last executing test programs: 31.476546376s ago: executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x101000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x0, 0x2, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000006f25f66a5fbb37186000000600"/36, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b71300000000000085000000700000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f9120142797173864", 0x3d}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r2) socketpair(0x0, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000090000000008f8d035288f6c65b520cbaf6744a40c000200000000850000002a000000850000000e000c0095ecf11aa560f9ec3884ba6b00bab8ba31ec387b23a64aa1a53c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_service_bytes\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0c0583b, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0xfffffffffffffea4, 0x0, r4, 0x1d}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00'}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00'}, 0x10) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) 31.44671113s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x800000, 0x600, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 31.392268019s ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x4d00}]}) 31.336764997s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000028000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11}, 0x48) sendmsg$inet(r7, &(0x7f0000001580)={0x0, 0x1200, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r6, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000380), 0xffffd6c0, r10}, 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='rpc_clnt_new\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x67}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r11, &(0x7f00000003c0)=ANY=[], 0x7) 31.274927947s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1, 0x0, 0xf000000}, 0x48) 31.265304579s ago: executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00', @remote}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 31.250344091s ago: executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x3, 0x0, 0xcd26, 0x4020, r0, 0x7ff, '\x00', 0x0, r0, 0x4, 0x2, 0x3, 0xf}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_writepages\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r5}, 0x10) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x4, 0x0, 0xffffbffe, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x800000000, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 31.215962046s ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='ext4_da_write_pages_extent\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1000, 0x0, 0x4, 0x840, 0xffffffffffffffff, 0xc7, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x3, 0x1, 0xf}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x48) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0xfffffffe}, 0xc) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x7fc, 0x0, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xf, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x3, 0x4, 0x9, 0x0, r6}, 0x48) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={0xffffffffffffffff, 0x17, 0x10}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xbff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000300)='syzkaller\x00', 0x40000000, 0xda, &(0x7f0000000a40)=""/218, 0x41100, 0x44, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000480)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0x4, 0x797c}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000680)=[r3, r4, r5, r6, r7], &(0x7f00000006c0)=[{0x4, 0x3, 0x4, 0x2}, {0x5, 0x9, 0xf, 0x3}, {0x5, 0x2, 0x2, 0x2}], 0x10, 0x8}, 0x90) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r9, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000001680)=[{0x2, 0x2, 0x7, 0xa}, {0x0, 0x3, 0x3}], 0x10, 0x80000000}, 0x90) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001780)={0x1b, 0x0, 0x0, 0x1000, 0x0, 0xffffffffffffffff, 0x40, '\x00', r10, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001d40)={0x3, 0x17, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000005000000000000000900000018110000", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f00000018c0)='syzkaller\x00', 0x4, 0xe5, &(0x7f0000001900)=""/229, 0x41000, 0x45, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001ac0)={0x0, 0x5, 0x401, 0x100}, 0x10, r11, r9}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0xb, &(0x7f00000007c0)=@raw=[@exit, @jmp={0x5, 0x0, 0x0, 0x6, 0x4, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0x3, 0x1, 0x0, r12}, @tail_call], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xba, &(0x7f0000000380)=""/186, 0x41000, 0x8, '\x00', 0x0, 0x35, r8, 0x8, &(0x7f0000000500)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0xd, 0x1, 0x82}, 0x10, r11, 0xffffffffffffffff, 0xa, &(0x7f0000000580)=[0xffffffffffffffff], &(0x7f00000005c0)=[{0x5, 0x4, 0x6, 0x3}, {0x2, 0x1, 0x4, 0x6}, {0x0, 0x5, 0x10, 0x8}, {0x5, 0x1, 0x10}, {0x1, 0x800004, 0x3, 0xa}, {0x0, 0x3, 0xf}, {0x0, 0x3, 0xb, 0x4}, {0x2, 0x3, 0x0, 0x2}, {0x3, 0x3, 0x4}, {0x4, 0x2, 0xa, 0x8}], 0x10, 0x2e68}, 0x90) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r13, 0x5452, 0x20001412) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1a, 0x17, &(0x7f0000000240)=@raw=[@ringbuf_query, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2da6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000300)='syzkaller\x00', 0x40, 0xbd, &(0x7f00000003c0)=""/189, 0x40f00, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x5, 0x0, &(0x7f0000000700)=[{0x1, 0x3, 0x2, 0xa}, {0x2, 0x2, 0xa, 0x9}, {0x5, 0x1, 0x10, 0xa}, {0x1, 0x5, 0x2, 0xc}, {0x0, 0x5, 0xb, 0x5}], 0x10, 0x4e}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000dc0)=@generic={&(0x7f0000000d80)='./file0\x00', 0x0, 0x18}, 0x18) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_fc_track_inode\x00', r14}, 0x10) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r15}, 0x10) write$cgroup_int(r16, &(0x7f00000000c0), 0x12) 31.19124965s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000140)) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x660c, 0x0) 31.18905672s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000140)) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x660c, 0x0) 30.750468727s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0400000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000400)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='memory.events.local\x00') 30.709576604s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_evict_inode\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='bcache_btree_insert_key\x00', r0}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) write$cgroup_pid(r2, &(0x7f0000000980), 0x12) 30.690809007s ago: executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 30.660577362s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x5, 0x6, 0xfffffff8, 0x7, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1fffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='scmi_rx_done\x00', r0}, 0x10) close(r1) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 30.652935162s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x0, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x800000, 0x1d, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 30.641658755s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b70500000000000061109f000000000007000000000000009500000900000000"], &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2b, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x38, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000800)={r2, 0x20, &(0x7f00000007c0)={&(0x7f0000000740)=""/38, 0x26, 0x0, &(0x7f0000000780)=""/16, 0x10}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0xf, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x401}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x4c, &(0x7f0000000280)=""/76, 0x41100, 0x11, '\x00', r4, 0x37, r2, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x10, 0xfffffff9, 0x3f}, 0x10, r5, r1, 0x4, &(0x7f0000000840), &(0x7f0000000880)=[{0x1000, 0x1, 0x7, 0x3}, {0x5, 0x1, 0x4000004, 0x1}, {0x1, 0x2, 0x1, 0x7}, {0x0, 0x6, 0x7}], 0x10, 0x1001}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a07, 0x1700) write$cgroup_subtree(r7, &(0x7f00000002c0)=ANY=[], 0x7) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r10) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305829, &(0x7f0000000040)) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980)=r5, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18660027bc08fb00000000000000000081"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x10, 0xfffffff7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r11}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x4030582a, &(0x7f0000000040)) 30.619221688s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x79, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0x2f, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000184ffa85", @ANYRES32, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x0, 0x0, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x15, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="1feb01002c00ddc9000000000c526539692e9a2c00e1ea4fc90000000c004602000000000000bcc44ee462277f1149948b7a361785d27e02ffb5116af9492d51767c8c6cf74df33957a4f75e4009c9eea02cd7a54da154d7286363279a2feab3e3530f9c7bbb3bb8905c940b84a2b1a853232999fdf994fdc0f69be4b4654c010bb177d50fed909288b692a13789853e97835c308b95aae7925c15ffbff1f77b6d79ccda6996197df8dfecf1a74160663b55663998d9dd48e4db541d97320b4c724ae1842a9a5a81d65f8c0c6c39d96c7f9eb8895f815bd10c203e764c25a3e54cbf12850950a370c96392d76014c0840c4cdcb806c15f3636f1029c0c441f3b38cd84aea8e297546ba9387eb194f101"], &(0x7f0000000100)=""/212, 0x26, 0xd4, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r4, 0x7, 0xfffffffffffffffe}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x200000, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f00000006c0)={'veth0_to_batadv\x00', @local}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 30.588209833s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xfff, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x90}, 0x48) 30.560077027s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000740)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, 0x0, &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xb3, &(0x7f000000cf3d)=""/179, 0x40f00, 0x0, '\x00', 0x0, 0x32, 0xffffffffffffffff, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) (fail_nth: 14) 30.520434103s ago: executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x9, 0x5a, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='jbd2_checkpoint\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000400)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r2}, &(0x7f0000000200), &(0x7f0000000380)='%pi6 \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704e9fff0ffffffb70200ef0700000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_es_find_extent_range_exit\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00', r7}, 0x10) 30.112762576s ago: executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x1, 0x8008, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000027b, &(0x7f0000000580)=ANY=[@ANYBLOB="1811000000000000000000000000000018110000d165cdbb7d26a7af6b063b65b7d3bf0235872ca5bee691f417022f6e48e67725401557a5ef0ae41d45e812d689084e7c96363ac87b9e2e6603104276009b206db11e483a04dfbebda1ba4886eb30883775120aae0a0e651fc7f46e22c04c4e42248add0d56dda2c525280608312d8196ca3c61811970ae4491bd3e6ee53247d367467c5051535cb5e2c45a7a2b368223d3a3da57e3fafd8c68c58d931a98095fca18a353caf523b3a10c17283b9be83aa211277173413cb18533b12be6f669cbdda6db90d4949ae4ef6d", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'\x00', 0x1}) sendmsg$tipc(r5, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) sendmsg$tipc(r5, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000540), 0x4) (async, rerun: 32) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x23, 0x3, 0x3, &(0x7f0000000040)) r10 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r10, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x8, 0xf9, 0x6, 0x81, 0x0, 0x7fff, 0x24000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x340, 0x9, 0x17, 0x8, 0x4, 0x1e, 0x6, 0x0, 0x7}, r10, 0x0, r1, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006910000000000000630af4ff000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210}, 0x80) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r11) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xa8282, 0x0) (async) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x20001400) 30.100184808s ago: executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x5451, &(0x7f0000000100)={'vlan0\x00', 0x400}) 30.098895408s ago: executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x0, 0xffffffff, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r9}, 0x10) 30.059534954s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@int={0x6, 0x0, 0x0, 0x1, 0x0, 0x7b, 0x0, 0x45, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000200)=""/44, 0x2b, 0x2c, 0x1, 0x8}, 0x20) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@int={0x6, 0x0, 0x0, 0x1, 0x0, 0x7b, 0x0, 0x45, 0x1}]}, {0x0, [0x61]}}, &(0x7f0000000200)=""/44, 0x2b, 0x2c, 0x1, 0x8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x2, 0x5, 0x1000, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 30.042585987s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='module_request\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000140)) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x660c, 0x0) 87.326096ms ago: executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000a00feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000050018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0, r1}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) 45.728423ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='ext4_es_find_extent_range_enter\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 43.414593ms ago: executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x100000000006302, &(0x7f0000000140)=@base={0xa, 0x16, 0xeb5, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 38.914744ms ago: executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a001600feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001100)=ANY=[@ANYBLOB], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x13, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x8, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xd}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x36, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x5, &(0x7f0000000680)=[0xffffffffffffffff], &(0x7f00000006c0)=[{0x1, 0x2, 0xf, 0xa}, {0x1, 0x2, 0xe}, {0x1, 0x0, 0xc, 0xc}, {0x0, 0x2, 0x0, 0xb}, {0x2, 0x1, 0x0, 0x7}], 0x10, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='ext4_fc_commit_stop\x00'}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) 0s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x1800}, 0x48) kernel console output (not intermixed with test programs): 1434.993390][T27095] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1434.993400][T27095] syz-executor.3[27095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.000053][T27095] syz-executor.3[27095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.088191][T27112] device veth1_macvtap left promiscuous mode [ 1435.105775][T27112] device macsec0 left promiscuous mode [ 1435.113399][T27112] device veth1_macvtap entered promiscuous mode [ 1435.124497][T27112] device macsec0 entered promiscuous mode [ 1435.130724][ T7137] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1435.142786][T27113] FAULT_INJECTION: forcing a failure. [ 1435.142786][T27113] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.160156][T27113] CPU: 1 PID: 27113 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1435.171679][T27113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1435.181573][T27113] Call Trace: [ 1435.184713][T27113] dump_stack_lvl+0x1e2/0x24b [ 1435.189229][T27113] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1435.194511][T27113] ? stack_trace_save+0x113/0x1c0 [ 1435.199369][T27113] dump_stack+0x15/0x17 [ 1435.203355][T27113] should_fail+0x3c6/0x510 [ 1435.207610][T27113] ? __alloc_skb+0x80/0x510 [ 1435.211968][T27113] __should_failslab+0xa4/0xe0 [ 1435.216563][T27113] should_failslab+0x9/0x20 [ 1435.220895][T27113] kmem_cache_alloc+0x3d/0x2e0 [ 1435.225491][T27113] ? kmem_cache_alloc+0x168/0x2e0 [ 1435.230355][T27113] ? __alloc_skb+0x80/0x510 [ 1435.234693][T27113] ? tipc_msg_build+0x13e/0x1040 [ 1435.239470][T27113] __alloc_skb+0x80/0x510 [ 1435.243629][T27113] __pskb_copy_fclone+0xae/0x1180 [ 1435.248660][T27113] tipc_msg_reassemble+0x1ba/0x580 [ 1435.253597][T27113] ? tipc_msg_lookup_dest+0x7f0/0x7f0 [ 1435.258808][T27113] ? _copy_from_iter_full+0x2c2/0xa20 [ 1435.264008][T27113] ? slab_post_alloc_hook+0x80/0x2f0 [ 1435.269132][T27113] tipc_mcast_xmit+0x23d/0x1b30 [ 1435.273820][T27113] ? tipc_msg_build+0x13e/0x1040 [ 1435.278593][T27113] ? __kasan_check_write+0x14/0x20 [ 1435.283536][T27113] ? tipc_bcbase_xmit+0xb50/0xb50 [ 1435.288396][T27113] ? __check_object_size+0x94/0x3c0 [ 1435.293432][T27113] ? tipc_msg_build+0x473/0x1040 [ 1435.298207][T27113] ? __kasan_check_write+0x14/0x20 [ 1435.303153][T27113] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1435.308025][T27113] ? tipc_msg_fragment+0x760/0x760 [ 1435.312959][T27113] ? handle_pte_fault+0x174f/0x3de0 [ 1435.318001][T27113] ? __local_bh_enable_ip+0x53/0x80 [ 1435.323030][T27113] ? trace_tipc_sk_sendmcast+0x26/0x6c0 [ 1435.328408][T27113] __tipc_sendmsg+0x280d/0x3ab0 [ 1435.333101][T27113] ? get_page_from_freelist+0x2d8c/0x2f30 [ 1435.338648][T27113] ? tipc_sk_publish+0x3e0/0x3e0 [ 1435.343536][T27113] ? avc_has_perm+0x14d/0x400 [ 1435.348043][T27113] ? memcpy+0x56/0x70 [ 1435.351857][T27113] ? avc_has_perm+0x275/0x400 [ 1435.356371][T27113] ? wait_woken+0x250/0x250 [ 1435.360711][T27113] ? avc_has_perm_noaudit+0x240/0x240 [ 1435.365941][T27113] ? __kasan_check_write+0x14/0x20 [ 1435.370870][T27113] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1435.375925][T27113] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1435.380961][T27113] ? __local_bh_enable_ip+0x53/0x80 [ 1435.385987][T27113] ? local_bh_enable+0x1f/0x30 [ 1435.390586][T27113] ? lock_sock_nested+0x26a/0x300 [ 1435.395446][T27113] ? sock_init_data+0xc0/0xc0 [ 1435.399968][T27113] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1435.405854][T27113] ? rotate_reclaimable_page+0x530/0x530 [ 1435.411305][T27113] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1435.416865][T27113] tipc_sendmsg+0x55/0x70 [ 1435.421027][T27113] ? tipc_recvmsg+0x13b0/0x13b0 [ 1435.425714][T27113] ____sys_sendmsg+0x59e/0x8f0 [ 1435.430329][T27113] ? __sys_sendmsg_sock+0x40/0x40 [ 1435.435183][T27113] ? import_iovec+0xe5/0x120 [ 1435.439600][T27113] ___sys_sendmsg+0x252/0x2e0 [ 1435.444112][T27113] ? __sys_sendmsg+0x280/0x280 [ 1435.448713][T27113] ? __kasan_check_write+0x14/0x20 [ 1435.453664][T27113] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1435.458963][T27113] ? __fdget+0x1bc/0x240 [ 1435.463033][T27113] __se_sys_sendmsg+0x1b1/0x280 [ 1435.467716][T27113] ? __x64_sys_sendmsg+0x90/0x90 [ 1435.472499][T27113] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1435.478393][T27113] ? __bpf_trace_sys_enter+0x62/0x70 [ 1435.483524][T27113] __x64_sys_sendmsg+0x7b/0x90 [ 1435.488113][T27113] do_syscall_64+0x34/0x70 [ 1435.492375][T27113] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1435.498093][T27113] RIP: 0033:0x7ff468155ee9 [ 1435.502351][T27113] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1435.521795][T27113] RSP: 002b:00007ff466eca0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1435.530039][T27113] RAX: ffffffffffffffda RBX: 00007ff46828cfa0 RCX: 00007ff468155ee9 [ 1435.537844][T27113] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000006 [ 1435.545670][T27113] RBP: 00007ff466eca120 R08: 0000000000000000 R09: 0000000000000000 [ 1435.553464][T27113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1435.561289][T27113] R13: 000000000000000b R14: 00007ff46828cfa0 R15: 00007ffd33a3fba8 [ 1435.714583][T27142] device veth1_macvtap left promiscuous mode [ 1435.724959][T27142] device macsec0 left promiscuous mode [ 1435.743343][T27142] device veth1_macvtap entered promiscuous mode [ 1435.758372][T27142] device macsec0 entered promiscuous mode [ 1435.850926][T27155] syz-executor.1[27155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.850970][T27155] syz-executor.1[27155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.952556][T27168] device veth1_macvtap left promiscuous mode [ 1435.970153][T27168] device macsec0 left promiscuous mode [ 1435.980667][T27168] device veth1_macvtap entered promiscuous mode [ 1435.987669][T27168] device macsec0 entered promiscuous mode [ 1436.164182][T27186] device lo entered promiscuous mode [ 1436.188257][T27192] device veth1_macvtap left promiscuous mode [ 1436.194349][T27192] device macsec0 left promiscuous mode [ 1436.220693][T27192] device veth1_macvtap entered promiscuous mode [ 1436.227244][T27192] device macsec0 entered promiscuous mode [ 1436.508487][T27215] FAULT_INJECTION: forcing a failure. [ 1436.508487][T27215] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.556835][T27215] CPU: 1 PID: 27215 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1436.568368][T27215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1436.578259][T27215] Call Trace: [ 1436.581397][T27215] dump_stack_lvl+0x1e2/0x24b [ 1436.585925][T27215] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1436.591330][T27215] dump_stack+0x15/0x17 [ 1436.595283][T27215] should_fail+0x3c6/0x510 [ 1436.599539][T27215] ? kvmalloc_node+0x82/0x130 [ 1436.604142][T27215] __should_failslab+0xa4/0xe0 [ 1436.608741][T27215] should_failslab+0x9/0x20 [ 1436.613080][T27215] __kmalloc+0x60/0x330 [ 1436.617078][T27215] ? kvmalloc_node+0x82/0x130 [ 1436.621586][T27215] kvmalloc_node+0x82/0x130 [ 1436.625925][T27215] pfifo_fast_init+0x3aa/0x7a0 [ 1436.630525][T27215] qdisc_create_dflt+0x138/0x3d0 [ 1436.635299][T27215] mq_init+0x2c8/0x6b0 [ 1436.639204][T27215] ? local_bh_enable+0x30/0x30 [ 1436.643802][T27215] ? __kasan_check_write+0x14/0x20 [ 1436.648753][T27215] ? qdisc_alloc+0x586/0x750 [ 1436.653176][T27215] ? mutex_lock+0xa5/0x110 [ 1436.657430][T27215] qdisc_create_dflt+0x138/0x3d0 [ 1436.662200][T27215] ? _raw_spin_lock+0xa4/0x1b0 [ 1436.666805][T27215] dev_activate+0x123/0x1310 [ 1436.671232][T27215] ? bpf_prog_run_clear_cb+0x220/0x220 [ 1436.676522][T27215] ? dev_set_rx_mode+0x245/0x2e0 [ 1436.681304][T27215] __dev_open+0x3bf/0x4e0 [ 1436.685466][T27215] ? dev_open+0x260/0x260 [ 1436.689632][T27215] ? _raw_spin_unlock_bh+0x51/0x60 [ 1436.694577][T27215] ? dev_set_rx_mode+0x245/0x2e0 [ 1436.699347][T27215] ? __kasan_check_read+0x11/0x20 [ 1436.704211][T27215] __dev_change_flags+0x1db/0x6e0 [ 1436.709073][T27215] ? dev_get_flags+0x1e0/0x1e0 [ 1436.713670][T27215] ? selinux_capable+0x2f1/0x430 [ 1436.718448][T27215] ? selinux_capset+0xf0/0xf0 [ 1436.722962][T27215] dev_change_flags+0x8c/0x1a0 [ 1436.727561][T27215] dev_ifsioc+0x115/0xae0 [ 1436.731722][T27215] ? dev_ioctl+0xb40/0xb40 [ 1436.735974][T27215] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1436.740926][T27215] dev_ioctl+0x526/0xb40 [ 1436.745006][T27215] sock_do_ioctl+0x295/0x3a0 [ 1436.749431][T27215] ? sock_show_fdinfo+0xa0/0xa0 [ 1436.754115][T27215] ? kernel_write+0x3d0/0x3d0 [ 1436.758633][T27215] ? selinux_file_ioctl+0x3cc/0x540 [ 1436.763667][T27215] sock_ioctl+0x4a6/0x760 [ 1436.767828][T27215] ? sock_poll+0x340/0x340 [ 1436.772087][T27215] ? security_file_ioctl+0x84/0xb0 [ 1436.777043][T27215] ? sock_poll+0x340/0x340 [ 1436.781285][T27215] __se_sys_ioctl+0x114/0x190 [ 1436.785800][T27215] __x64_sys_ioctl+0x7b/0x90 [ 1436.790224][T27215] do_syscall_64+0x34/0x70 [ 1436.794476][T27215] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1436.800211][T27215] RIP: 0033:0x7ff468155ee9 [ 1436.804462][T27215] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1436.823895][T27215] RSP: 002b:00007ff466eca0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1436.832137][T27215] RAX: ffffffffffffffda RBX: 00007ff46828cfa0 RCX: 00007ff468155ee9 [ 1436.839949][T27215] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 000000000000000a [ 1436.847760][T27215] RBP: 00007ff466eca120 R08: 0000000000000000 R09: 0000000000000000 [ 1436.855569][T27215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1436.863486][T27215] R13: 000000000000000b R14: 00007ff46828cfa0 R15: 00007ffd33a3fba8 [ 1437.148906][T27215] device syzkaller0 entered promiscuous mode [ 1437.155580][T27220] device veth1_macvtap left promiscuous mode [ 1437.161963][T27220] device macsec0 left promiscuous mode [ 1437.171299][T27226] device veth1_macvtap entered promiscuous mode [ 1437.177999][T27226] device macsec0 entered promiscuous mode [ 1437.292509][T27257] syz-executor.1[27257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1437.292566][T27257] syz-executor.1[27257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1437.406133][T27269] device veth1_macvtap left promiscuous mode [ 1437.423585][T27269] device macsec0 left promiscuous mode [ 1437.430702][T27269] device veth1_macvtap entered promiscuous mode [ 1437.436902][T27269] device macsec0 entered promiscuous mode [ 1437.856007][T27297] device veth1_macvtap left promiscuous mode [ 1437.861934][T27297] device macsec0 left promiscuous mode [ 1437.868878][T27297] device veth1_macvtap entered promiscuous mode [ 1437.875435][T27297] device macsec0 entered promiscuous mode [ 1438.326838][T27330] device veth1_macvtap left promiscuous mode [ 1438.333115][T27330] device macsec0 left promiscuous mode [ 1438.354588][T27330] device veth1_macvtap entered promiscuous mode [ 1438.379603][T27330] device macsec0 entered promiscuous mode [ 1438.521419][T27357] syz-executor.0[27357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1438.521456][T27357] syz-executor.0[27357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1438.590200][T27361] device veth1_macvtap left promiscuous mode [ 1438.609558][T27361] device macsec0 left promiscuous mode [ 1438.620608][T27361] device veth1_macvtap entered promiscuous mode [ 1438.626737][T27361] device macsec0 entered promiscuous mode [ 1438.762382][T27381] device syzkaller0 entered promiscuous mode [ 1438.802488][T27393] device veth1_macvtap left promiscuous mode [ 1438.808376][T27393] device macsec0 left promiscuous mode [ 1438.815421][T27393] device veth1_macvtap entered promiscuous mode [ 1438.823325][T27393] device macsec0 entered promiscuous mode [ 1438.851647][T27397] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1438.903973][T27397] syz-executor.4[27397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1438.904035][T27397] syz-executor.4[27397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1439.002677][T27415] device veth1_macvtap left promiscuous mode [ 1439.024522][T27415] device macsec0 left promiscuous mode [ 1439.033538][T27415] device veth1_macvtap entered promiscuous mode [ 1439.039679][T27415] device macsec0 entered promiscuous mode [ 1439.709724][T27518] device wg2 entered promiscuous mode [ 1439.967814][T27545] device sit0 left promiscuous mode [ 1439.999501][T27545] device sit0 entered promiscuous mode [ 1440.918976][T27611] bpf_get_probe_write_proto: 44 callbacks suppressed [ 1440.918988][T27611] syz-executor.3[27611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.928240][T27611] syz-executor.3[27611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.957603][T27611] syz-executor.3[27611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.976854][T27611] syz-executor.3[27611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.121775][T27623] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1441.172686][T27626] syz-executor.3[27626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.172744][T27626] syz-executor.3[27626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.230634][T27623] syz-executor.3[27623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.257778][T27623] syz-executor.3[27623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.421965][T27644] syz-executor.1[27644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.474588][T27644] syz-executor.1[27644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.549714][T27643] device syzkaller0 entered promiscuous mode [ 1441.669637][T27659] device pim6reg1 entered promiscuous mode [ 1441.914560][T27695] device veth1_macvtap left promiscuous mode [ 1441.922435][T27695] device macsec0 left promiscuous mode [ 1442.005234][T27694] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.012548][T27694] bridge0: port 1(bridge_slave_0) entered disabled state [ 1442.019847][T27694] device bridge_slave_0 entered promiscuous mode [ 1442.031882][T27694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.038900][T27694] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.048149][T27694] device bridge_slave_1 entered promiscuous mode [ 1442.135346][T27694] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.142234][T27694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.149304][T27694] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.156107][T27694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1442.181146][ T7137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1442.189548][ T7137] bridge0: port 1(bridge_slave_0) entered disabled state [ 1442.197992][ T7137] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.231875][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1442.245461][T29917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.252345][T29917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1442.261497][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1442.276917][T29917] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.283807][T29917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.291003][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.340872][T29910] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1442.359324][T29910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1442.372073][T27694] device veth0_vlan entered promiscuous mode [ 1442.411231][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1442.419190][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1442.450990][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1442.522629][T27694] device veth1_macvtap entered promiscuous mode [ 1442.600789][T29902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1442.622138][T29902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1442.699058][T29902] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1442.760307][T23882] device bridge_slave_1 left promiscuous mode [ 1442.781035][T23882] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.836942][T23882] device bridge_slave_0 left promiscuous mode [ 1442.897726][T23882] bridge0: port 1(bridge_slave_0) entered disabled state [ 1442.966992][T23882] device veth1_macvtap left promiscuous mode [ 1442.980300][T23882] device veth0_vlan left promiscuous mode [ 1443.226026][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1443.234595][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1443.244042][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1443.252438][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1443.414073][T27778] device syzkaller0 entered promiscuous mode [ 1443.706618][T27802] FAULT_INJECTION: forcing a failure. [ 1443.706618][T27802] name failslab, interval 1, probability 0, space 0, times 0 [ 1443.727089][T27806] FAULT_INJECTION: forcing a failure. [ 1443.727089][T27806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1443.769586][T27802] CPU: 1 PID: 27802 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1443.781119][T27802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1443.791009][T27802] Call Trace: [ 1443.794145][T27802] dump_stack_lvl+0x1e2/0x24b [ 1443.798657][T27802] ? panic+0x80b/0x80b [ 1443.802558][T27802] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1443.807853][T27802] ? drain_stock+0xf3/0x260 [ 1443.812210][T27802] dump_stack+0x15/0x17 [ 1443.816200][T27802] should_fail+0x3c6/0x510 [ 1443.820438][T27802] ? __se_sys_bpf+0x4beb/0x11cb0 [ 1443.825213][T27802] __should_failslab+0xa4/0xe0 [ 1443.829812][T27802] should_failslab+0x9/0x20 [ 1443.834149][T27802] __kmalloc_track_caller+0x5f/0x320 [ 1443.839272][T27802] memdup_user+0x25/0xb0 [ 1443.843347][T27802] __se_sys_bpf+0x4beb/0x11cb0 [ 1443.847957][T27802] ? __kasan_check_read+0x11/0x20 [ 1443.852810][T27802] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1443.858624][T27802] ? rotate_reclaimable_page+0x530/0x530 [ 1443.864093][T27802] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1443.869641][T27802] ? __x64_sys_bpf+0x90/0x90 [ 1443.874078][T27802] ? __mod_node_page_state+0xac/0xf0 [ 1443.879190][T27802] ? _kstrtoull+0x3a0/0x4a0 [ 1443.883535][T27802] ? kstrtouint_from_user+0x20a/0x2a0 [ 1443.888733][T27802] ? _raw_spin_unlock+0x4d/0x70 [ 1443.893428][T27802] ? kstrtol_from_user+0x310/0x310 [ 1443.898371][T27802] ? memset+0x35/0x40 [ 1443.902190][T27802] ? __fsnotify_parent+0x4b9/0x6c0 [ 1443.907141][T27802] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1443.913733][T27802] ? proc_fail_nth_write+0x20b/0x290 [ 1443.918863][T27802] ? proc_fail_nth_read+0x210/0x210 [ 1443.923894][T27802] ? security_file_permission+0x86/0xb0 [ 1443.929267][T27802] ? rw_verify_area+0x1c3/0x360 [ 1443.933956][T27802] ? preempt_count_add+0x92/0x1a0 [ 1443.938838][T27802] ? vfs_write+0x854/0xe70 [ 1443.943074][T27802] ? kernel_write+0x3d0/0x3d0 [ 1443.947578][T27802] ? __kasan_check_write+0x14/0x20 [ 1443.952525][T27802] ? mutex_lock+0xa5/0x110 [ 1443.956782][T27802] ? mutex_trylock+0xa0/0xa0 [ 1443.961209][T27802] ? __kasan_check_write+0x14/0x20 [ 1443.966152][T27802] ? fput_many+0x160/0x1b0 [ 1443.970418][T27802] ? debug_smp_processor_id+0x17/0x20 [ 1443.975615][T27802] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1443.981516][T27802] ? debug_smp_processor_id+0x17/0x20 [ 1443.986724][T27802] __x64_sys_bpf+0x7b/0x90 [ 1443.990994][T27802] do_syscall_64+0x34/0x70 [ 1443.995229][T27802] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1444.000956][T27802] RIP: 0033:0x7f0da1058ee9 [ 1444.005223][T27802] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1444.024647][T27802] RSP: 002b:00007f0d9fdcd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.032893][T27802] RAX: ffffffffffffffda RBX: 00007f0da118ffa0 RCX: 00007f0da1058ee9 [ 1444.040704][T27802] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 1444.048515][T27802] RBP: 00007f0d9fdcd120 R08: 0000000000000000 R09: 0000000000000000 [ 1444.056326][T27802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1444.064135][T27802] R13: 000000000000000b R14: 00007f0da118ffa0 R15: 00007ffec6dd5238 [ 1444.072100][T27806] CPU: 0 PID: 27806 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1444.083625][T27806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1444.093677][T27806] Call Trace: [ 1444.096819][T27806] dump_stack_lvl+0x1e2/0x24b [ 1444.101346][T27806] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1444.106615][T27806] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1444.112516][T27806] dump_stack+0x15/0x17 [ 1444.116510][T27806] should_fail+0x3c6/0x510 [ 1444.120769][T27806] should_fail_alloc_page+0x52/0x60 [ 1444.125796][T27806] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1444.131010][T27806] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1444.136385][T27806] ? __kasan_kmalloc+0x9/0x10 [ 1444.140905][T27806] ? __vmalloc_node_range+0x2a9/0x7c0 [ 1444.146106][T27806] __vmalloc_node_range+0x36c/0x7c0 [ 1444.151147][T27806] bpf_map_area_alloc+0xd9/0xf0 [ 1444.155822][T27806] ? prealloc_init+0x13b/0x7f0 [ 1444.160425][T27806] prealloc_init+0x13b/0x7f0 [ 1444.164853][T27806] ? __kmalloc+0x1aa/0x330 [ 1444.169106][T27806] htab_map_alloc+0x68d/0x950 [ 1444.173620][T27806] __se_sys_bpf+0x620f/0x11cb0 [ 1444.178218][T27806] ? terminate_walk+0x407/0x4f0 [ 1444.182919][T27806] ? __kasan_check_read+0x11/0x20 [ 1444.187763][T27806] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1444.193493][T27806] ? rotate_reclaimable_page+0x530/0x530 [ 1444.198958][T27806] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1444.204513][T27806] ? __x64_sys_bpf+0x90/0x90 [ 1444.208941][T27806] ? __mod_node_page_state+0xac/0xf0 [ 1444.214063][T27806] ? _kstrtoull+0x3a0/0x4a0 [ 1444.218403][T27806] ? kstrtouint_from_user+0x20a/0x2a0 [ 1444.223608][T27806] ? _raw_spin_unlock+0x4d/0x70 [ 1444.228380][T27806] ? kstrtol_from_user+0x310/0x310 [ 1444.233419][T27806] ? memset+0x35/0x40 [ 1444.237235][T27806] ? __fsnotify_parent+0x4b9/0x6c0 [ 1444.242185][T27806] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1444.248779][T27806] ? proc_fail_nth_write+0x20b/0x290 [ 1444.253900][T27806] ? proc_fail_nth_read+0x210/0x210 [ 1444.258933][T27806] ? security_file_permission+0x86/0xb0 [ 1444.264314][T27806] ? rw_verify_area+0x1c3/0x360 [ 1444.268999][T27806] ? preempt_count_add+0x92/0x1a0 [ 1444.273860][T27806] ? vfs_write+0x854/0xe70 [ 1444.278116][T27806] ? kernel_write+0x3d0/0x3d0 [ 1444.282627][T27806] ? __kasan_check_write+0x14/0x20 [ 1444.287571][T27806] ? mutex_lock+0xa5/0x110 [ 1444.291826][T27806] ? mutex_trylock+0xa0/0xa0 [ 1444.296253][T27806] ? __kasan_check_write+0x14/0x20 [ 1444.301371][T27806] ? fput_many+0x160/0x1b0 [ 1444.305850][T27806] ? debug_smp_processor_id+0x17/0x20 [ 1444.311041][T27806] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1444.316951][T27806] ? debug_smp_processor_id+0x17/0x20 [ 1444.322150][T27806] __x64_sys_bpf+0x7b/0x90 [ 1444.326412][T27806] do_syscall_64+0x34/0x70 [ 1444.330661][T27806] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1444.336395][T27806] RIP: 0033:0x7f127ffb4ee9 [ 1444.340641][T27806] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1444.360075][T27806] RSP: 002b:00007f127ed290c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1444.368332][T27806] RAX: ffffffffffffffda RBX: 00007f12800ebfa0 RCX: 00007f127ffb4ee9 [ 1444.376129][T27806] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 1444.383941][T27806] RBP: 00007f127ed29120 R08: 0000000000000000 R09: 0000000000000000 [ 1444.391749][T27806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1444.399559][T27806] R13: 000000000000000b R14: 00007f12800ebfa0 R15: 00007ffcc0dce628 [ 1444.827027][T27840] ip6_vti0: mtu greater than device maximum [ 1444.978751][T27857] device syzkaller0 entered promiscuous mode [ 1446.281815][T27928] device vxcan1 entered promiscuous mode [ 1446.326215][T27926] device syzkaller0 entered promiscuous mode [ 1448.978510][T28062] bpf_get_probe_write_proto: 12 callbacks suppressed [ 1448.978521][T28062] syz-executor.1[28062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1449.000077][T28057] device syzkaller0 entered promiscuous mode [ 1449.023344][T28062] syz-executor.1[28062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1449.243680][T28066] device syzkaller0 entered promiscuous mode [ 1449.851873][T28111] device pim6reg1 entered promiscuous mode [ 1450.119625][T28118] device syzkaller0 entered promiscuous mode [ 1450.615443][T28146] device syzkaller0 entered promiscuous mode [ 1450.811823][T28166] FAULT_INJECTION: forcing a failure. [ 1450.811823][T28166] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.946845][T28166] CPU: 0 PID: 28166 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1450.958521][T28166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1450.968411][T28166] Call Trace: [ 1450.971550][T28166] dump_stack_lvl+0x1e2/0x24b [ 1450.976057][T28166] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1450.981369][T28166] dump_stack+0x15/0x17 [ 1450.985340][T28166] should_fail+0x3c6/0x510 [ 1450.989597][T28166] ? __pskb_copy_fclone+0xae/0x1180 [ 1450.994630][T28166] __should_failslab+0xa4/0xe0 [ 1450.999228][T28166] should_failslab+0x9/0x20 [ 1451.003566][T28166] __kmalloc_track_caller+0x5f/0x320 [ 1451.008690][T28166] ? kmem_cache_alloc+0x168/0x2e0 [ 1451.013547][T28166] ? kmem_cache_alloc+0x168/0x2e0 [ 1451.018406][T28166] ? __alloc_skb+0x80/0x510 [ 1451.022748][T28166] ? __pskb_copy_fclone+0xae/0x1180 [ 1451.027783][T28166] __alloc_skb+0xbc/0x510 [ 1451.031951][T28166] __pskb_copy_fclone+0xae/0x1180 [ 1451.036815][T28166] tipc_msg_reassemble+0x1ba/0x580 [ 1451.041755][T28166] ? tipc_msg_lookup_dest+0x7f0/0x7f0 [ 1451.046961][T28166] ? ___slab_alloc+0xa5/0x4b0 [ 1451.051475][T28166] ? tipc_msg_build+0x13e/0x1040 [ 1451.056250][T28166] ? _copy_from_iter_full+0x2c2/0xa20 [ 1451.061458][T28166] ? slab_post_alloc_hook+0x80/0x2f0 [ 1451.066587][T28166] tipc_mcast_xmit+0x23d/0x1b30 [ 1451.071284][T28166] ? tipc_msg_build+0x13e/0x1040 [ 1451.076043][T28166] ? __kasan_check_write+0x14/0x20 [ 1451.080990][T28166] ? tipc_bcbase_xmit+0xb50/0xb50 [ 1451.085845][T28166] ? __check_object_size+0x94/0x3c0 [ 1451.090887][T28166] ? tipc_msg_build+0x473/0x1040 [ 1451.095661][T28166] ? __kasan_check_write+0x14/0x20 [ 1451.100602][T28166] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1451.105464][T28166] ? tipc_msg_fragment+0x760/0x760 [ 1451.110411][T28166] ? handle_pte_fault+0x174f/0x3de0 [ 1451.115449][T28166] ? __local_bh_enable_ip+0x53/0x80 [ 1451.120481][T28166] ? trace_tipc_sk_sendmcast+0x26/0x6c0 [ 1451.125861][T28166] __tipc_sendmsg+0x280d/0x3ab0 [ 1451.130555][T28166] ? get_page_from_freelist+0x2d8c/0x2f30 [ 1451.136098][T28166] ? tipc_sk_publish+0x3e0/0x3e0 [ 1451.140877][T28166] ? avc_has_perm+0x14d/0x400 [ 1451.145387][T28166] ? memcpy+0x56/0x70 [ 1451.149204][T28166] ? avc_has_perm+0x275/0x400 [ 1451.153716][T28166] ? wait_woken+0x250/0x250 [ 1451.158057][T28166] ? avc_has_perm_noaudit+0x240/0x240 [ 1451.163272][T28166] ? __kasan_check_write+0x14/0x20 [ 1451.168211][T28166] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1451.173073][T28166] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1451.178114][T28166] ? __local_bh_enable_ip+0x53/0x80 [ 1451.183141][T28166] ? local_bh_enable+0x1f/0x30 [ 1451.187741][T28166] ? lock_sock_nested+0x26a/0x300 [ 1451.192603][T28166] ? sock_init_data+0xc0/0xc0 [ 1451.197114][T28166] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1451.202848][T28166] ? rotate_reclaimable_page+0x530/0x530 [ 1451.208307][T28166] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1451.213878][T28166] tipc_sendmsg+0x55/0x70 [ 1451.218030][T28166] ? tipc_recvmsg+0x13b0/0x13b0 [ 1451.222734][T28166] ____sys_sendmsg+0x59e/0x8f0 [ 1451.227321][T28166] ? __sys_sendmsg_sock+0x40/0x40 [ 1451.232182][T28166] ? import_iovec+0xe5/0x120 [ 1451.236603][T28166] ___sys_sendmsg+0x252/0x2e0 [ 1451.241123][T28166] ? __sys_sendmsg+0x280/0x280 [ 1451.245722][T28166] ? rw_verify_area+0x1c3/0x360 [ 1451.250421][T28166] ? __fdget+0x1bc/0x240 [ 1451.254484][T28166] __se_sys_sendmsg+0x1b1/0x280 [ 1451.259171][T28166] ? __x64_sys_sendmsg+0x90/0x90 [ 1451.264076][T28166] ? ksys_write+0x260/0x2c0 [ 1451.268437][T28166] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1451.274324][T28166] ? debug_smp_processor_id+0x17/0x20 [ 1451.279522][T28166] __x64_sys_sendmsg+0x7b/0x90 [ 1451.284124][T28166] do_syscall_64+0x34/0x70 [ 1451.288379][T28166] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1451.294101][T28166] RIP: 0033:0x7f127ffb4ee9 [ 1451.298360][T28166] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1451.317799][T28166] RSP: 002b:00007f127ed290c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1451.326047][T28166] RAX: ffffffffffffffda RBX: 00007f12800ebfa0 RCX: 00007f127ffb4ee9 [ 1451.333852][T28166] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000006 [ 1451.341684][T28166] RBP: 00007f127ed29120 R08: 0000000000000000 R09: 0000000000000000 [ 1451.349476][T28166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1451.357496][T28166] R13: 000000000000000b R14: 00007f12800ebfa0 R15: 00007ffcc0dce628 [ 1451.485865][T28173] device syzkaller0 entered promiscuous mode [ 1451.743037][T28204] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1452.835318][T28238] syz-executor.2[28238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1452.835370][T28238] syz-executor.2[28238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1453.617212][T28260] device syzkaller0 entered promiscuous mode [ 1454.435692][T28318] device syzkaller0 entered promiscuous mode [ 1454.731749][T28314] syzkaller0: tun_net_xmit 1280 [ 1454.892143][T28327] syz-executor.4[28327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1454.892200][T28327] syz-executor.4[28327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.099324][T28335] syz-executor.3[28335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.153611][T28335] syz-executor.3[28335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.279030][T28354] syz-executor.3[28354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.305768][T28354] syz-executor.3[28354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.367505][T28354] syz-executor.3[28354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.380725][T28354] syz-executor.3[28354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.418978][T28363] device syzkaller0 entered promiscuous mode [ 1456.091940][T28412] device veth1_macvtap left promiscuous mode [ 1456.106427][T28412] device macsec0 left promiscuous mode [ 1456.202713][T28412] device veth1_macvtap entered promiscuous mode [ 1456.231529][T28412] device macsec0 entered promiscuous mode [ 1456.590517][T28452] tap1: tun_chr_ioctl cmd 1074025677 [ 1456.595705][T28452] tap1: linktype set to 513 [ 1456.792916][T28465] syz-executor.4[28465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1456.792982][T28465] syz-executor.4[28465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1456.857291][T28470] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1457.353585][T28524] tap0: tun_chr_ioctl cmd 1074025677 [ 1457.359027][T28524] tap0: linktype set to 513 [ 1457.529589][T28540] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1457.627250][T28543] device syzkaller0 entered promiscuous mode [ 1457.817779][T28571] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1459.114128][T28650] device syzkaller0 entered promiscuous mode [ 1459.369675][T28674] device syzkaller0 entered promiscuous mode [ 1459.510825][T28695] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1459.528843][T28697] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1459.679690][T28710] device syzkaller0 entered promiscuous mode [ 1459.752190][T28724] device wg2 entered promiscuous mode [ 1459.851376][T28735] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1460.009638][T28746] FAULT_INJECTION: forcing a failure. [ 1460.009638][T28746] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1460.060211][T28746] CPU: 0 PID: 28746 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1460.071886][T28746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1460.081794][T28746] Call Trace: [ 1460.084913][T28746] dump_stack_lvl+0x1e2/0x24b [ 1460.089425][T28746] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1460.094726][T28746] ? drain_stock+0xf3/0x260 [ 1460.099077][T28746] dump_stack+0x15/0x17 [ 1460.103046][T28746] should_fail+0x3c6/0x510 [ 1460.107298][T28746] should_fail_usercopy+0x1a/0x20 [ 1460.112156][T28746] _copy_from_user+0x20/0xd0 [ 1460.116586][T28746] memdup_user+0x5e/0xb0 [ 1460.120668][T28746] __se_sys_bpf+0x4beb/0x11cb0 [ 1460.125273][T28746] ? __kasan_check_read+0x11/0x20 [ 1460.130147][T28746] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1460.135856][T28746] ? rotate_reclaimable_page+0x530/0x530 [ 1460.141337][T28746] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1460.146883][T28746] ? __x64_sys_bpf+0x90/0x90 [ 1460.151305][T28746] ? __mod_node_page_state+0xac/0xf0 [ 1460.156417][T28746] ? _kstrtoull+0x3a0/0x4a0 [ 1460.160757][T28746] ? kstrtouint_from_user+0x20a/0x2a0 [ 1460.165967][T28746] ? _raw_spin_unlock+0x4d/0x70 [ 1460.170649][T28746] ? kstrtol_from_user+0x310/0x310 [ 1460.175596][T28746] ? memset+0x35/0x40 [ 1460.179416][T28746] ? __fsnotify_parent+0x4b9/0x6c0 [ 1460.184363][T28746] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1460.190958][T28746] ? proc_fail_nth_write+0x20b/0x290 [ 1460.196078][T28746] ? proc_fail_nth_read+0x210/0x210 [ 1460.201115][T28746] ? security_file_permission+0x86/0xb0 [ 1460.206493][T28746] ? rw_verify_area+0x1c3/0x360 [ 1460.211184][T28746] ? preempt_count_add+0x92/0x1a0 [ 1460.216040][T28746] ? vfs_write+0x854/0xe70 [ 1460.220305][T28746] ? kernel_write+0x3d0/0x3d0 [ 1460.224807][T28746] ? __kasan_check_write+0x14/0x20 [ 1460.229752][T28746] ? mutex_lock+0xa5/0x110 [ 1460.234005][T28746] ? mutex_trylock+0xa0/0xa0 [ 1460.238433][T28746] ? __kasan_check_write+0x14/0x20 [ 1460.243380][T28746] ? fput_many+0x160/0x1b0 [ 1460.247636][T28746] ? debug_smp_processor_id+0x17/0x20 [ 1460.252841][T28746] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1460.258740][T28746] ? debug_smp_processor_id+0x17/0x20 [ 1460.263951][T28746] __x64_sys_bpf+0x7b/0x90 [ 1460.268199][T28746] do_syscall_64+0x34/0x70 [ 1460.272456][T28746] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1460.278181][T28746] RIP: 0033:0x7fbdf745fee9 [ 1460.282437][T28746] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1460.301882][T28746] RSP: 002b:00007fbdf61d40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1460.310144][T28746] RAX: ffffffffffffffda RBX: 00007fbdf7596fa0 RCX: 00007fbdf745fee9 [ 1460.317931][T28746] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 1460.325744][T28746] RBP: 00007fbdf61d4120 R08: 0000000000000000 R09: 0000000000000000 [ 1460.333553][T28746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1460.341484][T28746] R13: 000000000000000b R14: 00007fbdf7596fa0 R15: 00007fff88f78308 [ 1460.399341][T28757] device pim6reg1 entered promiscuous mode [ 1460.421139][T28761] device veth1_macvtap left promiscuous mode [ 1460.426955][T28761] device macsec0 left promiscuous mode [ 1460.474295][T28765] bpf_get_probe_write_proto: 22 callbacks suppressed [ 1460.474303][T28765] syz-executor.3[28765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.486522][T28765] syz-executor.3[28765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.582990][T28771] device syzkaller0 entered promiscuous mode [ 1460.786807][T28798] device syzkaller0 entered promiscuous mode [ 1460.848009][T28810] syz-executor.3[28810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.848048][T28810] syz-executor.3[28810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.902675][T28816] device syzkaller0 entered promiscuous mode [ 1461.128641][T28844] syz-executor.3[28844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.128698][T28844] syz-executor.3[28844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.189074][T28851] syz-executor.1[28851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.200856][T28851] syz-executor.1[28851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.561249][T28890] syz-executor.3[28890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1461.573086][T28890] syz-executor.3[28890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1462.380959][T28952] device syzkaller0 entered promiscuous mode [ 1462.480656][T28964] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1463.026700][T28987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1463.033990][T28987] bridge0: port 1(bridge_slave_0) entered disabled state [ 1463.042196][T28987] device bridge_slave_0 entered promiscuous mode [ 1463.050519][T28987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1463.057407][T28987] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.064671][T28987] device bridge_slave_1 entered promiscuous mode [ 1463.106388][T28987] bridge0: port 2(bridge_slave_1) entered blocking state [ 1463.113239][T28987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1463.120338][T28987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1463.127125][T28987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1463.197502][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1463.206932][ T1517] bridge0: port 1(bridge_slave_0) entered disabled state [ 1463.215573][ T1517] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.244799][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1463.253610][ T1517] bridge0: port 1(bridge_slave_0) entered blocking state [ 1463.260471][ T1517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1463.267701][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1463.275871][ T1517] bridge0: port 2(bridge_slave_1) entered blocking state [ 1463.282714][ T1517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1463.289965][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1463.299924][T10745] device bridge_slave_1 left promiscuous mode [ 1463.306901][T10745] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.315492][T10745] device bridge_slave_0 left promiscuous mode [ 1463.321665][T10745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1463.329706][T10745] device veth0_vlan left promiscuous mode [ 1463.470210][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1463.488543][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1463.502529][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1463.514477][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1463.523715][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1463.532869][T28987] device veth0_vlan entered promiscuous mode [ 1463.550204][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1463.558966][T28987] device veth1_macvtap entered promiscuous mode [ 1463.570830][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1463.584001][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1464.053465][T29065] device pim6reg1 entered promiscuous mode [ 1465.518986][T29181] bpf_get_probe_write_proto: 19 callbacks suppressed [ 1465.518997][T29181] syz-executor.1[29181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.538503][T29183] syz-executor.2[29183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.561871][T29181] syz-executor.1[29181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.564090][T29183] syz-executor.2[29183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.694526][T29196] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.713103][T29196] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.742341][T29198] syz-executor.1[29198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.742397][T29198] syz-executor.1[29198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1465.760493][T29199] device bridge_slave_1 left promiscuous mode [ 1465.788230][T29201] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1465.798725][T29199] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.812615][T29199] device bridge_slave_0 left promiscuous mode [ 1465.821723][T29199] bridge0: port 1(bridge_slave_0) entered disabled state [ 1466.145590][T29229] syz-executor.1[29229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1466.145651][T29229] syz-executor.1[29229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1466.432696][T29245] device syzkaller0 entered promiscuous mode [ 1467.156049][T29292] syz-executor.4[29292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1467.156110][T29292] syz-executor.4[29292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1467.602310][T29330] FAULT_INJECTION: forcing a failure. [ 1467.602310][T29330] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.664076][T29330] CPU: 1 PID: 29330 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1467.675700][T29330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1467.685587][T29330] Call Trace: [ 1467.688730][T29330] dump_stack_lvl+0x1e2/0x24b [ 1467.693227][T29330] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1467.698519][T29330] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 1467.704249][T29330] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 1467.710759][T29330] ? find_next_bit+0xc7/0x100 [ 1467.715271][T29330] dump_stack+0x15/0x17 [ 1467.719261][T29330] should_fail+0x3c6/0x510 [ 1467.723520][T29330] ? kvmalloc_node+0x82/0x130 [ 1467.728029][T29330] __should_failslab+0xa4/0xe0 [ 1467.732629][T29330] should_failslab+0x9/0x20 [ 1467.736966][T29330] __kmalloc+0x60/0x330 [ 1467.740965][T29330] kvmalloc_node+0x82/0x130 [ 1467.745303][T29330] pfifo_fast_init+0x110/0x7a0 [ 1467.749900][T29330] qdisc_create_dflt+0x138/0x3d0 [ 1467.754676][T29330] mq_init+0x2c8/0x6b0 [ 1467.758581][T29330] ? local_bh_enable+0x30/0x30 [ 1467.763180][T29330] ? __kasan_check_write+0x14/0x20 [ 1467.768124][T29330] ? qdisc_alloc+0x586/0x750 [ 1467.772555][T29330] ? mutex_lock+0xa5/0x110 [ 1467.776809][T29330] qdisc_create_dflt+0x138/0x3d0 [ 1467.781579][T29330] ? _raw_spin_lock+0xa4/0x1b0 [ 1467.786180][T29330] dev_activate+0x123/0x1310 [ 1467.790611][T29330] ? bpf_prog_run_clear_cb+0x220/0x220 [ 1467.795898][T29330] ? dev_set_rx_mode+0x245/0x2e0 [ 1467.800675][T29330] __dev_open+0x3bf/0x4e0 [ 1467.804839][T29330] ? dev_open+0x260/0x260 [ 1467.809009][T29330] ? _raw_spin_unlock_bh+0x51/0x60 [ 1467.813952][T29330] ? dev_set_rx_mode+0x245/0x2e0 [ 1467.818725][T29330] ? __kasan_check_read+0x11/0x20 [ 1467.823586][T29330] __dev_change_flags+0x1db/0x6e0 [ 1467.828448][T29330] ? dev_get_flags+0x1e0/0x1e0 [ 1467.833046][T29330] ? selinux_capable+0x2f1/0x430 [ 1467.837820][T29330] ? selinux_capset+0xf0/0xf0 [ 1467.842337][T29330] dev_change_flags+0x8c/0x1a0 [ 1467.846934][T29330] dev_ifsioc+0x115/0xae0 [ 1467.851100][T29330] ? dev_ioctl+0xb40/0xb40 [ 1467.855351][T29330] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1467.860299][T29330] dev_ioctl+0x526/0xb40 [ 1467.864378][T29330] sock_do_ioctl+0x295/0x3a0 [ 1467.868803][T29330] ? sock_show_fdinfo+0xa0/0xa0 [ 1467.873493][T29330] ? kernel_write+0x3d0/0x3d0 [ 1467.878005][T29330] ? selinux_file_ioctl+0x3cc/0x540 [ 1467.883039][T29330] sock_ioctl+0x4a6/0x760 [ 1467.887206][T29330] ? sock_poll+0x340/0x340 [ 1467.891460][T29330] ? security_file_ioctl+0x84/0xb0 [ 1467.896403][T29330] ? sock_poll+0x340/0x340 [ 1467.900659][T29330] __se_sys_ioctl+0x114/0x190 [ 1467.905180][T29330] __x64_sys_ioctl+0x7b/0x90 [ 1467.909598][T29330] do_syscall_64+0x34/0x70 [ 1467.913851][T29330] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1467.919575][T29330] RIP: 0033:0x7f127ffb4ee9 [ 1467.923833][T29330] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1467.943269][T29330] RSP: 002b:00007f127ed290c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1467.951516][T29330] RAX: ffffffffffffffda RBX: 00007f12800ebfa0 RCX: 00007f127ffb4ee9 [ 1467.959334][T29330] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 000000000000000a [ 1467.967135][T29330] RBP: 00007f127ed29120 R08: 0000000000000000 R09: 0000000000000000 [ 1467.974947][T29330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1467.982767][T29330] R13: 000000000000000b R14: 00007f12800ebfa0 R15: 00007ffcc0dce628 [ 1468.020853][T29330] device syzkaller0 entered promiscuous mode [ 1468.422215][T29371] device syzkaller0 entered promiscuous mode [ 1468.865169][T29399] device syzkaller0 entered promiscuous mode [ 1469.370684][T29460] device syzkaller0 entered promiscuous mode [ 1469.629329][T29477] device syzkaller0 entered promiscuous mode [ 1470.314395][T29509] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.322134][T29509] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.464835][T29511] device bridge_slave_1 left promiscuous mode [ 1470.480595][T29511] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.540536][T29511] device bridge_slave_0 left promiscuous mode [ 1470.610544][T29511] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.270873][T29550] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1471.682186][T29588] device syzkaller0 entered promiscuous mode [ 1471.854123][T29604] bpf_get_probe_write_proto: 14 callbacks suppressed [ 1471.854133][T29604] syz-executor.3[29604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.870101][T29604] syz-executor.3[29604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.891745][T29604] syz-executor.3[29604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.903673][T29604] syz-executor.3[29604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.335120][T29653] device veth1_macvtap left promiscuous mode [ 1472.353230][T29653] device macsec0 left promiscuous mode [ 1472.393261][T29658] FAULT_INJECTION: forcing a failure. [ 1472.393261][T29658] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.407059][T29653] device veth1_macvtap entered promiscuous mode [ 1472.413647][T29653] device macsec0 entered promiscuous mode [ 1472.427841][T29658] CPU: 1 PID: 29658 Comm: syz-executor.0 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1472.439361][T29658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1472.449252][T29658] Call Trace: [ 1472.452388][T29658] dump_stack_lvl+0x1e2/0x24b [ 1472.456891][T29658] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1472.462187][T29658] dump_stack+0x15/0x17 [ 1472.466178][T29658] should_fail+0x3c6/0x510 [ 1472.470433][T29658] ? ext4_getfsmap_datadev+0xdd0/0x27b0 [ 1472.475812][T29658] __should_failslab+0xa4/0xe0 [ 1472.480411][T29658] should_failslab+0x9/0x20 [ 1472.484750][T29658] kmem_cache_alloc_trace+0x3a/0x2e0 [ 1472.489872][T29658] ? ext4_bg_num_gdb+0x1bc/0x210 [ 1472.494645][T29658] ext4_getfsmap_datadev+0xdd0/0x27b0 [ 1472.499860][T29658] ? ext4_getfsmap+0x1100/0x1100 [ 1472.504625][T29658] ? exc_page_fault+0x234/0x5b0 [ 1472.509312][T29658] ? ext4_getfsmap+0x1100/0x1100 [ 1472.514092][T29658] ? ext4_getfsmap+0x1100/0x1100 [ 1472.518859][T29658] ext4_getfsmap+0xd4e/0x1100 [ 1472.523380][T29658] ? ext4_fsmap_to_internal+0x260/0x260 [ 1472.528761][T29658] ? ext4_getfsmap+0x1100/0x1100 [ 1472.533527][T29658] ? drain_stock+0xf3/0x260 [ 1472.537866][T29658] ? ext4_ioctl_setflags+0xb10/0xb10 [ 1472.542994][T29658] ? __kasan_check_read+0x11/0x20 [ 1472.547848][T29658] ? try_charge+0x1144/0x15f0 [ 1472.552364][T29658] ? ext4_fsmap_to_internal+0x25/0x260 [ 1472.557655][T29658] ext4_ioctl+0x37b6/0x66d0 [ 1472.561998][T29658] ? avc_has_extended_perms+0x1e3/0xf70 [ 1472.567375][T29658] ? memcpy+0x56/0x70 [ 1472.571199][T29658] ? avc_has_extended_perms+0x975/0xf70 [ 1472.576578][T29658] ? ext4_reset_inode_seed+0x700/0x700 [ 1472.581876][T29658] ? __mod_node_page_state+0xac/0xf0 [ 1472.586990][T29658] ? avc_ss_reset+0x280/0x280 [ 1472.591507][T29658] ? _kstrtoull+0x3a0/0x4a0 [ 1472.595847][T29658] ? kstrtouint_from_user+0x20a/0x2a0 [ 1472.601054][T29658] ? kstrtol_from_user+0x310/0x310 [ 1472.606002][T29658] ? __fsnotify_parent+0x4b9/0x6c0 [ 1472.610954][T29658] ? preempt_count_add+0x92/0x1a0 [ 1472.615808][T29658] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1472.621015][T29658] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1472.625965][T29658] ? kernel_write+0x3d0/0x3d0 [ 1472.630479][T29658] ? selinux_file_ioctl+0x3cc/0x540 [ 1472.635510][T29658] ? selinux_file_alloc_security+0x120/0x120 [ 1472.641327][T29658] ? __fget_files+0x31e/0x380 [ 1472.645927][T29658] ? security_file_ioctl+0x84/0xb0 [ 1472.650870][T29658] ? ext4_reset_inode_seed+0x700/0x700 [ 1472.656162][T29658] __se_sys_ioctl+0x114/0x190 [ 1472.660679][T29658] __x64_sys_ioctl+0x7b/0x90 [ 1472.665104][T29658] do_syscall_64+0x34/0x70 [ 1472.669355][T29658] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1472.675084][T29658] RIP: 0033:0x7f4431ffeee9 [ 1472.679339][T29658] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1472.698775][T29658] RSP: 002b:00007f4430d730c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1472.707021][T29658] RAX: ffffffffffffffda RBX: 00007f4432135fa0 RCX: 00007f4431ffeee9 [ 1472.714831][T29658] RDX: 0000000020000040 RSI: 00000000c0c0583b RDI: 0000000000000004 [ 1472.722643][T29658] RBP: 00007f4430d73120 R08: 0000000000000000 R09: 0000000000000000 [ 1472.730456][T29658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1472.738270][T29658] R13: 000000000000000b R14: 00007f4432135fa0 R15: 00007ffc67db5f28 [ 1472.948926][T29686] device syzkaller0 entered promiscuous mode [ 1472.959408][T29686] syz-executor.2[29686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.959463][T29686] syz-executor.2[29686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1473.803037][T29726] syz-executor.0[29726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1473.897429][T29726] syz-executor.0[29726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1473.973542][T29725] device syzkaller0 entered promiscuous mode [ 1474.251835][T29758] syz-executor.2[29758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1474.251891][T29758] syz-executor.2[29758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1474.350436][T29751] device syzkaller0 entered promiscuous mode [ 1474.842155][T29793] device syzkaller0 entered promiscuous mode [ 1474.971716][T29803] device wg2 entered promiscuous mode [ 1475.180739][T29830] device veth1_macvtap left promiscuous mode [ 1475.506442][T29856] device syzkaller0 entered promiscuous mode [ 1475.644739][T29871] device syzkaller0 entered promiscuous mode [ 1476.982539][T29985] device syzkaller0 entered promiscuous mode [ 1477.358087][T29991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.365082][T29991] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.376925][T29991] device bridge_slave_0 entered promiscuous mode [ 1477.383819][T29991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.391447][T29991] bridge0: port 2(bridge_slave_1) entered disabled state [ 1477.398788][T29991] device bridge_slave_1 entered promiscuous mode [ 1477.493902][T29991] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.500784][T29991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1477.507848][T29991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.514652][T29991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1477.526059][T24576] bridge0: port 1(bridge_slave_0) entered disabled state [ 1477.534296][T24576] bridge0: port 2(bridge_slave_1) entered disabled state [ 1477.625382][T30035] device syzkaller0 entered promiscuous mode [ 1477.640132][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1477.649699][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1477.664897][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1477.673274][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1477.681676][ T1783] bridge0: port 1(bridge_slave_0) entered blocking state [ 1477.688525][ T1783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1477.695905][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1477.704147][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1477.712220][ T1783] bridge0: port 2(bridge_slave_1) entered blocking state [ 1477.719071][ T1783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1477.757003][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1477.767034][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1477.787583][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1477.798048][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1477.826420][T29991] device veth0_vlan entered promiscuous mode [ 1477.843148][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1477.865636][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1477.879356][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1477.887224][ T1773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1477.900310][T30045] geneve1: tun_chr_ioctl cmd 19271 [ 1477.909423][T29991] device veth1_macvtap entered promiscuous mode [ 1477.920557][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1477.927807][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1477.935279][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1477.943318][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1477.951654][ T1783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1478.009258][ T7130] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1478.019063][ T7130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1478.056270][T30050] FAULT_INJECTION: forcing a failure. [ 1478.056270][T30050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1478.076027][T30050] CPU: 0 PID: 30050 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1478.087552][T30050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1478.097441][T30050] Call Trace: [ 1478.100445][ T7130] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1478.100587][T30050] dump_stack_lvl+0x1e2/0x24b [ 1478.108703][ T7130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1478.112900][T30050] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1478.112924][T30050] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1478.131999][T30050] dump_stack+0x15/0x17 [ 1478.135982][T30050] should_fail+0x3c6/0x510 [ 1478.140245][T30050] should_fail_alloc_page+0x52/0x60 [ 1478.145271][T30050] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1478.150507][T30050] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1478.155868][T30050] ? __kasan_kmalloc+0x9/0x10 [ 1478.160377][T30050] ? __vmalloc_node_range+0x2a9/0x7c0 [ 1478.165584][T30050] __vmalloc_node_range+0x36c/0x7c0 [ 1478.170622][T30050] bpf_map_area_alloc+0xd9/0xf0 [ 1478.175298][T30050] ? prealloc_init+0x13b/0x7f0 [ 1478.179901][T30050] prealloc_init+0x13b/0x7f0 [ 1478.184327][T30050] ? __kmalloc+0x1aa/0x330 [ 1478.188583][T30050] htab_map_alloc+0x68d/0x950 [ 1478.193098][T30050] __se_sys_bpf+0x620f/0x11cb0 [ 1478.197696][T30050] ? terminate_walk+0x407/0x4f0 [ 1478.202384][T30050] ? __kasan_check_read+0x11/0x20 [ 1478.207244][T30050] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1478.212972][T30050] ? rotate_reclaimable_page+0x530/0x530 [ 1478.218550][T30050] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1478.224103][T30050] ? __x64_sys_bpf+0x90/0x90 [ 1478.228527][T30050] ? __mod_node_page_state+0xac/0xf0 [ 1478.233649][T30050] ? _kstrtoull+0x3a0/0x4a0 [ 1478.237991][T30050] ? kstrtouint_from_user+0x20a/0x2a0 [ 1478.243195][T30050] ? _raw_spin_unlock+0x4d/0x70 [ 1478.247885][T30050] ? kstrtol_from_user+0x310/0x310 [ 1478.252832][T30050] ? memset+0x35/0x40 [ 1478.256647][T30050] ? __fsnotify_parent+0x4b9/0x6c0 [ 1478.261598][T30050] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1478.268189][T30050] ? proc_fail_nth_write+0x20b/0x290 [ 1478.273312][T30050] ? proc_fail_nth_read+0x210/0x210 [ 1478.278347][T30050] ? security_file_permission+0x86/0xb0 [ 1478.283724][T30050] ? rw_verify_area+0x1c3/0x360 [ 1478.288411][T30050] ? preempt_count_add+0x92/0x1a0 [ 1478.293270][T30050] ? vfs_write+0x854/0xe70 [ 1478.297525][T30050] ? kernel_write+0x3d0/0x3d0 [ 1478.302125][T30050] ? __kasan_check_write+0x14/0x20 [ 1478.307070][T30050] ? mutex_lock+0xa5/0x110 [ 1478.311333][T30050] ? mutex_trylock+0xa0/0xa0 [ 1478.315753][T30050] ? __kasan_check_write+0x14/0x20 [ 1478.320698][T30050] ? fput_many+0x160/0x1b0 [ 1478.324955][T30050] ? debug_smp_processor_id+0x17/0x20 [ 1478.330179][T30050] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1478.336060][T30050] ? debug_smp_processor_id+0x17/0x20 [ 1478.341271][T30050] __x64_sys_bpf+0x7b/0x90 [ 1478.345535][T30050] do_syscall_64+0x34/0x70 [ 1478.349774][T30050] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1478.355499][T30050] RIP: 0033:0x7fe4dc75dee9 [ 1478.359753][T30050] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1478.379283][T30050] RSP: 002b:00007fe4db4d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1478.387528][T30050] RAX: ffffffffffffffda RBX: 00007fe4dc894fa0 RCX: 00007fe4dc75dee9 [ 1478.395335][T30050] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 1478.403146][T30050] RBP: 00007fe4db4d2120 R08: 0000000000000000 R09: 0000000000000000 [ 1478.411046][T30050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1478.418856][T30050] R13: 000000000000000b R14: 00007fe4dc894fa0 R15: 00007ffc15d521a8 [ 1478.561385][T10745] device veth1_macvtap left promiscuous mode [ 1478.567231][T10745] device veth0_vlan left promiscuous mode [ 1479.655025][T30130] device syzkaller0 entered promiscuous mode [ 1479.790021][T30143] geneve1: tun_chr_ioctl cmd 1074025681 [ 1480.210499][T30180] bpf_get_probe_write_proto: 15 callbacks suppressed [ 1480.210510][T30180] syz-executor.4[30180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.217370][T30180] syz-executor.4[30180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.245985][T30184] syz-executor.3[30184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.257626][T30184] syz-executor.3[30184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.275510][T30184] syz-executor.3[30184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.300546][T30184] syz-executor.3[30184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.928183][T30259] device veth1_macvtap left promiscuous mode [ 1480.987239][T30266] device veth1_macvtap entered promiscuous mode [ 1480.993460][T30266] device macsec0 entered promiscuous mode [ 1481.166683][T30280] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 2304 (only 8 groups) [ 1481.204502][T30282] device syzkaller0 entered promiscuous mode [ 1481.521137][T30310] FAULT_INJECTION: forcing a failure. [ 1481.521137][T30310] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.542079][T30310] CPU: 0 PID: 30310 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1481.553610][T30310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1481.563528][T30310] Call Trace: [ 1481.566640][T30310] dump_stack_lvl+0x1e2/0x24b [ 1481.571150][T30310] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1481.576445][T30310] dump_stack+0x15/0x17 [ 1481.580431][T30310] should_fail+0x3c6/0x510 [ 1481.584684][T30310] ? __alloc_skb+0x80/0x510 [ 1481.589110][T30310] __should_failslab+0xa4/0xe0 [ 1481.593711][T30310] should_failslab+0x9/0x20 [ 1481.598048][T30310] kmem_cache_alloc+0x3d/0x2e0 [ 1481.602649][T30310] __alloc_skb+0x80/0x510 [ 1481.606815][T30310] ? __kasan_slab_free+0x11/0x20 [ 1481.611592][T30310] __pskb_copy_fclone+0xae/0x1180 [ 1481.616448][T30310] ? kfree+0xc3/0x270 [ 1481.620276][T30310] ? tipc_nametbl_mc_lookup+0x382/0xb10 [ 1481.625654][T30310] tipc_sk_mcast_rcv+0x5d7/0x10b0 [ 1481.630523][T30310] ? tsk_set_importance+0x1c0/0x1c0 [ 1481.635540][T30310] ? tipc_msg_reassemble+0x1d0/0x580 [ 1481.640666][T30310] ? tipc_msg_lookup_dest+0x7f0/0x7f0 [ 1481.645875][T30310] ? _copy_from_iter_full+0x2c2/0xa20 [ 1481.651079][T30310] ? slab_post_alloc_hook+0x80/0x2f0 [ 1481.656206][T30310] tipc_mcast_xmit+0x144a/0x1b30 [ 1481.660979][T30310] ? tipc_msg_build+0x13e/0x1040 [ 1481.665751][T30310] ? __kasan_check_write+0x14/0x20 [ 1481.670696][T30310] ? tipc_bcbase_xmit+0xb50/0xb50 [ 1481.675554][T30310] ? __check_object_size+0x94/0x3c0 [ 1481.680594][T30310] ? tipc_msg_build+0x473/0x1040 [ 1481.685366][T30310] ? __kasan_check_write+0x14/0x20 [ 1481.690311][T30310] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1481.695167][T30310] ? tipc_msg_fragment+0x760/0x760 [ 1481.700114][T30310] ? handle_pte_fault+0x174f/0x3de0 [ 1481.705240][T30310] ? __local_bh_enable_ip+0x53/0x80 [ 1481.710276][T30310] ? trace_tipc_sk_sendmcast+0x26/0x6c0 [ 1481.715651][T30310] __tipc_sendmsg+0x280d/0x3ab0 [ 1481.720347][T30310] ? __kasan_check_read+0x11/0x20 [ 1481.725204][T30310] ? propagate_protected_usage+0x85/0x260 [ 1481.730755][T30310] ? tipc_sk_publish+0x3e0/0x3e0 [ 1481.735532][T30310] ? avc_has_perm+0x14d/0x400 [ 1481.740040][T30310] ? memcpy+0x56/0x70 [ 1481.743865][T30310] ? avc_has_perm+0x275/0x400 [ 1481.748375][T30310] ? wait_woken+0x250/0x250 [ 1481.752712][T30310] ? avc_has_perm_noaudit+0x240/0x240 [ 1481.757925][T30310] ? __kasan_check_write+0x14/0x20 [ 1481.762867][T30310] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1481.767726][T30310] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1481.772769][T30310] ? __local_bh_enable_ip+0x53/0x80 [ 1481.777799][T30310] ? local_bh_enable+0x1f/0x30 [ 1481.782398][T30310] ? lock_sock_nested+0x26a/0x300 [ 1481.787266][T30310] ? sock_init_data+0xc0/0xc0 [ 1481.791774][T30310] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1481.797507][T30310] ? rotate_reclaimable_page+0x530/0x530 [ 1481.802967][T30310] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1481.808524][T30310] tipc_sendmsg+0x55/0x70 [ 1481.812686][T30310] ? tipc_recvmsg+0x13b0/0x13b0 [ 1481.817372][T30310] ____sys_sendmsg+0x59e/0x8f0 [ 1481.821977][T30310] ? __sys_sendmsg_sock+0x40/0x40 [ 1481.826836][T30310] ? import_iovec+0xe5/0x120 [ 1481.831262][T30310] ___sys_sendmsg+0x252/0x2e0 [ 1481.835775][T30310] ? __sys_sendmsg+0x280/0x280 [ 1481.840377][T30310] ? rw_verify_area+0x1c3/0x360 [ 1481.845076][T30310] ? __fdget+0x1bc/0x240 [ 1481.849139][T30310] __se_sys_sendmsg+0x1b1/0x280 [ 1481.853826][T30310] ? __x64_sys_sendmsg+0x90/0x90 [ 1481.858597][T30310] ? ksys_write+0x260/0x2c0 [ 1481.862944][T30310] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1481.868840][T30310] ? debug_smp_processor_id+0x17/0x20 [ 1481.874050][T30310] __x64_sys_sendmsg+0x7b/0x90 [ 1481.878646][T30310] do_syscall_64+0x34/0x70 [ 1481.882903][T30310] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1481.888742][T30310] RIP: 0033:0x7fe4dc75dee9 [ 1481.892999][T30310] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1481.912434][T30310] RSP: 002b:00007fe4db4d20c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1481.920683][T30310] RAX: ffffffffffffffda RBX: 00007fe4dc894fa0 RCX: 00007fe4dc75dee9 [ 1481.928492][T30310] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000006 [ 1481.936303][T30310] RBP: 00007fe4db4d2120 R08: 0000000000000000 R09: 0000000000000000 [ 1481.944115][T30310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1481.951926][T30310] R13: 000000000000000b R14: 00007fe4dc894fa0 R15: 00007ffc15d521a8 [ 1482.000061][T30310] tipc: Failed to clone mcast rcv buffer [ 1482.216895][T30328] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.226721][T30328] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.238814][T30328] device bridge_slave_0 entered promiscuous mode [ 1482.249870][T30328] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.256808][T30328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.264504][T30328] device bridge_slave_1 entered promiscuous mode [ 1482.347766][T30328] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.354614][T30328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.361769][T30328] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.368595][T30328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.392192][T24565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1482.404359][T24565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.422416][T24565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.454374][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1482.467015][T29917] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.473878][T29917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.481840][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1482.495260][T29917] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.502129][T29917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.521206][T29910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1482.530538][T29910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1482.565510][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1482.594318][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1482.603045][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1482.612469][T29917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1482.624109][T30328] device veth0_vlan entered promiscuous mode [ 1482.636019][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1482.645470][T30328] device veth1_macvtap entered promiscuous mode [ 1482.669893][T24558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1482.688936][T24576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1482.697323][T24576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1482.723531][T10745] device bridge_slave_1 left promiscuous mode [ 1482.734120][T10745] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.745537][T10745] device bridge_slave_0 left promiscuous mode [ 1482.751823][T10745] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.759425][T10745] device veth0_vlan left promiscuous mode [ 1483.030584][T30389] device syzkaller0 entered promiscuous mode [ 1483.039360][T30412] device veth1_macvtap left promiscuous mode [ 1483.056618][T30415] device syzkaller0 entered promiscuous mode [ 1483.075877][T30412] device veth1_macvtap entered promiscuous mode [ 1483.082381][T30412] device macsec0 entered promiscuous mode [ 1483.170570][T30426] device veth1_macvtap entered promiscuous mode [ 1483.182603][T30426] device macsec0 entered promiscuous mode [ 1483.189532][T29910] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1483.329264][T30442] device veth1_macvtap left promiscuous mode [ 1483.341377][T30442] device veth1_macvtap entered promiscuous mode [ 1483.348074][T30442] device macsec0 entered promiscuous mode [ 1483.476862][T30469] device veth1_macvtap left promiscuous mode [ 1483.482901][T30469] device macsec0 left promiscuous mode [ 1483.489153][T30471] device veth1_macvtap left promiscuous mode [ 1483.495369][T30471] device macsec0 left promiscuous mode [ 1483.501943][T30469] device veth1_macvtap entered promiscuous mode [ 1483.510081][T30469] device macsec0 entered promiscuous mode [ 1483.516384][T30471] device veth1_macvtap entered promiscuous mode [ 1483.523034][T30471] device macsec0 entered promiscuous mode [ 1483.684063][T30499] device veth1_macvtap left promiscuous mode [ 1483.690170][T30499] device macsec0 left promiscuous mode [ 1483.699594][T30499] device veth1_macvtap entered promiscuous mode [ 1483.705886][T30499] device macsec0 entered promiscuous mode [ 1483.733273][T30502] device veth1_macvtap left promiscuous mode [ 1483.740161][T30502] device macsec0 left promiscuous mode [ 1483.755889][T30502] device veth1_macvtap entered promiscuous mode [ 1483.762470][T30502] device macsec0 entered promiscuous mode [ 1483.882392][T30522] device veth1_macvtap left promiscuous mode [ 1483.888316][T30522] device macsec0 left promiscuous mode [ 1483.901899][T30522] device veth1_macvtap entered promiscuous mode [ 1483.908262][T30522] device macsec0 entered promiscuous mode [ 1483.929324][T30532] device veth1_macvtap left promiscuous mode [ 1483.941696][T30532] device macsec0 left promiscuous mode [ 1483.950468][T30532] device veth1_macvtap entered promiscuous mode [ 1483.956598][T30532] device macsec0 entered promiscuous mode [ 1483.973589][T30534] device syzkaller0 entered promiscuous mode [ 1484.455879][T30587] device syzkaller0 entered promiscuous mode [ 1484.492192][T30589] syz-executor.0[30589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1484.492245][T30589] syz-executor.0[30589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1484.529364][T30589] syz-executor.0[30589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1484.579488][T30589] syz-executor.0[30589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.322474][T30642] bpf_get_probe_write_proto: 10 callbacks suppressed [ 1485.322485][T30642] syz-executor.3[30642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.364873][T30642] syz-executor.3[30642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.398551][T30627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.417230][T30627] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.436789][T30627] device bridge_slave_0 entered promiscuous mode [ 1485.446288][T30627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.453256][T30627] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.460800][T30627] device bridge_slave_1 entered promiscuous mode [ 1485.538787][T30656] device veth1_macvtap left promiscuous mode [ 1485.569750][T30656] device macsec0 left promiscuous mode [ 1485.583415][T30627] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.590366][T30627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.597452][T30627] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.604246][T30627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.612305][T30658] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1485.626125][T30656] device veth1_macvtap entered promiscuous mode [ 1485.643331][T30656] device macsec0 entered promiscuous mode [ 1485.660283][T24569] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.667824][T30660] syz-executor.0[30660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.667882][T30660] syz-executor.0[30660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.679805][T24569] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.703233][T30658] syz-executor.0[30658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.703284][T30658] syz-executor.0[30658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.763423][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1485.861690][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1485.869733][T30575] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.876593][T30575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.883987][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1485.892085][T30575] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.898917][T30575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.920717][T30664] device syzkaller0 entered promiscuous mode [ 1485.950226][T24569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1485.960345][T24569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1485.976867][T24569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1485.984821][T24569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1486.005525][T30627] device veth0_vlan entered promiscuous mode [ 1486.016961][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1486.027798][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1486.036188][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1486.044261][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1486.052366][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1486.059569][T22093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1486.070610][ T9] device veth1_macvtap left promiscuous mode [ 1486.076460][ T9] device veth0_vlan left promiscuous mode [ 1486.227812][T30627] device veth1_macvtap entered promiscuous mode [ 1486.258532][T30690] device syzkaller0 entered promiscuous mode [ 1486.265173][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1486.275867][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1486.285434][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1486.299206][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1486.311085][ T1517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1486.337513][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1486.346995][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1486.686791][T30735] €Â: renamed from pim6reg1 [ 1486.962194][T30757] device syzkaller0 entered promiscuous mode [ 1487.124179][T30777] syz-executor.1[30777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.124217][T30777] syz-executor.1[30777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.214791][T30781] EXT4-fs warning (device sda1): ext4_group_extend:1812: need to use ext2online to resize further [ 1487.485957][T30818] syz-executor.1[30818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.487279][T30818] syz-executor.1[30818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.631217][T30835] device veth1_macvtap left promiscuous mode [ 1487.670319][T30835] device macsec0 left promiscuous mode [ 1487.678666][T30835] device veth1_macvtap entered promiscuous mode [ 1487.695025][T30835] device macsec0 entered promiscuous mode [ 1488.180368][T30879] device syzkaller0 entered promiscuous mode [ 1488.644596][T30903] : renamed from ipvlan1 [ 1488.721053][T30912] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1488.746296][T30907] bridge0: port 1(bridge_slave_0) entered blocking state [ 1488.753215][T30907] bridge0: port 1(bridge_slave_0) entered disabled state [ 1488.760459][T30907] device bridge_slave_0 entered promiscuous mode [ 1488.767199][T30907] bridge0: port 2(bridge_slave_1) entered blocking state [ 1488.774061][T30907] bridge0: port 2(bridge_slave_1) entered disabled state [ 1488.781307][T30907] device bridge_slave_1 entered promiscuous mode [ 1488.873515][T30907] bridge0: port 2(bridge_slave_1) entered blocking state [ 1488.880373][T30907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1488.887443][T30907] bridge0: port 1(bridge_slave_0) entered blocking state [ 1488.894253][T30907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1488.908906][T30916] bridge0: port 1(bridge_slave_0) entered blocking state [ 1488.919553][T30916] bridge0: port 1(bridge_slave_0) entered disabled state [ 1488.927318][T30916] device bridge_slave_0 entered promiscuous mode [ 1488.946431][T30916] bridge0: port 2(bridge_slave_1) entered blocking state [ 1488.953477][T30916] bridge0: port 2(bridge_slave_1) entered disabled state [ 1488.960974][T30916] device bridge_slave_1 entered promiscuous mode [ 1489.007127][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1489.014826][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1489.023350][T30575] bridge0: port 2(bridge_slave_1) entered disabled state [ 1489.041950][T30581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1489.050113][T30581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1489.056951][T30581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1489.112012][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1489.122834][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1489.148905][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1489.178600][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1489.186910][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1489.194197][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1489.201639][T30947] FAULT_INJECTION: forcing a failure. [ 1489.201639][T30947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1489.215001][T30947] CPU: 0 PID: 30947 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1489.217472][T30907] device veth0_vlan entered promiscuous mode [ 1489.226513][T30947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1489.226518][T30947] Call Trace: [ 1489.226539][T30947] dump_stack_lvl+0x1e2/0x24b [ 1489.226560][T30947] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1489.252051][T30907] device veth1_macvtap entered promiscuous mode [ 1489.255167][T30947] dump_stack+0x15/0x17 [ 1489.255184][T30947] should_fail+0x3c6/0x510 [ 1489.269487][T30947] should_fail_usercopy+0x1a/0x20 [ 1489.274341][T30947] _copy_from_user+0x20/0xd0 [ 1489.278765][T30947] __se_sys_bpf+0x761c/0x11cb0 [ 1489.283375][T30947] ? __kasan_check_read+0x11/0x20 [ 1489.288227][T30947] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1489.293959][T30947] ? rotate_reclaimable_page+0x530/0x530 [ 1489.299418][T30947] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1489.304984][T30947] ? __x64_sys_bpf+0x90/0x90 [ 1489.309401][T30947] ? __mod_node_page_state+0xac/0xf0 [ 1489.314525][T30947] ? _kstrtoull+0x3a0/0x4a0 [ 1489.318866][T30947] ? kstrtouint_from_user+0x20a/0x2a0 [ 1489.324071][T30947] ? _raw_spin_unlock+0x4d/0x70 [ 1489.328754][T30947] ? kstrtol_from_user+0x310/0x310 [ 1489.333704][T30947] ? memset+0x35/0x40 [ 1489.337521][T30947] ? __fsnotify_parent+0x4b9/0x6c0 [ 1489.342471][T30947] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1489.349063][T30947] ? proc_fail_nth_write+0x20b/0x290 [ 1489.354298][T30947] ? proc_fail_nth_read+0x210/0x210 [ 1489.359318][T30947] ? security_file_permission+0x86/0xb0 [ 1489.364704][T30947] ? rw_verify_area+0x1c3/0x360 [ 1489.369386][T30947] ? preempt_count_add+0x92/0x1a0 [ 1489.374248][T30947] ? vfs_write+0x854/0xe70 [ 1489.378507][T30947] ? kernel_write+0x3d0/0x3d0 [ 1489.383034][T30947] ? __kasan_check_write+0x14/0x20 [ 1489.387958][T30947] ? mutex_lock+0xa5/0x110 [ 1489.392211][T30947] ? mutex_trylock+0xa0/0xa0 [ 1489.396644][T30947] ? __kasan_check_write+0x14/0x20 [ 1489.401592][T30947] ? fput_many+0x160/0x1b0 [ 1489.405842][T30947] ? debug_smp_processor_id+0x17/0x20 [ 1489.411056][T30947] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1489.417075][T30947] ? debug_smp_processor_id+0x17/0x20 [ 1489.422265][T30947] __x64_sys_bpf+0x7b/0x90 [ 1489.426520][T30947] do_syscall_64+0x34/0x70 [ 1489.430784][T30947] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1489.436497][T30947] RIP: 0033:0x7fe4dc75dee9 [ 1489.440752][T30947] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1489.460301][T30947] RSP: 002b:00007fe4db4d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1489.468541][T30947] RAX: ffffffffffffffda RBX: 00007fe4dc894fa0 RCX: 00007fe4dc75dee9 [ 1489.476352][T30947] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 1489.484161][T30947] RBP: 00007fe4db4d2120 R08: 0000000000000000 R09: 0000000000000000 [ 1489.491970][T30947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1489.499793][T30947] R13: 000000000000000b R14: 00007fe4dc894fa0 R15: 00007ffc15d521a8 [ 1489.516277][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1489.524521][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1489.532731][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1489.610491][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1489.620759][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1489.640734][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1489.651233][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1489.659441][T30578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1489.666289][T30578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1489.674046][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1489.683376][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1489.691630][T30578] bridge0: port 2(bridge_slave_1) entered blocking state [ 1489.698477][T30578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1489.711254][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1489.738289][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1489.747841][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1489.764959][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1489.778967][T30963] device pim6reg1 entered promiscuous mode [ 1489.797083][T30916] device veth0_vlan entered promiscuous mode [ 1489.806429][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1489.814272][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1489.822500][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1489.833242][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1489.841214][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1489.861209][T30968] device syzkaller0 entered promiscuous mode [ 1489.876243][T30916] device veth1_macvtap entered promiscuous mode [ 1489.885540][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1489.893027][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1489.900709][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1489.908706][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1489.917349][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1489.926488][ T9] device bridge_slave_1 left promiscuous mode [ 1489.932726][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1489.940575][ T9] device bridge_slave_0 left promiscuous mode [ 1489.946706][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1489.955005][ T9] device veth1_macvtap left promiscuous mode [ 1489.961303][ T9] device veth0_vlan left promiscuous mode [ 1490.067642][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1490.075853][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1490.118023][T30975] device syzkaller0 entered promiscuous mode [ 1490.125945][ T1778] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1490.137291][ T1778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1490.202457][T30988] FAULT_INJECTION: forcing a failure. [ 1490.202457][T30988] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1490.215721][T30988] CPU: 1 PID: 30988 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1490.227232][T30988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1490.237123][T30988] Call Trace: [ 1490.240267][T30988] dump_stack_lvl+0x1e2/0x24b [ 1490.244778][T30988] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1490.250060][T30988] ? __kasan_check_write+0x14/0x20 [ 1490.255014][T30988] dump_stack+0x15/0x17 [ 1490.258995][T30988] should_fail+0x3c6/0x510 [ 1490.263257][T30988] should_fail_alloc_page+0x52/0x60 [ 1490.268284][T30988] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1490.273496][T30988] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1490.278875][T30988] ? page_cache_prev_miss+0x410/0x410 [ 1490.284084][T30988] ? jbd2_journal_stop+0x8be/0xd40 [ 1490.289028][T30988] pagecache_get_page+0x669/0x950 [ 1490.293892][T30988] grab_cache_page_write_begin+0x5d/0xa0 [ 1490.299357][T30988] ext4_da_write_begin+0x587/0xf60 [ 1490.304306][T30988] ? kmem_cache_free+0x1c0/0x1e0 [ 1490.309077][T30988] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 1490.314201][T30988] ? __kasan_check_write+0x14/0x20 [ 1490.319145][T30988] ? _raw_spin_lock+0xa4/0x1b0 [ 1490.323747][T30988] ? _raw_spin_trylock_bh+0x190/0x190 [ 1490.328951][T30988] ? __kasan_check_write+0x14/0x20 [ 1490.333897][T30988] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1490.339636][T30988] ? uuid_parse+0x470/0x470 [ 1490.343978][T30988] ? trace_writeback_dirty_inode_enqueue+0x1b/0x110 [ 1490.350390][T30988] ? __mark_inode_dirty+0x63e/0x9d0 [ 1490.355424][T30988] generic_perform_write+0x2cd/0x570 [ 1490.360549][T30988] ? __mnt_drop_write_file+0x84/0xa0 [ 1490.365667][T30988] ? file_remove_privs+0x570/0x570 [ 1490.370617][T30988] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1490.376268][T30988] ? down_write+0xd7/0x150 [ 1490.380517][T30988] ? down_read_killable+0x220/0x220 [ 1490.385555][T30988] ? generic_write_checks+0x3b9/0x470 [ 1490.390766][T30988] ext4_buffered_write_iter+0x482/0x610 [ 1490.396133][T30988] ext4_file_write_iter+0x193/0x1c80 [ 1490.401259][T30988] ? kstrtol_from_user+0x310/0x310 [ 1490.406200][T30988] ? memset+0x35/0x40 [ 1490.410017][T30988] ? avc_policy_seqno+0x1b/0x70 [ 1490.414704][T30988] ? selinux_file_permission+0x2bb/0x560 [ 1490.420208][T30988] ? fsnotify_perm+0x67/0x4e0 [ 1490.424688][T30988] ? ext4_file_read_iter+0x4d0/0x4d0 [ 1490.429833][T30988] ? security_file_permission+0x86/0xb0 [ 1490.435186][T30988] ? iov_iter_init+0x3f/0x120 [ 1490.439701][T30988] vfs_write+0xb55/0xe70 [ 1490.443782][T30988] ? kernel_write+0x3d0/0x3d0 [ 1490.448291][T30988] ? mutex_trylock+0xa0/0xa0 [ 1490.452719][T30988] ? __fdget_pos+0x2e7/0x3a0 [ 1490.457140][T30988] ? ksys_write+0x77/0x2c0 [ 1490.461416][T30988] ksys_write+0x199/0x2c0 [ 1490.465560][T30988] ? bpf_trace_run1+0x210/0x210 [ 1490.470255][T30988] ? __ia32_sys_read+0x90/0x90 [ 1490.474848][T30988] ? debug_smp_processor_id+0x17/0x20 [ 1490.480058][T30988] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1490.485959][T30988] ? __bpf_trace_sys_enter+0x62/0x70 [ 1490.491080][T30988] __x64_sys_write+0x7b/0x90 [ 1490.495505][T30988] do_syscall_64+0x34/0x70 [ 1490.499759][T30988] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.505486][T30988] RIP: 0033:0x7f97b120cee9 [ 1490.509738][T30988] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1490.529178][T30988] RSP: 002b:00007f97aff810c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1490.537437][T30988] RAX: ffffffffffffffda RBX: 00007f97b1343fa0 RCX: 00007f97b120cee9 [ 1490.545242][T30988] RDX: 0000000000000009 RSI: 0000000020000000 RDI: 000000000000000a [ 1490.553053][T30988] RBP: 00007f97aff81120 R08: 0000000000000000 R09: 0000000000000000 [ 1490.560858][T30988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1490.568666][T30988] R13: 000000000000000b R14: 00007f97b1343fa0 R15: 00007fff58a499e8 [ 1490.678192][T31002] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1490.729506][T31005] bpf_get_probe_write_proto: 8 callbacks suppressed [ 1490.729513][T31005] syz-executor.1[31005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.736166][T31005] syz-executor.1[31005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.748925][T31005] syz-executor.1[31005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.760976][T31005] syz-executor.1[31005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.779485][T31004] device pim6reg1 entered promiscuous mode [ 1491.087493][T31047] device syzkaller0 entered promiscuous mode [ 1491.244065][ T9] device bridge_slave_1 left promiscuous mode [ 1491.255622][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1491.270555][ T9] device bridge_slave_0 left promiscuous mode [ 1491.276519][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1491.291192][ T9] device veth1_macvtap left promiscuous mode [ 1491.300584][ T9] device veth0_vlan left promiscuous mode [ 1492.174448][T31166] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.181773][T31166] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.188983][T31166] device bridge_slave_0 entered promiscuous mode [ 1492.200131][T31166] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.207150][T31166] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.232123][T31166] device bridge_slave_1 entered promiscuous mode [ 1492.279030][T31185] device pim6reg1 entered promiscuous mode [ 1492.338873][T31166] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.345731][T31166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.352826][T31166] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.359599][T31166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.435729][ T1505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1492.443749][ T1505] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.461745][ T1505] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.502902][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1492.514851][T22088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.521704][T22088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.528908][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1492.536873][T22088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.543710][T22088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.569425][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1492.577453][T22088] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1492.612516][ T1778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1492.629757][T31166] device veth0_vlan entered promiscuous mode [ 1492.636260][ T1778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1492.645076][ T1778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1492.658038][T31166] device veth1_macvtap entered promiscuous mode [ 1492.669075][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1492.676553][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1492.685895][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1492.694095][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1492.702526][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1492.732449][T31222] device syzkaller0 entered promiscuous mode [ 1492.740541][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1492.748565][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1492.769197][T30580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1492.777218][T30580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1492.868049][ T9] device bridge_slave_1 left promiscuous mode [ 1492.879488][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.888977][ T9] device bridge_slave_0 left promiscuous mode [ 1492.895234][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.903209][ T9] device veth1_macvtap left promiscuous mode [ 1492.909107][ T9] device veth0_vlan left promiscuous mode [ 1493.168086][T31257] device syzkaller0 entered promiscuous mode [ 1493.348493][T31286] GPL: port 1(veth0_to_batadv) entered blocking state [ 1493.355205][T31286] GPL: port 1(veth0_to_batadv) entered disabled state [ 1493.362887][T31286] device veth0_to_batadv entered promiscuous mode [ 1493.516559][T31298] device syzkaller0 entered promiscuous mode [ 1493.970151][T31339] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1494.253408][T31376] syz-executor.4[31376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1494.253463][T31376] syz-executor.4[31376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1495.540872][T31426] device veth1_macvtap left promiscuous mode [ 1495.558796][T31426] device macsec0 left promiscuous mode [ 1495.577227][T31426] device veth1_macvtap entered promiscuous mode [ 1495.584966][T31426] device macsec0 entered promiscuous mode [ 1496.011723][T31455] device veth1_macvtap left promiscuous mode [ 1496.030295][T31455] device veth1_macvtap entered promiscuous mode [ 1496.036457][T31455] device macsec0 entered promiscuous mode [ 1496.042392][ T1505] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1496.129133][T31465] device syzkaller0 entered promiscuous mode [ 1496.773740][T31523] device lo entered promiscuous mode [ 1496.907286][T31530] syz-executor.0[31530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1496.907335][T31530] syz-executor.0[31530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.061561][T31544] device veth1_macvtap left promiscuous mode [ 1497.084546][T31544] device veth1_macvtap entered promiscuous mode [ 1497.091346][T31544] device macsec0 entered promiscuous mode [ 1497.184263][T31558] syz-executor.0[31558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.184311][T31558] syz-executor.0[31558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.232870][T31568] syz-executor.0[31568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.246765][T31568] syz-executor.0[31568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.281648][T31568] syz-executor.0[31568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1497.319813][T31571] device syzkaller0 entered promiscuous mode [ 1497.337517][T31568] syz-executor.0[31568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1498.232067][T31659] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1498.266399][T31659] syz-executor.3[31659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1498.266456][T31659] syz-executor.3[31659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1498.744520][T31716] device vxcan1 entered promiscuous mode [ 1498.919779][T31724] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1499.145331][T31737] aaaaaaaaaaaaa: renamed from ipvlan1 [ 1500.769115][T31879] device syzkaller0 entered promiscuous mode [ 1502.794636][T31964] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.801556][T31964] bridge0: port 1(bridge_slave_0) entered disabled state [ 1502.810426][T31964] device bridge_slave_0 entered promiscuous mode [ 1502.817250][T31964] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.824149][T31964] bridge0: port 2(bridge_slave_1) entered disabled state [ 1502.831424][T31964] device bridge_slave_1 entered promiscuous mode [ 1502.927937][T31979] device syzkaller0 entered promiscuous mode [ 1502.939558][T31964] bridge0: port 2(bridge_slave_1) entered blocking state [ 1502.946419][T31964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1502.953511][T31964] bridge0: port 1(bridge_slave_0) entered blocking state [ 1502.960300][T31964] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.002198][T24564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1503.012016][T24564] bridge0: port 1(bridge_slave_0) entered disabled state [ 1503.023490][T24564] bridge0: port 2(bridge_slave_1) entered disabled state [ 1503.045460][ T1505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1503.057824][ T1505] bridge0: port 1(bridge_slave_0) entered blocking state [ 1503.064705][ T1505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1503.078040][ T1505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1503.086111][ T1505] bridge0: port 2(bridge_slave_1) entered blocking state [ 1503.092955][ T1505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1503.100760][ T1505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1503.123677][ T1774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1503.131957][ T1774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1503.155742][T31964] device veth0_vlan entered promiscuous mode [ 1503.162491][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1503.170753][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1503.178042][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1503.186984][ T9] device bridge_slave_1 left promiscuous mode [ 1503.197333][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 1503.208725][T32003] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1503.219661][ T9] device bridge_slave_0 left promiscuous mode [ 1503.225792][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 1503.233689][ T9] device veth1_macvtap left promiscuous mode [ 1503.239490][ T9] device veth0_vlan left promiscuous mode [ 1503.328838][T31964] device veth1_macvtap entered promiscuous mode [ 1503.344463][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1503.353237][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1503.371892][T30575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1503.403755][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1503.420323][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1503.437221][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1503.445797][T30578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1503.638985][T32035] bridge0: port 3(veth1_macvtap) entered blocking state [ 1503.657812][T32035] bridge0: port 3(veth1_macvtap) entered disabled state [ 1503.749726][T32050] geneve1: tun_chr_ioctl cmd 1074025681 [ 1504.065552][T32086] device syzkaller0 entered promiscuous mode [ 1504.303112][T32114] device veth1_macvtap left promiscuous mode [ 1504.312432][T32114] device veth1_macvtap entered promiscuous mode [ 1504.318523][T32114] device macsec0 entered promiscuous mode [ 1504.414192][T32124] bpf_get_probe_write_proto: 12 callbacks suppressed [ 1504.414202][T32124] syz-executor.4[32124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1504.430537][T32124] syz-executor.4[32124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.074544][T32148] device veth1_macvtap left promiscuous mode [ 1505.136132][T32148] device macsec0 left promiscuous mode [ 1505.196219][T32149] device veth1_macvtap entered promiscuous mode [ 1505.206857][T32149] device macsec0 entered promiscuous mode [ 1505.646102][T32175] device veth1_macvtap left promiscuous mode [ 1505.670027][T32175] device macsec0 left promiscuous mode [ 1505.686451][T32175] device veth1_macvtap entered promiscuous mode [ 1505.723887][T32175] device macsec0 entered promiscuous mode [ 1505.806221][T32184] device veth1_macvtap left promiscuous mode [ 1505.818825][T32184] device macsec0 left promiscuous mode [ 1505.829364][T32188] syz-executor.0[32188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.829414][T32188] syz-executor.0[32188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.881076][T32188] syz-executor.0[32188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.900981][T32188] syz-executor.0[32188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.921434][T32200] syz-executor.4[32200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.937927][T32200] syz-executor.4[32200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1506.057598][T32211] device veth1_macvtap left promiscuous mode [ 1506.093212][T32211] device macsec0 left promiscuous mode [ 1506.111285][T32211] device veth1_macvtap entered promiscuous mode [ 1506.118631][T32211] device macsec0 entered promiscuous mode [ 1506.364324][T32250] device veth1_macvtap left promiscuous mode [ 1506.393628][T32250] device veth1_macvtap entered promiscuous mode [ 1506.399753][T32250] device macsec0 entered promiscuous mode [ 1506.610944][T32280] FAULT_INJECTION: forcing a failure. [ 1506.610944][T32280] name failslab, interval 1, probability 0, space 0, times 0 [ 1506.626396][T32282] device veth1_macvtap left promiscuous mode [ 1506.641084][T32282] device macsec0 left promiscuous mode [ 1506.648566][T32280] CPU: 1 PID: 32280 Comm: syz-executor.0 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1506.660083][T32280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1506.669973][T32280] Call Trace: [ 1506.673110][T32280] dump_stack_lvl+0x1e2/0x24b [ 1506.677620][T32280] ? panic+0x80b/0x80b [ 1506.681534][T32280] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1506.686822][T32280] ? __alloc_pages_nodemask+0x435/0xaf0 [ 1506.692203][T32280] ? workingset_activation+0x250/0x250 [ 1506.697490][T32280] dump_stack+0x15/0x17 [ 1506.701481][T32280] should_fail+0x3c6/0x510 [ 1506.703609][T32283] device veth1_macvtap entered promiscuous mode [ 1506.705743][T32280] ? jbd2__journal_start+0x150/0x710 [ 1506.705765][T32280] __should_failslab+0xa4/0xe0 [ 1506.711982][T32283] device macsec0 entered promiscuous mode [ 1506.716940][T32280] should_failslab+0x9/0x20 [ 1506.716954][T32280] kmem_cache_alloc+0x3d/0x2e0 [ 1506.716975][T32280] jbd2__journal_start+0x150/0x710 [ 1506.740981][T32280] __ext4_journal_start_sb+0x249/0x4a0 [ 1506.746265][T32280] ext4_da_write_begin+0x708/0xf60 [ 1506.751232][T32280] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 1506.756334][T32280] ? __kasan_check_write+0x14/0x20 [ 1506.761304][T32280] ? _raw_spin_lock+0xa4/0x1b0 [ 1506.765899][T32280] ? _raw_spin_trylock_bh+0x190/0x190 [ 1506.771090][T32280] ? __kasan_check_write+0x14/0x20 [ 1506.776037][T32280] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 1506.781766][T32280] ? uuid_parse+0x470/0x470 [ 1506.786104][T32280] ? trace_writeback_dirty_inode_enqueue+0x1b/0x110 [ 1506.792537][T32280] ? __mark_inode_dirty+0x63e/0x9d0 [ 1506.797563][T32280] generic_perform_write+0x2cd/0x570 [ 1506.802681][T32280] ? __mnt_drop_write_file+0x84/0xa0 [ 1506.807804][T32280] ? file_remove_privs+0x570/0x570 [ 1506.812757][T32280] ? grab_cache_page_write_begin+0xa0/0xa0 [ 1506.818391][T32280] ? down_write+0xd7/0x150 [ 1506.822640][T32280] ? down_read_killable+0x220/0x220 [ 1506.827675][T32280] ? generic_write_checks+0x3b9/0x470 [ 1506.832886][T32280] ext4_buffered_write_iter+0x482/0x610 [ 1506.838266][T32280] ext4_file_write_iter+0x193/0x1c80 [ 1506.843384][T32280] ? kstrtol_from_user+0x310/0x310 [ 1506.848334][T32280] ? memset+0x35/0x40 [ 1506.852149][T32280] ? avc_policy_seqno+0x1b/0x70 [ 1506.856835][T32280] ? selinux_file_permission+0x2bb/0x560 [ 1506.862305][T32280] ? fsnotify_perm+0x67/0x4e0 [ 1506.866819][T32280] ? ext4_file_read_iter+0x4d0/0x4d0 [ 1506.871938][T32280] ? security_file_permission+0x86/0xb0 [ 1506.877320][T32280] ? iov_iter_init+0x3f/0x120 [ 1506.881833][T32280] vfs_write+0xb55/0xe70 [ 1506.885915][T32280] ? kernel_write+0x3d0/0x3d0 [ 1506.890429][T32280] ? mutex_trylock+0xa0/0xa0 [ 1506.894852][T32280] ? __fdget_pos+0x2e7/0x3a0 [ 1506.899275][T32280] ? ksys_write+0x77/0x2c0 [ 1506.903529][T32280] ksys_write+0x199/0x2c0 [ 1506.907698][T32280] ? __ia32_sys_read+0x90/0x90 [ 1506.912294][T32280] ? debug_smp_processor_id+0x17/0x20 [ 1506.917503][T32280] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1506.923405][T32280] ? debug_smp_processor_id+0x17/0x20 [ 1506.928615][T32280] __x64_sys_write+0x7b/0x90 [ 1506.933129][T32280] do_syscall_64+0x34/0x70 [ 1506.937380][T32280] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1506.943104][T32280] RIP: 0033:0x7f510c291ee9 [ 1506.947359][T32280] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1506.966796][T32280] RSP: 002b:00007f510b0060c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1506.975044][T32280] RAX: ffffffffffffffda RBX: 00007f510c3c8fa0 RCX: 00007f510c291ee9 [ 1506.982855][T32280] RDX: 0000000000000009 RSI: 0000000020000000 RDI: 000000000000000a [ 1506.990668][T32280] RBP: 00007f510b006120 R08: 0000000000000000 R09: 0000000000000000 [ 1506.998477][T32280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1507.006286][T32280] R13: 000000000000000b R14: 00007f510c3c8fa0 R15: 00007ffc9b1c7268 [ 1507.341365][T32298] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1507.395792][T32298] syz-executor.0[32298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1507.395848][T32298] syz-executor.0[32298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1507.492032][T32311] device veth1_macvtap left promiscuous mode [ 1507.509650][T32311] device macsec0 left promiscuous mode [ 1507.517036][T32311] device veth1_macvtap entered promiscuous mode [ 1507.526771][T32311] device macsec0 entered promiscuous mode [ 1507.678380][T32354] device veth1_macvtap left promiscuous mode [ 1507.689502][T32354] device macsec0 left promiscuous mode [ 1507.697202][T32354] device veth1_macvtap entered promiscuous mode [ 1507.706461][T32354] device macsec0 entered promiscuous mode [ 1508.114954][T32387] device veth1_macvtap left promiscuous mode [ 1508.127470][T32387] device macsec0 left promiscuous mode [ 1508.142576][T32387] device veth1_macvtap entered promiscuous mode [ 1508.169506][T32387] device macsec0 entered promiscuous mode [ 1508.415481][T32405] FAULT_INJECTION: forcing a failure. [ 1508.415481][T32405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1508.429763][T32405] CPU: 1 PID: 32405 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1508.441279][T32405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1508.451177][T32405] Call Trace: [ 1508.454442][T32405] dump_stack_lvl+0x1e2/0x24b [ 1508.458953][T32405] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1508.464245][T32405] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1508.470185][T32405] dump_stack+0x15/0x17 [ 1508.474146][T32405] should_fail+0x3c6/0x510 [ 1508.478391][T32405] should_fail_alloc_page+0x52/0x60 [ 1508.483440][T32405] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1508.488651][T32405] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1508.494032][T32405] ? __kasan_kmalloc+0x9/0x10 [ 1508.498529][T32405] ? __vmalloc_node_range+0x2a9/0x7c0 [ 1508.503740][T32405] __vmalloc_node_range+0x36c/0x7c0 [ 1508.508769][T32405] bpf_map_area_alloc+0xd9/0xf0 [ 1508.513450][T32405] ? prealloc_init+0x13b/0x7f0 [ 1508.518049][T32405] prealloc_init+0x13b/0x7f0 [ 1508.522478][T32405] ? __kmalloc+0x1aa/0x330 [ 1508.526733][T32405] htab_map_alloc+0x68d/0x950 [ 1508.531247][T32405] __se_sys_bpf+0x620f/0x11cb0 [ 1508.535855][T32405] ? terminate_walk+0x407/0x4f0 [ 1508.540539][T32405] ? __kasan_check_read+0x11/0x20 [ 1508.545393][T32405] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 1508.551127][T32405] ? rotate_reclaimable_page+0x530/0x530 [ 1508.556591][T32405] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1508.562142][T32405] ? __x64_sys_bpf+0x90/0x90 [ 1508.566569][T32405] ? __mod_node_page_state+0xac/0xf0 [ 1508.571693][T32405] ? _kstrtoull+0x3a0/0x4a0 [ 1508.576030][T32405] ? kstrtouint_from_user+0x20a/0x2a0 [ 1508.581240][T32405] ? _raw_spin_unlock+0x4d/0x70 [ 1508.585926][T32405] ? kstrtol_from_user+0x310/0x310 [ 1508.590875][T32405] ? memset+0x35/0x40 [ 1508.594693][T32405] ? __fsnotify_parent+0x4b9/0x6c0 [ 1508.599639][T32405] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1508.606235][T32405] ? __kasan_check_write+0x14/0x20 [ 1508.611182][T32405] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1508.616473][T32405] ? _raw_spin_lock+0x1b0/0x1b0 [ 1508.621163][T32405] ? vfs_write+0x854/0xe70 [ 1508.625415][T32405] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1508.631055][T32405] ? __bpf_ringbuf_reserve+0x261/0x3b0 [ 1508.636350][T32405] ? bpf_ringbuf_notify+0x30/0x30 [ 1508.641208][T32405] ? mutex_lock+0xa5/0x110 [ 1508.645465][T32405] ? mutex_trylock+0xa0/0xa0 [ 1508.649889][T32405] ? bpf_ringbuf_reserve+0x5c/0x70 [ 1508.654835][T32405] ? bpf_trace_run2+0xf4/0x280 [ 1508.659438][T32405] ? debug_smp_processor_id+0x17/0x20 [ 1508.664653][T32405] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1508.670547][T32405] ? __bpf_trace_sys_enter+0x62/0x70 [ 1508.675666][T32405] __x64_sys_bpf+0x7b/0x90 [ 1508.679918][T32405] do_syscall_64+0x34/0x70 [ 1508.684171][T32405] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1508.689895][T32405] RIP: 0033:0x7f89934e9ee9 [ 1508.694153][T32405] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1508.713607][T32405] RSP: 002b:00007f899225e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1508.721836][T32405] RAX: ffffffffffffffda RBX: 00007f8993620fa0 RCX: 00007f89934e9ee9 [ 1508.729644][T32405] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 1508.737458][T32405] RBP: 00007f899225e120 R08: 0000000000000000 R09: 0000000000000000 [ 1508.745269][T32405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1508.753089][T32405] R13: 000000000000000b R14: 00007f8993620fa0 R15: 00007fff0c380928 [ 1539.377614][T32438] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.384517][T32438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.391785][T32438] device bridge_slave_0 entered promiscuous mode [ 1539.398761][T32437] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.405892][T32437] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.413188][T32437] device bridge_slave_0 entered promiscuous mode [ 1539.437184][T32438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.445449][T32438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.452738][T32438] device bridge_slave_1 entered promiscuous mode [ 1539.459035][T32437] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.465951][T32437] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.473204][T32437] device bridge_slave_1 entered promiscuous mode [ 1539.517640][T32445] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.525024][T32445] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.532414][T32445] device bridge_slave_0 entered promiscuous mode [ 1539.563649][T32445] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.570643][T32445] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.577809][T32445] device bridge_slave_1 entered promiscuous mode [ 1539.606248][T32444] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.613653][T32444] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.621202][T32444] device bridge_slave_0 entered promiscuous mode [ 1539.639979][T32443] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.646811][T32443] bridge0: port 1(bridge_slave_0) entered disabled state [ 1539.654584][T32443] device bridge_slave_0 entered promiscuous mode [ 1539.672486][T32444] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.679317][T32444] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.687374][T32444] device bridge_slave_1 entered promiscuous mode [ 1539.712232][T32443] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.719066][T32443] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.726616][T32443] device bridge_slave_1 entered promiscuous mode [ 1539.766944][T32438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.773802][T32438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1539.780897][T32438] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.787670][T32438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1539.812536][T32437] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.819375][T32437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1539.826489][T32437] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.833277][T32437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1539.853804][T32445] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.860656][T32445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1539.867731][T32445] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.874541][T32445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1539.934525][T30579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1608.909906][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1608.916332][ C0] rcu: 0-....: (1 GPs behind) idle=56a/1/0x4000000000000000 softirq=242426/242428 fqs=4856 last_accelerate: d7eb/fefb dyntick_enabled: 1 [ 1608.930224][ C0] (t=10000 jiffies g=303433 q=3170) [ 1608.935334][ C0] NMI backtrace for cpu 0 [ 1608.939494][ C0] CPU: 0 PID: 32418 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1608.951034][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1608.960929][ C0] Call Trace: [ 1608.964051][ C0] [ 1608.966757][ C0] dump_stack_lvl+0x1e2/0x24b [ 1608.971258][ C0] ? panic+0x80b/0x80b [ 1608.975181][ C0] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1608.980459][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1608.985772][ C0] ? vprintk_func+0x19d/0x1e0 [ 1608.990269][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 1608.994954][ C0] ? printk+0xd1/0x111 [ 1608.998863][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1609.004760][ C0] dump_stack+0x15/0x17 [ 1609.008753][ C0] nmi_trigger_cpumask_backtrace+0x2b5/0x300 [ 1609.014567][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1609.020473][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 1609.026197][ C0] rcu_dump_cpu_stacks+0x199/0x2b0 [ 1609.031150][ C0] rcu_sched_clock_irq+0xf8a/0x1890 [ 1609.036182][ C0] ? rcutree_dead_cpu+0x340/0x340 [ 1609.041041][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 1609.046074][ C0] update_process_times+0x198/0x200 [ 1609.051109][ C0] tick_sched_timer+0x188/0x240 [ 1609.055793][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 1609.061176][ C0] __hrtimer_run_queues+0x3d7/0xa50 [ 1609.066211][ C0] ? hrtimer_interrupt+0x8b0/0x8b0 [ 1609.071155][ C0] ? clockevents_program_event+0x214/0x2c0 [ 1609.076999][ C0] ? ktime_get_update_offsets_now+0x266/0x280 [ 1609.082916][ C0] hrtimer_interrupt+0x39a/0x8b0 [ 1609.087680][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1609.093399][ C0] asm_call_irq_on_stack+0xf/0x20 [ 1609.098271][ C0] [ 1609.101039][ C0] sysvec_apic_timer_interrupt+0x85/0xe0 [ 1609.106505][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1609.112319][ C0] RIP: 0010:__rcu_read_lock+0x0/0x50 [ 1609.117441][ C0] Code: e2 b2 aa 7e 4d 89 fd 0f 85 ec fb ff ff e8 a4 c4 a8 ff e9 e2 fb ff ff e8 ae 23 54 03 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <55> 48 89 e5 53 65 48 8b 1d a3 b2 aa 7e 48 81 c3 08 04 00 00 48 89 [ 1609.136902][ C0] RSP: 0018:ffffc90000fde7f8 EFLAGS: 00000246 [ 1609.142781][ C0] RAX: 3e898c5cf056b300 RBX: ffff888118c57d10 RCX: 0000000000000246 [ 1609.150593][ C0] RDX: dffffc0000000000 RSI: ffffffff8507b1e0 RDI: ffffffff85601100 [ 1609.158403][ C0] RBP: ffffc90000fde8f0 R08: ffffffff84980a65 R09: 0000000000000003 [ 1609.166214][ C0] R10: fffff520001fbd10 R11: dffffc0000000001 R12: ffff8881260fc000 [ 1609.174026][ C0] R13: 1ffff920001fbd10 R14: dffffc0000000000 R15: ffff8881247ca078 [ 1609.181843][ C0] ? tipc_sk_rcv+0x305/0x1e30 [ 1609.186360][ C0] ? tipc_sk_lookup+0x103/0x650 [ 1609.191044][ C0] ? __kasan_check_write+0x14/0x20 [ 1609.195986][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1609.200853][ C0] ? tipc_sk_rcv+0x1e30/0x1e30 [ 1609.205452][ C0] tipc_sk_rcv+0x499/0x1e30 [ 1609.209787][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1609.215428][ C0] ? __stack_depot_save+0x468/0x4d0 [ 1609.220466][ C0] ? kmem_cache_free+0xa9/0x1e0 [ 1609.225149][ C0] ? kasan_set_free_info+0x23/0x40 [ 1609.230094][ C0] ? ____kasan_slab_free+0x121/0x160 [ 1609.235217][ C0] ? __kasan_slab_free+0x11/0x20 [ 1609.239989][ C0] ? slab_free_freelist_hook+0xc0/0x190 [ 1609.245370][ C0] ? kfree_skbmem+0x104/0x170 [ 1609.249882][ C0] ? kfree_skb+0xc1/0x320 [ 1609.254051][ C0] ? tipc_sk_rcv+0x8a1/0x1e30 [ 1609.258566][ C0] ? tipc_node_xmit+0x34b/0xe30 [ 1609.263255][ C0] ? __skb_queue_purge+0x180/0x180 [ 1609.268202][ C0] ? bpf_get_current_cgroup_id+0x18/0xa0 [ 1609.273664][ C0] tipc_node_xmit+0x34b/0xe30 [ 1609.278178][ C0] ? bpf_trace_run1+0x210/0x210 [ 1609.282863][ C0] ? kfree_skbmem+0x104/0x170 [ 1609.287380][ C0] ? ____kasan_slab_free+0x12c/0x160 [ 1609.292498][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1609.297879][ C0] ? kfree_skbmem+0x104/0x170 [ 1609.302407][ C0] ? __bpf_trace_kmem_free+0x6f/0x90 [ 1609.307517][ C0] tipc_node_distr_xmit+0x36a/0x4d0 [ 1609.312549][ C0] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1609.317584][ C0] ? trace_tipc_sk_rej_msg+0x2b/0x6f0 [ 1609.322792][ C0] tipc_sk_rcv+0x177d/0x1e30 [ 1609.327236][ C0] ? __skb_queue_purge+0x180/0x180 [ 1609.332169][ C0] tipc_node_xmit+0x34b/0xe30 [ 1609.336675][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1609.341546][ C0] ? __kernel_text_address+0x9b/0x110 [ 1609.346747][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1609.352126][ C0] ? __kasan_check_write+0x14/0x20 [ 1609.357076][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1609.362367][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 1609.367067][ C0] tipc_sk_filter_rcv+0x1da8/0x3e00 [ 1609.372110][ C0] ? tipc_sk_dump+0xf50/0xf50 [ 1609.376602][ C0] ? __kasan_check_write+0x14/0x20 [ 1609.381549][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1609.386408][ C0] ? kmem_cache_free+0xa9/0x1e0 [ 1609.391100][ C0] tipc_sk_rcv+0x8a1/0x1e30 [ 1609.395437][ C0] ? __bpf_trace_kmem_free+0x6f/0x90 [ 1609.400567][ C0] ? __skb_queue_purge+0x180/0x180 [ 1609.405501][ C0] ? tipc_sk_filter_rcv+0x3583/0x3e00 [ 1609.410735][ C0] tipc_node_xmit+0x34b/0xe30 [ 1609.415226][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1609.420611][ C0] tipc_node_distr_xmit+0x36a/0x4d0 [ 1609.425638][ C0] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1609.430697][ C0] ? __kasan_check_read+0x11/0x20 [ 1609.435533][ C0] tipc_sk_backlog_rcv+0x18b/0x210 [ 1609.440484][ C0] ? tipc_sk_timeout+0xab0/0xab0 [ 1609.445255][ C0] ? sysvec_reschedule_ipi+0x83/0x160 [ 1609.450466][ C0] __release_sock+0x148/0x410 [ 1609.454977][ C0] sock_setsockopt+0x1e3b/0x2e00 [ 1609.459747][ C0] ? bpf_prog_array_is_empty+0x60/0x80 [ 1609.465132][ C0] ? __sock_set_mark+0x160/0x160 [ 1609.469905][ C0] ? __cgroup_bpf_run_filter_sysctl+0xb40/0xb40 [ 1609.475979][ C0] ? security_socket_setsockopt+0x82/0xb0 [ 1609.481531][ C0] __sys_setsockopt+0x441/0x870 [ 1609.486218][ C0] ? __ia32_sys_recv+0xb0/0xb0 [ 1609.490825][ C0] ? __kasan_check_write+0x14/0x20 [ 1609.495765][ C0] ? switch_fpu_return+0x1e4/0x3c0 [ 1609.500715][ C0] ? fpu__clear_all+0x20/0x20 [ 1609.505226][ C0] __x64_sys_setsockopt+0xbf/0xd0 [ 1609.510085][ C0] do_syscall_64+0x34/0x70 [ 1609.514338][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1609.520066][ C0] RIP: 0033:0x7f89934e9ee9 [ 1609.524320][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1609.543758][ C0] RSP: 002b:00007f899223d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1609.552002][ C0] RAX: ffffffffffffffda RBX: 00007f8993621070 RCX: 00007f89934e9ee9 [ 1609.559816][ C0] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000006 [ 1609.567627][ C0] RBP: 00007f899353647f R08: 0000000000000004 R09: 0000000000000000 [ 1609.575439][ C0] R10: 0000000020000540 R11: 0000000000000246 R12: 0000000000000000 [ 1609.583248][ C0] R13: 000000000000000b R14: 00007f8993621070 R15: 00007fff0c380928 [ 1611.520468][T29909] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10259 jiffies s: 268473 root: 0x1/. [ 1611.532355][T29909] rcu: blocking rcu_node structures: [ 1611.537442][T29909] Task dump for CPU 0: [ 1611.541384][T29909] task:syz-executor.4 state:R running task stack: 0 pid:32418 ppid: 30907 flags:0x0000400c [ 1611.551967][T29909] Call Trace: [ 1611.555085][T29909] ? tipc_node_distr_xmit+0x36a/0x4d0 [ 1611.560292][T29909] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1611.565318][T29909] ? __kasan_check_read+0x11/0x20 [ 1611.570208][T29909] ? tipc_sk_backlog_rcv+0x18b/0x210 [ 1611.575295][T29909] ? tipc_sk_timeout+0xab0/0xab0 [ 1611.580094][T29909] ? sysvec_reschedule_ipi+0x83/0x160 [ 1611.585279][T29909] ? __release_sock+0x148/0x410 [ 1611.589998][T29909] ? sock_setsockopt+0x1e3b/0x2e00 [ 1611.594908][T29909] ? bpf_prog_array_is_empty+0x60/0x80 [ 1611.600235][T29909] ? __sock_set_mark+0x160/0x160 [ 1611.604986][T29909] ? __cgroup_bpf_run_filter_sysctl+0xb40/0xb40 [ 1611.611116][T29909] ? security_socket_setsockopt+0x82/0xb0 [ 1611.616621][T29909] ? __sys_setsockopt+0x441/0x870 [ 1611.621488][T29909] ? __ia32_sys_recv+0xb0/0xb0 [ 1611.626062][T29909] ? __kasan_check_write+0x14/0x20 [ 1611.631056][T29909] ? switch_fpu_return+0x1e4/0x3c0 [ 1611.635976][T29909] ? fpu__clear_all+0x20/0x20 [ 1611.640504][T29909] ? __x64_sys_setsockopt+0xbf/0xd0 [ 1611.645510][T29909] ? do_syscall_64+0x34/0x70 [ 1611.649963][T29909] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1760.964130][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.4:32418] [ 1760.972624][ C0] Modules linked in: [ 1760.976368][ C0] CPU: 0 PID: 32418 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00496-ga8e7f812fbc1 #0 [ 1760.987900][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1760.997913][ C0] RIP: 0010:preempt_count_sub+0x7/0x160 2024/05/29 03:26:43 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 1761.003292][ C0] Code: 07 80 c1 03 38 c1 0f 8c 78 ff ff ff 48 c7 c7 48 a3 e3 86 e8 cb 17 5f 00 e9 67 ff ff ff 66 0f 1f 44 00 00 55 48 89 e5 41 56 53 <89> fb 48 c7 c0 00 79 08 87 48 c1 e8 03 49 be 00 00 00 00 00 fc ff [ 1761.023175][ C0] RSP: 0018:ffffc90000fde830 EFLAGS: 00000206 [ 1761.029075][ C0] RAX: 0000000000000402 RBX: 1ffff920001fbd10 RCX: ffffc90000fde803 [ 1761.036895][ C0] RDX: 0000000000000000 RSI: 0000000000000201 RDI: 0000000000000200 [ 1761.044697][ C0] RBP: ffffc90000fde840 R08: dffffc0000000000 R09: ffffed10244e6bd2 [ 1761.052507][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff920001fbd0c [ 1761.060322][ C0] R13: ffff888122735e88 R14: 0000000000000001 R15: dffffc0000000000 [ 1761.068133][ C0] FS: 00007f899223d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1761.076904][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1761.083319][ C0] CR2: 0000000000000000 CR3: 0000000116071000 CR4: 00000000003506b0 [ 1761.091128][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1761.098933][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1761.106742][ C0] Call Trace: [ 1761.109866][ C0] [ 1761.112578][ C0] ? show_r