freed by task 17: [ 115.419526][ C1] __kasan_slab_free+0x1b5/0x270 [ 115.424326][ C1] kmem_cache_free+0x10b/0x2c0 [ 115.428903][ C1] __sk_destruct+0x460/0x5e0 [ 115.433324][ C1] rcu_do_batch+0x492/0xa00 [ 115.437666][ C1] rcu_core+0x4c8/0xcb0 [ 115.441657][ C1] __do_softirq+0x23b/0x6b7 [ 115.445988][ C1] [ 115.448168][ C1] The buggy address belongs to the object at ffff8881de4a6f80 [ 115.448168][ C1] which belongs to the cache TIPC of size 1072 [ 115.461537][ C1] The buggy address is located 584 bytes inside of [ 115.461537][ C1] 1072-byte region [ffff8881de4a6f80, ffff8881de4a73b0) [ 115.474720][ C1] The buggy address belongs to the page: [ 115.480208][ C1] page:ffffea0007792900 refcount:1 mapcount:0 mapping:ffff8881eebd7b80 index:0x0 compound_mapcount: 0 [ 115.490968][ C1] flags: 0x8000000000010200(slab|head) [ 115.496267][ C1] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881eebd7b80 [ 115.504673][ C1] raw: 0000000000000000 00000000800d000d 00000001ffffffff 0000000000000000 [ 115.513087][ C1] page dumped because: kasan: bad access detected [ 115.519344][ C1] page_owner tracks the page as allocated [ 115.524903][ C1] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 115.541134][ C1] prep_new_page+0x18f/0x370 [ 115.545558][ C1] get_page_from_freelist+0x2d13/0x2d90 [ 115.550930][ C1] __alloc_pages_nodemask+0x393/0x840 [ 115.556140][ C1] alloc_slab_page+0x39/0x3c0 [ 115.560649][ C1] new_slab+0x97/0x440 [ 115.564556][ C1] ___slab_alloc+0x2fe/0x490 [ 115.568988][ C1] __slab_alloc+0x62/0xa0 [ 115.573169][ C1] kmem_cache_alloc+0x109/0x250 [ 115.577838][ C1] sk_prot_alloc+0x63/0x3e0 [ 115.582177][ C1] sk_alloc+0x35/0x2f0 [ 115.586081][ C1] tipc_sk_create+0xfb/0x18b0 [ 115.590594][ C1] __sock_create+0x3cb/0x7a0 [ 115.595030][ C1] __sys_socketpair+0x308/0x6e0 [ 115.599710][ C1] __x64_sys_socketpair+0x97/0xb0 [ 115.604574][ C1] do_syscall_64+0xca/0x1c0 [ 115.608914][ C1] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 115.614634][ C1] page last free stack trace: [ 115.619159][ C1] __free_pages_ok+0x847/0x950 [ 115.623756][ C1] __free_pages+0x91/0x140 [ 115.628006][ C1] bpf_check+0x8aaa/0xb340 [ 115.632259][ C1] __se_sys_bpf+0x8139/0xbcb0 [ 115.636773][ C1] do_syscall_64+0xca/0x1c0 [ 115.641114][ C1] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 115.646830][ C1] [ 115.649003][ C1] Memory state around the buggy address: [ 115.654481][ C1] ffff8881de4a7080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 115.662374][ C1] ffff8881de4a7100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 115.670269][ C1] >ffff8881de4a7180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 115.678166][ C1] ^ [ 115.684424][ C1] ffff8881de4a7200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 115.692324][ C1] ffff8881de4a7280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 115.700207][ C1] ================================================================== [ 115.708121][ C1] Disabling lock debugging due to kernel taint [ 115.729336][ T23] audit: type=1400 audit(1719787647.240:152): avc: denied { remove_name } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=222 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 115.751804][ T23] audit: type=1400 audit(1719787647.240:153): avc: denied { rename } for pid=144 comm="syslogd" name="messages" dev="tmpfs" ino=222 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.910169][ C1] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 115.917785][ C1] #PF: supervisor instruction fetch in kernel mode [ 115.924119][ C1] #PF: error_code(0x0010) - not-present page [ 115.929939][ C1] PGD 0 P4D 0 [ 115.933151][ C1] Oops: 0010 [#1] PREEMPT SMP KASAN [ 115.938209][ C1] CPU: 1 PID: 4590 Comm: syz.1.1497 Tainted: G B 5.4.276-syzkaller-00020-g4275fce9fe94 #0 [ 115.949206][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 115.959106][ C1] RIP: 0010:0x0 [ 115.962400][ C1] Code: Bad RIP value. [ 115.966305][ C1] RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206 [ 115.972206][ C1] RAX: ffffffff8154d48a RBX: 0000000000000100 RCX: ffff8881dbb70fc0 [ 115.980019][ C1] RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881de4a71c0 [ 115.987829][ C1] RBP: ffff8881f6f09ec8 R08: ffffffff8154d0ce R09: 0000000000000003 [ 115.995641][ C1] R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb760 [ 116.003451][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881de4a71c0 [ 116.011266][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 116.020028][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.026463][ C1] CR2: ffffffffffffffd6 CR3: 0000000005e0e000 CR4: 00000000003406a0 [ 116.034265][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 116.042260][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 116.050065][ C1] Call Trace: [ 116.053189][ C1] [ 116.055892][ C1] ? __die+0xb4/0x100 [ 116.059707][ C1] ? no_context+0xbda/0xe50 [ 116.064046][ C1] ? enqueue_timer+0x165/0x300 [ 116.068663][ C1] ? is_prefetch+0x4b0/0x4b0 [ 116.073076][ C1] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 116.078718][ C1] ? __do_page_fault+0xa7d/0xbb0 [ 116.083488][ C1] ? __bad_area_nosemaphore+0xc0/0x460 [ 116.088786][ C1] ? page_fault+0x2f/0x40 [ 116.092959][ C1] ? __run_timers+0x84e/0xbe0 [ 116.097459][ C1] ? call_timer_fn+0x2a/0x390 [ 116.101974][ C1] call_timer_fn+0x36/0x390 [ 116.106312][ C1] __run_timers+0x879/0xbe0 [ 116.110658][ C1] ? enqueue_timer+0x300/0x300 [ 116.115250][ C1] ? check_preemption_disabled+0x9f/0x320 [ 116.120810][ C1] ? debug_smp_processor_id+0x20/0x20 [ 116.126013][ C1] ? lapic_next_event+0x5b/0x70 [ 116.130702][ C1] run_timer_softirq+0x63/0xf0 [ 116.135473][ C1] __do_softirq+0x23b/0x6b7 [ 116.139808][ C1] irq_exit+0x195/0x1c0 [ 116.143799][ C1] smp_apic_timer_interrupt+0x11a/0x460 [ 116.149180][ C1] apic_timer_interrupt+0xf/0x20 [ 116.153941][ C1] [ 116.156728][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x13/0x50 [ 116.162711][ C1] Code: a7 f1 85 e8 4f de 2f 00 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 04 24 65 48 8b 0d 74 54 9e 7e 65 8b 15 79 54 9e 7e c2 00 01 1f 00 74 01 c3 8b 91 00 0a 00 00 83 fa 02 75 f4 48 8b [ 116.182151][ C1] RSP: 0018:ffff8881f24d7438 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 116.190395][ C1] RAX: ffffffff81824762 RBX: 0000000000000000 RCX: ffff8881dbb70fc0 [ 116.198207][ C1] RDX: 0000000080000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 116.206019][ C1] RBP: ffff8881f24d7550 R08: ffffffff81824644 R09: fffff94000ee8097 [ 116.213833][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881e2df9010 [ 116.221645][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffea0007740480 [ 116.229465][ C1] ? release_pages+0x244/0xb20 [ 116.234058][ C1] ? release_pages+0x362/0xb20 [ 116.238662][ C1] release_pages+0x362/0xb20 [ 116.243087][ C1] ? lru_add_drain_per_cpu+0x60/0x60 [ 116.248203][ C1] ? free_swap_cache+0xd8/0x210 [ 116.252889][ C1] tlb_flush_mmu+0xc8/0x170 [ 116.257239][ C1] unmap_page_range+0x1d29/0x2620 [ 116.262117][ C1] ? copy_page_range+0x26f0/0x26f0 [ 116.267046][ C1] ? lru_add_page_tail+0x770/0x770 [ 116.271984][ C1] unmap_vmas+0x355/0x4b0 [ 116.276151][ C1] ? cputime_adjust+0x34/0x270 [ 116.280752][ C1] ? unmap_page_range+0x2620/0x2620 [ 116.285785][ C1] ? tlb_gather_mmu+0x273/0x340 [ 116.290471][ C1] exit_mmap+0x2bc/0x520 [ 116.294550][ C1] ? vm_brk+0x20/0x20 [ 116.298376][ C1] ? mutex_unlock+0x18/0x40 [ 116.302710][ C1] ? uprobe_clear_state+0x297/0x300 [ 116.307741][ C1] ? mm_update_next_owner+0x4f7/0x5d0 [ 116.312952][ C1] __mmput+0x8e/0x2c0 [ 116.316773][ C1] do_exit+0xc08/0x2bc0 [ 116.320766][ C1] ? put_task_struct+0x80/0x80 [ 116.325371][ C1] ? debug_smp_processor_id+0x20/0x20 [ 116.330574][ C1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 116.335954][ C1] do_group_exit+0x138/0x300 [ 116.340379][ C1] get_signal+0xdb1/0x1440 [ 116.344638][ C1] do_signal+0xb0/0x11f0 [ 116.348713][ C1] ? is_mmconf_reserved+0x430/0x430 [ 116.353744][ C1] ? _raw_write_unlock_irq+0x60/0x60 [ 116.358868][ C1] ? signal_fault+0x1e0/0x1e0 [ 116.363377][ C1] ? __se_sys_futex+0x355/0x470 [ 116.368078][ C1] ? __x64_sys_futex+0xf0/0xf0 [ 116.372670][ C1] exit_to_usermode_loop+0xc0/0x1a0 [ 116.377699][ C1] prepare_exit_to_usermode+0x199/0x200 [ 116.383082][ C1] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 116.388810][ C1] RIP: 0033:0x7f2d3e3b6b99 [ 116.393063][ C1] Code: Bad RIP value. [ 116.396966][ C1] RSP: 002b:00007f2d3d5f60f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 116.405218][ C1] RAX: fffffffffffffe00 RBX: 00007f2d3e545158 RCX: 00007f2d3e3b6b99 [ 116.413018][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f2d3e545158 [ 116.420832][ C1] RBP: 00007f2d3e545150 R08: 00007f2d3d5f66c0 R09: 00007f2d3d5f66c0 [ 116.428646][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2d3e54515c [ 116.436464][ C1] R13: 000000000000006e R14: 00007ffdd5534250 R15: 00007ffdd5534338 [ 116.444268][ C1] Modules linked in: [ 116.448009][ C1] CR2: 0000000000000000 [ 116.452006][ C1] ---[ end trace 8b12993d0da7a23f ]--- [ 116.457310][ C1] RIP: 0010:0x0 [ 116.460595][ C1] Code: Bad RIP value. [ 116.464497][ C1] RSP: 0018:ffff8881f6f09d18 EFLAGS: 00010206 [ 116.470396][ C1] RAX: ffffffff8154d48a RBX: 0000000000000100 RCX: ffff8881dbb70fc0 [ 116.478205][ C1] RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881de4a71c0 [ 116.486018][ C1] RBP: ffff8881f6f09ec8 R08: ffffffff8154d0ce R09: 0000000000000003 [ 116.493827][ C1] R10: ffffffffffffffff R11: dffffc0000000001 R12: 00000000ffffb760 [ 116.501637][ C1] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881de4a71c0 [ 116.509451][ C1] FS: 0000000000000000(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 116.518214][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.524645][ C1] CR2: ffffffffffffffd6 CR3: 0000000005e0e000 CR4: 00000000003406a0 [ 116.532461][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 116.540286][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 116.548072][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 116.555428][ C1] Kernel Offset: disabled [ 116.559551][ C1] Rebooting in 86400 seconds..