ffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r5, r8, 0x1, r8], 0x0, 0x10, 0x3ebfd31f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x661e, 0x7, 0xf775, 0x20, 0x1, 0x6d, '\x00', r6, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xb}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000080000000bf91000000000000b70200000100000085000010850000df000095000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='percpu_free_percpu\x00', r9}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x28, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5a}, {}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x7}, @generic={0x5, 0x5, 0xf, 0xd55, 0x5}, @jmp={0x5, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xd, 0x8, 0x2, 0xfffffffffffffff8, 0x1b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xc32f0ee55495058a}}}, &(0x7f0000000040)='GPL\x00', 0x19d, 0x6a, &(0x7f00000009c0)=""/106, 0x41000, 0x8, '\x00', r6, 0x22, r11, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x1, 0x3, 0xfffffff7}, 0x10, r7, r9, 0x5, 0x0, &(0x7f0000000b00)=[{0x3, 0x8002, 0xd, 0x3}, {0x4, 0x5, 0x8, 0x4}, {0x5, 0x4, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x1}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x20000000}, 0x90) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x3, '\x00', r6, r12, 0x3, 0x1, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_evict_inode\x00', r3}, 0x10) unlink(&(0x7f0000000000)='./cgroup\x00') executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, &(0x7f0000001480)=""/4091, &(0x7f0000000000), &(0x7f0000000040), 0x8, r3}, 0x38) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x11, 0xae, 0x7, 0x25f, 0x20, r0, 0xc, '\x00', r2, 0xffffffffffffffff, 0x2, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r8, &(0x7f0000000980), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00'}, 0x10) syz_clone(0xf5848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYBLOB="388d6a7cf73e7877e0f50b676df724e3ed45e9c06d6d5be8cdd7fe2d1f9dc726625c20e7c18af198c90f10a2952919abd4f3", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x7, 0xfff, 0x6, 0x104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000440)="f575cc89b59e5e6dbf2946215b0d07ac061bc0968119407883be9b500f0091cada7d6b23b23f3614093973425d8396657068b25e4908eff0d850623df09a339a7d", &(0x7f0000000540)=""/65}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x0, 0x4, 0x8001, 0x5c}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r2, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x4, 0x7, 0x8, 0x40003a, 0x4601, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r5}, &(0x7f0000000500), &(0x7f0000000540)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='i2c_write\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3) executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x69, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000380), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000003300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) bpf$MAP_UPDATE_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3ff, r4}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r6 = openat$cgroup_ro(r5, &(0x7f0000000180)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) recvmsg$unix(r6, &(0x7f00000005c0)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000300)}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000780)=""/197, 0xc5}, {&(0x7f0000000880)=""/207, 0xcf}, {&(0x7f0000000a40)=""/165, 0xa5}, {&(0x7f0000000b00)=""/242, 0xf2}, {&(0x7f0000000340)=""/38, 0x26}, {&(0x7f0000000c00)=""/241, 0xf1}, {&(0x7f00000003c0)=""/113, 0x71}], 0x9, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007d00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xd50, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYBLOB="388d6a7cf73e7877e0f50b676df724e3ed45e9c06d6d5be8cdd7fe2d1f9dc726625c20e7c18af198c90f10a2952919abd4f3", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x7, 0xfff, 0x6, 0x104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000440)="f575cc89b59e5e6dbf2946215b0d07ac061bc0968119407883be9b500f0091cada7d6b23b23f3614093973425d8396657068b25e4908eff0d850623df09a339a7d", &(0x7f0000000540)=""/65}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x0, 0x4, 0x8001, 0x5c}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r2, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x4, 0x7, 0x8, 0x40003a, 0x4601, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r5}, &(0x7f0000000500), &(0x7f0000000540)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='i2c_write\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3) executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000380), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000003300)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd00}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r3}, 0x48) bpf$MAP_UPDATE_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3ff, r4}, 0x38) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r6 = openat$cgroup_ro(r5, &(0x7f0000000180)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) recvmsg$unix(r6, &(0x7f00000005c0)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000300)}, {&(0x7f00000006c0)=""/183, 0xb7}, {&(0x7f0000000780)=""/197, 0xc5}, {&(0x7f0000000880)=""/207, 0xcf}, {&(0x7f0000000a40)=""/165, 0xa5}, {&(0x7f0000000b00)=""/242, 0xf2}, {&(0x7f0000000340)=""/38, 0x26}, {&(0x7f0000000c00)=""/241, 0xf1}, {&(0x7f00000003c0)=""/113, 0x71}], 0x9, &(0x7f0000000dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007d00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xd50, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged_recursive\x00', 0x26e1, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x4, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) [ 87.437197][ T629] device bridge_slave_1 left promiscuous mode [ 87.443154][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.461441][ T629] device bridge_slave_0 left promiscuous mode [ 87.478371][ T629] bridge0: port 1(bridge_slave_0) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000a40)=ANY=[@ANYRESOCT, @ANYBLOB="388d6a7cf73e7877e0f50b676df724e3ed45e9c06d6d5be8cdd7fe2d1f9dc726625c20e7c18af198c90f10a2952919abd4f3", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x7, 0xfff, 0x6, 0x104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000440)="f575cc89b59e5e6dbf2946215b0d07ac061bc0968119407883be9b500f0091cada7d6b23b23f3614093973425d8396657068b25e4908eff0d850623df09a339a7d", &(0x7f0000000540)=""/65}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0x2, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x0, 0x4, 0x8001, 0x5c}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r2, @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x4, 0x7, 0x8, 0x40003a, 0x4601, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r5}, &(0x7f0000000500), &(0x7f0000000540)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='i2c_write\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x3) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 87.495750][ T629] device veth1_macvtap left promiscuous mode [ 87.513705][ T629] device veth0_vlan left promiscuous mode executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c25000000006cc020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_ext_rm_leaf\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r2}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x19, 0x16, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5c, '\x00', 0x0, 0x9}, 0x90) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x0, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000f00b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES8=r0, @ANYRES32=r0, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='irq_noise\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='jbd2_handle_stats\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb00000000ffffffffec86dd"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0x36) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r6 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000001500)=ANY=[], &(0x7f0000014ff5)='GPL\x00', 0x0, 0x1002, &(0x7f0000002a00)=""/4098, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x8}, 0x90) r10 = openat$cgroup_ro(r8, &(0x7f0000000b80)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r9, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0], 0x0, 0x8, &(0x7f0000000880)=[{}], 0x8, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x16, 0xa, &(0x7f0000000500)=ANY=[@ANYRES16=r6], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', r11, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0xa, 0x5}, 0x10, 0xffffffffffffffff, r9, 0x1, &(0x7f0000001c40)=[r10, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001c80)=[{0x0, 0x3, 0x8, 0xa}], 0x10, 0x6}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{r5, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)='%-010d \x00'}, 0x20) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a40)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x817, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x10, 0x3, &(0x7f0000000680)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f00000006c0)='syzkaller\x00', 0xd96a, 0xe6, &(0x7f0000000780)=""/230, 0x41000, 0x26, '\x00', r11, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x1, 0xd, 0x3, 0x7fffffff}, 0x10, 0x0, r1, 0x6, &(0x7f0000000ac0)=[r5, r5, r12, r0, r5, r13, r5, r5, r5], &(0x7f0000000b00)=[{0x2, 0x2, 0x5, 0x7}, {0x0, 0x3, 0xc, 0x1}, {0x4, 0x2, 0x9, 0xc}, {0x1, 0x2, 0xe, 0x1}, {0x1, 0x3, 0x3, 0x10}, {0x4, 0x1, 0x3, 0xb}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r14}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000008c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) [ 87.852453][ T5499] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.859421][ T5499] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.866701][ T5499] device bridge_slave_0 entered promiscuous mode [ 87.874576][ T5499] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.881602][ T5499] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.888814][ T5499] device bridge_slave_1 entered promiscuous mode [ 87.909362][ T5513] device syzkaller0 entered promiscuous mode [ 87.941850][ T5503] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.948733][ T5503] bridge0: port 1(bridge_slave_0) entered disabled state executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x423a42210ce225a4}, 0x1040, 0x0, 0x0, 0x0, 0x3, 0x4, 0x3bea}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xf, &(0x7f0000000300)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xb9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='hrtimer_start\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) [ 87.955823][ T5503] device bridge_slave_0 entered promiscuous mode [ 87.972409][ T5502] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.979310][ T5502] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.986513][ T5502] device bridge_slave_0 entered promiscuous mode [ 87.993594][ T5502] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.002615][ T5502] bridge0: port 2(bridge_slave_1) entered disabled state executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6b, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) [ 88.010173][ T5502] device bridge_slave_1 entered promiscuous mode [ 88.020021][ T5503] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.027595][ T5503] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.035339][ T5503] device bridge_slave_1 entered promiscuous mode executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x1, 0x4}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@volatile={0x7}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x77, 0x0, 0x4c, 0x4}]}, {0x0, [0x2e, 0x5f, 0x30, 0x61]}}, &(0x7f0000000300)=""/73, 0x3a, 0x49, 0x0, 0x2e64}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@cgroup=r0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='jbd2_checkpoint\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_rm_leaf\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYBLOB="02531e5da6127d61e1d2c93baa8803db8c7b9c8851ce6e16dc882ee79b33dc929d94c1397558274da1fe74f4c82ef3c02c6d97f051ab4f8b93d06d0a90a76d549db8a244bdb629fb10b306ee2d7589606f45bb559272c7c0d05ba02214efb5faf0a86c4bf72033e2405c9d8da602e5f601b5e3ca0005a95d402c74c4e316d988ff8388a385c00cdaea8b1c610b067a8b3fb4a88653bf0bbe229d20d077624045ae915ae7b293845b4f46e52fc0c63fdeeff2bff1cc22b8f0729eeaf2c9fa459a73b2f9c1042eab9c8c53906ed7c4c67d02828c5f9b6adefa10b6ef3018895e8ae92007d1ab5b2c873916f3668d5d02e0311b6e84b32b29a8", @ANYRESDEC=r0, @ANYRESHEX=r1, @ANYRESHEX=r2], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000700)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r7, &(0x7f00000003c0)=0x1ff, 0x12) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r9, 0x27, 0x0, 0x0, 0x0, 0x0, 0xd50, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) mkdirat$cgroup(r6, &(0x7f0000000080)='syz0\x00', 0x1ff) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0xa}, @exit]}, &(0x7f0000000040)='syzkaller\x00', 0x400, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0xd, 0x6, 0x7be}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000100)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000140)=[{0x3, 0x3, 0x6, 0x5}, {0x3, 0x4, 0x3, 0x2}, {0x0, 0x4, 0x10, 0xa}, {0x3, 0x5, 0xb, 0x1}]}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xe2, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x61, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r1, 0xffffffffffffffff, 0x3, 0x20, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r3, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%ps \x00'}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x222041, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000006c0)={0x7fffffff}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000980)={&(0x7f0000000700)="022edcca8842c27e9c52e63d876ab321f36a193c8dd0e3adf2d4f25b63c6f0db12bee28c69fb4679940b0682bcd4d0c1b6a096857469ae4b46239db83dc45c80c3d2fcd6f8c5dc03bc8902d22ba88118b741c6aec912d432162667f943ed54c0b41b871bedf5f2c32223902995ff4b266f1e113d888ff339e8ee4579080a07998430b45fd3b485d642a3edc2fe0ee8465ba8f79fea12eb69a9bfe873c55dfec795c98b3d162d0cdc28c6a2ad014f9da2328040416cbebb207109a61f9d0c9c85224cbe93f11c702d3ef6dcd46675bef6897e00fba9133e76bce305ba49ec6713f08e56b75da27a1ca62949b5ff1c8d82d1", &(0x7f0000000800)=""/51, &(0x7f0000000840)="3deb7a366c1cc47b3a71691f34996c7c3066a95ec1fbce09f4db24a7c9966c38e3cde9807c51fa2331213b9d0bae9f12cb2eb6d5f8caf51535264cb604b3fc6b5a5b99d51b471c5d038745829cf8a63c414bc8e91902ae93d8771fab21c509c2f11f3b71c828a76384f7d17ed1af21586e9a534adfdca5acc04fa9dfa079b7be2186137a1f137b0b808ba0416199ce455f0785fbd2b50505aa4fd2792ba570b570ee42c16af039dc4a80a0f26281404649e0779d527f975d", &(0x7f0000000900)="e3bacba583ccf7b0f448ea5bca169823b830c014c53ee131268c132b79cd7a999799a6cb964b51178d2f69b4f2e061e632ee67c4f64fc2254bf6dbd83709097a0e2c03366f13b77466d13db82e047c71cd9f209be70dc8a7f831ddd69bb3c7920dff0c346d0f7081", 0x5, r4, 0x4}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001a40)={r3, &(0x7f00000009c0)="cc40c39b02c552ba7132a1041527a892aa5a64f3db4105c04e332939a999c1867ea97fe35e301065a0950653ea336388875e430678f833dbc957ee100e0ca192cf4a438dafaea6cd80be7e3235489cc030522c8d9637f4e33cc1212125b6ca48198c83a53d38971285c87d4ba971f18273", &(0x7f0000000a40)=""/4096, 0x4}, 0x20) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001a80)={'macvlan1\x00', 0x1}) r6 = perf_event_open$cgroup(&(0x7f0000001b40)={0x3, 0x80, 0x8, 0x51, 0x5, 0x2, 0x0, 0xab0f, 0x101, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fff, 0x0, @perf_config_ext={0x9, 0x9}, 0x808, 0x8000000000000000, 0x5, 0x9, 0x800, 0xffffffff, 0x4, 0x0, 0x4, 0x0, 0x1f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001ac0)={0x2, 0x80, 0x6, 0x0, 0x20, 0x7c, 0x0, 0x10001, 0x0, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x8}, 0x0, 0x30, 0x1ff, 0x1, 0x1, 0x4, 0x6, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xf, r6, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x6, 0x1, &(0x7f0000001bc0)=@raw=[@ldst={0x1, 0x1, 0x3, 0x0, 0x9, 0xfffffffffffffffc, 0xffffffffffffffff}], &(0x7f0000001c00)='GPL\x00', 0x0, 0x56, &(0x7f0000001c40)=""/86, 0x40f00, 0x8, '\x00', r1, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000001cc0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000001d00)={0x3, 0x6, 0x7ff, 0x3}, 0x10, 0xffffffffffffffff, r0, 0x4, 0x0, &(0x7f0000001d40)=[{0x5, 0x3, 0x8, 0x6}, {0x3, 0x5, 0x10, 0x7}, {0x0, 0x1, 0x5, 0x1}, {0x1, 0x4, 0xb}], 0x10, 0x2d}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e80)=@o_path={&(0x7f0000001e40)='./file0\x00', r3, 0x4000, r6}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001ec0)='net_prio.prioidx\x00', 0x0, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001f00)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000001f40)='blkio.bfq.idle_time\x00', 0x0, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001fc0)={0x0, 0x7}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002000)=@o_path={&(0x7f0000001f80)='./file0\x00', r9, 0x4000, r10}, 0x18) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002280)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x17, 0x1d, &(0x7f0000002040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002140)='GPL\x00', 0x7, 0xd8, &(0x7f0000002180)=""/216, 0x40f00, 0x21, '\x00', r1, 0xf, r11, 0x8, &(0x7f00000022c0)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000002300)=[{0x2, 0x5, 0x6}], 0x10, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x17, 0x1e, &(0x7f0000002400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd946}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002500)='GPL\x00', 0x4, 0xd9, &(0x7f0000002540)=""/217, 0x40f00, 0x30, '\x00', r1, 0x2d, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002640)={0x4, 0x9, 0x7fff, 0x3}, 0x10, r2, r7, 0x2, &(0x7f0000002680)=[r9], &(0x7f00000026c0)=[{0x4, 0x4, 0x4, 0x4}, {0x0, 0x1, 0x10, 0x5}], 0x10, 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002840)={r3, 0x58, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) close(r10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002880)={0x1b, 0x0, 0x0, 0x0, 0x0, r4, 0x3f2d, '\x00', r1, r7, 0x1, 0x5, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002ac0)={r0, 0x58, &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002b80)=@bpf_ext={0x1c, 0x3, &(0x7f0000002900)=@raw=[@ldst={0x0, 0x3, 0x1, 0xa, 0x0, 0xfffffffffffffff4, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000002940)='syzkaller\x00', 0x4, 0x9c, &(0x7f0000002980)=""/156, 0x41100, 0x2, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002b00)={0x0, 0x10, 0x8d1, 0x4}, 0x10, 0x16c52, r0, 0x1, 0x0, &(0x7f0000002b40)=[{0x0, 0x2, 0xa, 0x9}], 0x10, 0x7}, 0x90) openat$cgroup_ro(r8, &(0x7f0000002c40)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002cc0)=@generic={&(0x7f0000002c80)='./file0\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000002d00)=@bloom_filter={0x1e, 0x1, 0xff, 0xec1a, 0x10, r14, 0x1, '\x00', r12, r11, 0x1, 0x5, 0x5, 0x5}, 0x48) write$cgroup_type(0xffffffffffffffff, &(0x7f0000002dc0), 0x9) executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000800000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)='memory.events\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x0, &(0x7f0000000180), 0x0, 0x10, &(0x7f00000001c0), &(0x7f0000000340), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x55, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1b, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', r5, 0x37, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x3, 0x0, 0x0, 0x9}, 0x10, r6, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[r4, 0xffffffffffffffff, r4]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f00000001c0), &(0x7f00000002c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x1b, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_clone(0x20021100, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000240)='tlb_flush\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x3, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100003}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x2b, &(0x7f0000001980)=ANY=[@ANYBLOB="6281180000000000004f00000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000c5e100a800c9be8e9ab7030000060000008500000006000000183a00000600000000000000000000009500000000000000c030f8fffcffffffb7080000000000007b8af8ff00000000b7080000050000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffff", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000a5000000186200000d0000000000000005000000b7080000000000007b8af8ff00000000b7080000001000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='ext4_mballoc_alloc\x00', r11}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x4, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe03, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe03, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='ext4_ext_remove_space_done\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='xprt_ping\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r9}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='ext4_evict_inode\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe03, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='xprt_ping\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r9}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='ext4_evict_inode\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe03, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x70, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 88.698432][ T629] device bridge_slave_1 left promiscuous mode [ 88.705529][ T629] bridge0: port 2(bridge_slave_1) entered disabled state executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'geneve1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x26, &(0x7f00000000c0), 0x4) [ 88.746736][ T629] device bridge_slave_0 left promiscuous mode [ 88.759246][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.785810][ T629] device bridge_slave_1 left promiscuous mode executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000187b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='xprt_ping\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r9}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='ext4_evict_inode\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') [ 88.791926][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.805872][ T629] device bridge_slave_0 left promiscuous mode [ 88.818834][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.836661][ T629] device veth1_macvtap left promiscuous mode executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, &(0x7f00000000c0)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbb}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'veth0_vlan\x00', @random="2b0100004ec6"}) executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x200) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f00000007c0)='task_newtask\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xe) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r9, 0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x0, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r10, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4f34, 0x3ff, 0x2, 0x40, 0x1, 0x1c000, '\x00', r10, 0xffffffffffffffff, 0x5, 0x4, 0x1, 0x2}, 0x48) write$cgroup_devices(r8, &(0x7f0000000600)=ANY=[@ANYBLOB="1e0308004d6b71ef2885630182700004110000000000000000000000000000000001"], 0xffdd) [ 88.849249][ T629] device veth0_vlan left promiscuous mode [ 88.872232][ T629] device veth0_vlan left promiscuous mode executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000008000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'geneve1\x00', 0x1}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x26, &(0x7f00000000c0), 0x4) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x10001) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x5, 0x12) r1 = syz_clone(0x40002000, &(0x7f0000000140)="f5b3b42b594b32cce9099e002f6c18ce38a8ee6598155a841991224f7978ad57eb868c1a7c6a1a8d946fad79f7a47904fd12228439d221ca827b28d52206080a1cd74733ac1f21d7eedc3e2bb79c072f147f47070ea65fbc7ef6387d444254381c76f9f221f079484f5e63dd8900aaa08cc4f7991d4e2ffa26be5318a8411d3d515556f7313c813a3781468ee5dfe5b7bf778bb4877f238b48b8fbf4bef65d231e97821cacbedcd67aeaa1581d27b40b828b45", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="b1a698a4b09e944102896e37137f8a25355695a1f733780a7290cc39924958474d767dd970fdabd423271d7879c69c277d45c3939f19d6ef83e41314e06fa805602acdba8b949b9c58c872db4fdd2f923ed30a6a602d8f3c8473e5e0d82e4184210822ca23d8594cb7b8abb16b7bbd9642891b7dc5031affc87edc8aa01e718f319c32c909a970ccf8f8666f7b9cfd540f9b4bfb6ad36a7ac964cc350a8ee5a453c6ebfc89354e5d06844eed7a32cc41df13e6a6522d69c9c474f217369ad4224802a857120ac7a2d41c962c75aaf1") r2 = perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x89, 0x1f, 0x1, 0x0, 0x0, 0x200, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x8, 0x3}, 0x10010, 0x80000001, 0x3, 0x2, 0x7, 0x40, 0x26, 0x0, 0xb1, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x79, 0x9, 0x3, 0x0, 0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x12d1255a, 0x88d3}, 0x2000, 0x5, 0x2, 0x3, 0x2, 0x2, 0x0, 0x0, 0x80000001, 0x0, 0x40}, r1, 0xd, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x105201, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000440)={'pim6reg1\x00'}) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x3, 0x0}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={0x1, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0xffffffffffffffff, 0x1f, 0x10}, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r3, 0xffff0001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0x5, &(0x7f0000000480)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x200}], &(0x7f00000004c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0xdbedf2f9f8028b6b, r5, 0x8, &(0x7f0000000540)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0xd94, 0x3ff}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000740)=[0x1, 0xffffffffffffffff, r7, r8, r9, r10], &(0x7f0000000780)=[{0x0, 0x2, 0xa, 0xc}, {0x4, 0x1, 0x2, 0x2}, {0x3, 0x4, 0x9, 0x8}, {0x4, 0x4, 0x6, 0xb}, {0x3, 0x3, 0x1}], 0x10, 0xffffffda}, 0x90) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x3, 0x0, r7, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x17, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f00000009c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0xa, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000ac0)=[r12, 0x1, r10, r8, r9], &(0x7f0000000b00)=[{0x2, 0x3}, {0xcf, 0x3, 0x0, 0x6}, {0x1, 0x2, 0xd, 0xb}, {0x5, 0x4, 0x4, 0x5}, {0x3, 0x5, 0x1, 0x9}], 0x10, 0x1}, 0x90) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000c40)={'tunl0\x00'}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c80)=r6, 0x4) syz_clone(0x180000000, &(0x7f0000000cc0)="daa66804ac7c44be11cdab28a00dd9ba092d246b89fd081233d2d80e6910b6f5b749d4069fbcb84d5ead8f46b5bb6c650a05956f6225d2cb15d449e9c0f71628b359ffff5e20a7213e161616db9159cc8c68d6dd0495af832f9d6e3762947f52f3f52f322a703425d3d7afafd5e7497c09685b3dc325fb8c42cd74eade36432bb66b704c8ab7893b2b186db2774c208e94092745154045192dd68a2a634d0cf3b39f14953b3e33af03177cf62824341251ff4c75db7a0389bbeead496c81e1ce7dbd99f6045299c322b71030d7de6177e03fc5bbee469b747d451db6595527f4231a52b3141ea3bf0ffeb8b29df238", 0xef, &(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)="9caf8e75648ac1469d8036b5fde6af2860d64bd04e3c68d4b64fca478359f80da0d2d931e6c1336000239cc152d33d94ba1cd343ed27171f72d7c75896840bb8c8b84fcb40b794afbbebfd502bf4029d3bf1d0d9b99cf79019dce634fda96720ad0989d3784479dd0c4bcc9445ef823e2cb510d163e5895a13d5b660e6a74988e3707e1d10c66d23d638525463f44206bf8208da451bcb19f5ea921e60383db91f92aa94ed0909945152c48048f1650c1d5e2b4082b5d29cf4fa") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000f80)=@generic={&(0x7f0000000f40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001280)={r13, 0xe0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000fc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000001000)=[0x0], &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe, &(0x7f0000001080)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000010c0), &(0x7f0000001100), 0x8, 0x9, 0x8, 0x8, &(0x7f0000001140)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000012c0)={@map=r14, r11, 0x13, 0x20, r13, @prog_id=r15}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000016c0)={&(0x7f0000001300)="7bda1f9f92f46d32795560f0f39e9fd94b3abd562f1b95422f955599c21dc172bd85c955cf3cd632cbc0da65ae149cf1c89ba0246d1aeae506d6c16a5a0b3b34c743a43cf3f36acacb6da9baade9449bbeddcba00c22df439e5c5af864a52b914e1daf8e058c110b1246775f379cdac6b4e9ab0320e425ab1f51e91ecf69a2cce15addf1ec3530744db4768559f96e3a015dd62c7185135a4a4c24f4997a127ca362c48272c16e442ad8e72fd9506090a0bf27b07b531eba15dd470d5384df486f4153f526", &(0x7f0000001400)=""/148, &(0x7f00000014c0)="b50536d6298cc2493eaa7c440c09aa6fac7b5e16fbe562af3f2ca6f06420861df861b5867edf8201e7262d379dda53794c58ce4e76759451b622d359f4941856a3bfca1f99858ad8d85130e7a571b50577ab904d2e4fb0c47e9ccc9bcbf82c7c04c223f40c420cc23229858ba1794f19d3734fe67623af5cd3846d3d87a758a9feff15270e78b56bbc5b66cb322261f1b57375a29467fe94604fc80edd94ca515c969f96fc6b07baa71e1f68f7400fefdf80e5a663992d2d25e02c30f23f65406b5dfb1eb29e4540674b000ae7d4335bc00e3d6aec581224434f48be66afad4067fa58fd1a56e87d8f9b67ab01628a1025e8f9e30b258ec9", &(0x7f00000015c0)="a6e23b5ecfac1970e30b88f2f626921b935115e376c8b20b1260280984f86abc4a86c7a2062598fb7535f2f2ea91772ca512e0df14e4a1671b1a8d224bdcb9c1b580dbbf60e9ec5c2563f4e09086f9aa6df44d3688513bb5a7decb473f2cf829274015d1ba8913a2ecf4efe192feee1e1ea52b57972d38a73f54551902188b65e8fddb00ecf9dc4e4ffe81bc1bd7d8510e32c3f7635ffff5dba2e99754fdb0c99844878252e553124feece2454c47be50a3e73e963137957115382355c89e3f55133b71a759df31dd76eff3a", 0x6, r9}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000019c0)={r13, 0xe0, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000001740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4f, &(0x7f00000017c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001800), &(0x7f0000001840), 0x8, 0x57, 0x8, 0x8, &(0x7f0000001880)}}, 0x10) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x8, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @union={0x8, 0x3, 0x0, 0x5, 0x0, 0x4, [{0x8, 0x3, 0x7}, {0x9, 0x2, 0xfa99}, {0xf, 0x2, 0x7}]}]}, {0x0, [0x30, 0x2e, 0x5f, 0x5f, 0x61, 0x1e]}}, &(0x7f0000001a80)=""/144, 0x5c, 0x90, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x7, 0x0, 0x2, 0x4, r12, 0x8, '\x00', r16, r17, 0x2, 0x3, 0x2, 0xa}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c40)='net_prio.prioidx\x00', 0x0, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000e1000000b70800004000d51b0adf7800007b8af8ff000000bfa2008ae100000007020000f8ffffffb703000008000000b7040000000000008500000003000000950000000000000000adfdb1522568c1afb2ced60625f891937d73cbcd1bd590aee191f9596b75d026f92dbac65e7d2d3ec687e1d178"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xe) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000680), &(0x7f00000006c0)}, 0x20) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f00000000c0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r5, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000280)={'\x00', 0x41}) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc402, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000bdb200b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x2000) [ 89.328432][ T5563] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.335404][ T5563] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.344307][ T5563] device bridge_slave_0 entered promiscuous mode executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000002090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') [ 89.377704][ T5563] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.384539][ T5563] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.408804][ T5563] device bridge_slave_1 entered promiscuous mode executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a88a855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d80)={&(0x7f0000000d40)='percpu_free_percpu\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x0, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r3}, &(0x7f0000001c00), &(0x7f0000001c40)=r4}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x7}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r6, &(0x7f0000000d80), 0x0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r5}, &(0x7f0000000080), &(0x7f0000000180)='%pI4 \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000100fe0000000000d20208850000002300000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r10}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r8, 0x20, &(0x7f0000000600)={&(0x7f0000000800)=""/100, 0x64, 0x0, &(0x7f00000028c0)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0x23, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @jmp={0x5, 0x1, 0xc, 0x0, 0xa, 0x30, 0xfffffffffffffffc}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000400)='syzkaller\x00', 0x8001, 0x9f, &(0x7f0000000540)=""/159, 0x0, 0x44, '\x00', 0x0, 0x12, r8, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0x0, 0x3}, 0x10, r12, r9, 0x0, &(0x7f00000008c0)=[r5, r0, r8]}, 0x90) r13 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r11}, 0x8) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r13, &(0x7f00000001c0), 0xfffffdef) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r15}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 89.441019][ T5560] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.448432][ T5560] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.456902][ T5560] device bridge_slave_0 entered promiscuous mode [ 89.488936][ T5560] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.495790][ T5560] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.511037][ T5560] device bridge_slave_1 entered promiscuous mode [ 89.517592][ T5562] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.524425][ T5562] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.540507][ T5562] device bridge_slave_0 entered promiscuous mode [ 89.585072][ T5562] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.593843][ T5562] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.612195][ T5562] device bridge_slave_1 entered promiscuous mode executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000900000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020532500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000040)='sched_process_fork\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x10001) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x5, 0x12) r1 = syz_clone(0x40002000, &(0x7f0000000140)="f5b3b42b594b32cce9099e002f6c18ce38a8ee6598155a841991224f7978ad57eb868c1a7c6a1a8d946fad79f7a47904fd12228439d221ca827b28d52206080a1cd74733ac1f21d7eedc3e2bb79c072f147f47070ea65fbc7ef6387d444254381c76f9f221f079484f5e63dd8900aaa08cc4f7991d4e2ffa26be5318a8411d3d515556f7313c813a3781468ee5dfe5b7bf778bb4877f238b48b8fbf4bef65d231e97821cacbedcd67aeaa1581d27b40b828b45", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="b1a698a4b09e944102896e37137f8a25355695a1f733780a7290cc39924958474d767dd970fdabd423271d7879c69c277d45c3939f19d6ef83e41314e06fa805602acdba8b949b9c58c872db4fdd2f923ed30a6a602d8f3c8473e5e0d82e4184210822ca23d8594cb7b8abb16b7bbd9642891b7dc5031affc87edc8aa01e718f319c32c909a970ccf8f8666f7b9cfd540f9b4bfb6ad36a7ac964cc350a8ee5a453c6ebfc89354e5d06844eed7a32cc41df13e6a6522d69c9c474f217369ad4224802a857120ac7a2d41c962c75aaf1") r2 = perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x89, 0x1f, 0x1, 0x0, 0x0, 0x200, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x8, 0x3}, 0x10010, 0x80000001, 0x3, 0x2, 0x7, 0x40, 0x26, 0x0, 0xb1, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x79, 0x9, 0x3, 0x0, 0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x12d1255a, 0x88d3}, 0x2000, 0x5, 0x2, 0x3, 0x2, 0x2, 0x0, 0x0, 0x80000001, 0x0, 0x40}, r1, 0xd, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x105201, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000440)={'pim6reg1\x00'}) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x3, 0x0}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={0x1, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0xffffffffffffffff, 0x1f, 0x10}, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r3, 0xffff0001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0x5, &(0x7f0000000480)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x200}], &(0x7f00000004c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0xdbedf2f9f8028b6b, r5, 0x8, &(0x7f0000000540)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0xd94, 0x3ff}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000740)=[0x1, 0xffffffffffffffff, r7, r8, r9, r10], &(0x7f0000000780)=[{0x0, 0x2, 0xa, 0xc}, {0x4, 0x1, 0x2, 0x2}, {0x3, 0x4, 0x9, 0x8}, {0x4, 0x4, 0x6, 0xb}, {0x3, 0x3, 0x1}], 0x10, 0xffffffda}, 0x90) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x3, 0x0, r7, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x17, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f00000009c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0xa, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000ac0)=[r12, 0x1, r10, r8, r9], &(0x7f0000000b00)=[{0x2, 0x3}, {0xcf, 0x3, 0x0, 0x6}, {0x1, 0x2, 0xd, 0xb}, {0x5, 0x4, 0x4, 0x5}, {0x3, 0x5, 0x1, 0x9}], 0x10, 0x1}, 0x90) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000c40)={'tunl0\x00'}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c80)=r6, 0x4) syz_clone(0x180000000, &(0x7f0000000cc0)="daa66804ac7c44be11cdab28a00dd9ba092d246b89fd081233d2d80e6910b6f5b749d4069fbcb84d5ead8f46b5bb6c650a05956f6225d2cb15d449e9c0f71628b359ffff5e20a7213e161616db9159cc8c68d6dd0495af832f9d6e3762947f52f3f52f322a703425d3d7afafd5e7497c09685b3dc325fb8c42cd74eade36432bb66b704c8ab7893b2b186db2774c208e94092745154045192dd68a2a634d0cf3b39f14953b3e33af03177cf62824341251ff4c75db7a0389bbeead496c81e1ce7dbd99f6045299c322b71030d7de6177e03fc5bbee469b747d451db6595527f4231a52b3141ea3bf0ffeb8b29df238", 0xef, &(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)="9caf8e75648ac1469d8036b5fde6af2860d64bd04e3c68d4b64fca478359f80da0d2d931e6c1336000239cc152d33d94ba1cd343ed27171f72d7c75896840bb8c8b84fcb40b794afbbebfd502bf4029d3bf1d0d9b99cf79019dce634fda96720ad0989d3784479dd0c4bcc9445ef823e2cb510d163e5895a13d5b660e6a74988e3707e1d10c66d23d638525463f44206bf8208da451bcb19f5ea921e60383db91f92aa94ed0909945152c48048f1650c1d5e2b4082b5d29cf4fa") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000f80)=@generic={&(0x7f0000000f40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001280)={r13, 0xe0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000fc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000001000)=[0x0], &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe, &(0x7f0000001080)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000010c0), &(0x7f0000001100), 0x8, 0x9, 0x8, 0x8, &(0x7f0000001140)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000012c0)={@map=r14, r11, 0x13, 0x20, r13, @prog_id=r15}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000016c0)={&(0x7f0000001300)="7bda1f9f92f46d32795560f0f39e9fd94b3abd562f1b95422f955599c21dc172bd85c955cf3cd632cbc0da65ae149cf1c89ba0246d1aeae506d6c16a5a0b3b34c743a43cf3f36acacb6da9baade9449bbeddcba00c22df439e5c5af864a52b914e1daf8e058c110b1246775f379cdac6b4e9ab0320e425ab1f51e91ecf69a2cce15addf1ec3530744db4768559f96e3a015dd62c7185135a4a4c24f4997a127ca362c48272c16e442ad8e72fd9506090a0bf27b07b531eba15dd470d5384df486f4153f526", &(0x7f0000001400)=""/148, &(0x7f00000014c0)="b50536d6298cc2493eaa7c440c09aa6fac7b5e16fbe562af3f2ca6f06420861df861b5867edf8201e7262d379dda53794c58ce4e76759451b622d359f4941856a3bfca1f99858ad8d85130e7a571b50577ab904d2e4fb0c47e9ccc9bcbf82c7c04c223f40c420cc23229858ba1794f19d3734fe67623af5cd3846d3d87a758a9feff15270e78b56bbc5b66cb322261f1b57375a29467fe94604fc80edd94ca515c969f96fc6b07baa71e1f68f7400fefdf80e5a663992d2d25e02c30f23f65406b5dfb1eb29e4540674b000ae7d4335bc00e3d6aec581224434f48be66afad4067fa58fd1a56e87d8f9b67ab01628a1025e8f9e30b258ec9", &(0x7f00000015c0)="a6e23b5ecfac1970e30b88f2f626921b935115e376c8b20b1260280984f86abc4a86c7a2062598fb7535f2f2ea91772ca512e0df14e4a1671b1a8d224bdcb9c1b580dbbf60e9ec5c2563f4e09086f9aa6df44d3688513bb5a7decb473f2cf829274015d1ba8913a2ecf4efe192feee1e1ea52b57972d38a73f54551902188b65e8fddb00ecf9dc4e4ffe81bc1bd7d8510e32c3f7635ffff5dba2e99754fdb0c99844878252e553124feece2454c47be50a3e73e963137957115382355c89e3f55133b71a759df31dd76eff3a", 0x6, r9}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000019c0)={r13, 0xe0, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000001740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4f, &(0x7f00000017c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001800), &(0x7f0000001840), 0x8, 0x57, 0x8, 0x8, &(0x7f0000001880)}}, 0x10) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x8, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @union={0x8, 0x3, 0x0, 0x5, 0x0, 0x4, [{0x8, 0x3, 0x7}, {0x9, 0x2, 0xfa99}, {0xf, 0x2, 0x7}]}]}, {0x0, [0x30, 0x2e, 0x5f, 0x5f, 0x61, 0x1e]}}, &(0x7f0000001a80)=""/144, 0x5c, 0x90, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x7, 0x0, 0x2, 0x4, r12, 0x8, '\x00', r16, r17, 0x2, 0x3, 0x2, 0xa}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c40)='net_prio.prioidx\x00', 0x0, 0x0) [ 89.791455][ T5584] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.798392][ T5584] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.805495][ T5584] device bridge_slave_0 entered promiscuous mode [ 89.828363][ T5584] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.835196][ T5584] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.842469][ T5584] device bridge_slave_1 entered promiscuous mode [ 89.882045][ T5560] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.888919][ T5560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.896021][ T5560] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.902813][ T5560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.923961][ T5563] bridge0: port 2(bridge_slave_1) entered blocking state executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x71, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 89.930818][ T5563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.937902][ T5563] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.944680][ T5563] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc803, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 89.980873][ T5562] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.987738][ T5562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.994815][ T5562] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.001638][ T5562] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x1f}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000220000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r2, 0x5, '\x00', 0x0, r0, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000001c0)}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001000)='timer_start\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r8}, 0x10) [ 90.086786][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.094793][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.103163][ T601] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.110414][ T601] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.118076][ T601] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.125162][ T601] bridge0: port 2(bridge_slave_1) entered disabled state executing program 2: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0x7, 0x8, 0x6, 0x2020, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa3, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xc4, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x22, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc8d0}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x1, 0x2, 0x2, 0xa, 0xa, 0xffffffffffffffff, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x4, 0xa, 0x800, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000940)=[0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000980)=[{0x5, 0x5, 0xf, 0xc}, {0x5, 0x3, 0xb, 0x8}, {0x1, 0x1, 0xa, 0x5}], 0x10, 0x4}, 0x90) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)=@o_path={&(0x7f0000000a80)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)}, 0x20) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000bc0)={0xffffffffffffffff, 0x9}, 0xc) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7f3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0xf, 0x19, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffa}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f00000002c0)='syzkaller\x00', 0x8, 0xe7, &(0x7f0000000300)=""/231, 0x40f00, 0x0, '\x00', r3, 0x35, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x7, 0x7, 0x5}, 0x10, 0x0, r5, 0x8, &(0x7f0000000d80)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000dc0)=[{0x1, 0x1, 0xc, 0xc}, {0x0, 0x1, 0x5, 0x8}, {0x4, 0x1, 0x7, 0x4}, {0x4, 0x4, 0x1, 0x2}, {0x1, 0x4, 0x1, 0x6}, {0x1, 0x2, 0xc, 0x5}, {0x5, 0x1, 0x7, 0x2}, {0x0, 0x2, 0x1, 0xc}], 0x10, 0xfff}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000f00)=r4, 0x4) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000f40)=0xffffffffffffffff, 0x4) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000f80)={r12}, 0x8) setsockopt$sock_attach_bpf(r13, 0x1, 0x32, &(0x7f0000000fc0)=r12, 0x4) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000001000)={'macsec0\x00', 0x800}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000001040), 0x2, 0x0) ioctl$TUNSETCARRIER(r14, 0x400454e2, &(0x7f0000001080)) write$cgroup_type(r13, &(0x7f00000010c0), 0x9) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r15, &(0x7f0000002240)={&(0x7f0000001140)=@id={0x1e, 0x3, 0x1, {0x4e23}}, 0x10, &(0x7f0000001200)=[{&(0x7f0000001180)="3ab18961d6331160fa869893613c843641b9d6af0623b4e070969e8d2f417d5a90", 0x21}, {&(0x7f00000011c0)="d9da5f5068caca0618c8d0171b84cdd2dd9dc8c5e489bbb8940952b3f1255c0e6f", 0x21}], 0x2, &(0x7f0000001240)="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", 0x1000}, 0x4010) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002300)={{r2}, &(0x7f0000002280), &(0x7f00000022c0)=r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000023c0)={r0, 0x58, &(0x7f0000002340)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r13, 0x40082404, &(0x7f0000002400)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002480)={&(0x7f0000002440)='afs_call\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000024c0)={0x0, r0}, 0x10) ioctl$TUNSETLINK(r10, 0x400454cd, 0x207) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000002500)={0xffffffffffffffff}) sendmsg$sock(r16, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002540)="8dd07ec1b2a21329559f5a1c5783c12c608778c455d5c9bca542a8cc120ea900f9c577c7719ff8448f15b7eb52451bf079dfdfe47411ea2de08d9601d24224417d134aaab195b909ae398d4d1eb98a78978dd07cd28f1d9eb8fc7ed852642d031c4e3e5b035e8c3a1b248e06c80f5bd4f42221584ee36d7c46f6b50924fef59e808fe88127d909111c4c2fa12cc99a4b810427d46af898da3aaf6c5a7f759467604eb5f69a8efbaa4bf3345ed7e06a81506946ecedad2f5d7d053f5adbbaef2c342d69c1da0a3cf325aee4f49165a8e3ec01721f749584a2cdaf949337c5316d0a86bde7aac47fda5bacc45b501508eb", 0xf0}, {&(0x7f0000002640)="1afe6a589f0c549443386ec414e8f836703ba8b63f9efb961885c5b86b70468869126fa88dfbc9b9dfd244f50070c1b682bd764ba8c21ebd2d0acc322703a2f9a50e1631a0995cf08d906015949c19c3f929cce2d66ce239f89a4f1e995103efed3ba48cc8eb06c9f64250cb986ef283528a57908c94ecd12c808a1a4b2bc11b28c70b42e2e2df41063bff882668ee7df184f51016f6682d0c800eee7ca4c0ad93bc9f940495d94eab38ce", 0xab}, {&(0x7f0000002700)="740e9ed61113033d10228080fc4223b5e7cb4da67576c63ac0e668176a4617f8e9666c98068c91bce581a388362d543979f0a0c1a6151395d08b8e6da3f08c8cbcd57e", 0x43}, {&(0x7f0000002780)="a4dc1e27bfd29fdc431d192541ee046c2a0cdb8ba29e75263388e02f6d9561bae856ec2762e916b290327870754e7b9ae406957328d21c1902cb034afc7fc3a1162d79659637eadc6b", 0x49}, {&(0x7f0000002800)="cac0327d7ea54589", 0x8}, {&(0x7f0000002840)}, {&(0x7f0000002880)="62a3e01d25ab30ba44ad2e6e235657aaf9a75b8a6ff52b29c6c3e186a33fab6ad0c5a28f4ecee1674622207a047d2c1fe7b7d927541436ce3db9e43b2a8b1411a3898dc7c04fd1f89aca944c57ef010648d2f2036f23f0a48d69004ea54f6b8fee6b5f2876a9433e22276c64c347891c14f0e12ef4afcbffbbe975e4ad005e72f343cfab33b092eac9c7af77733f3a3a1a42b54f0582d38771eea5a27dd4ade421fa177acab7315fc471b75808ef7290b3914077704384544978a73566063d91d210bfd0eaaeb81d403a628209f7779dcecc1c1bc4be37ee9546021cd942e6bd9b394b808a6fbf93eb8a058e7aff06043e23be9203656ec5c2", 0xf9}, {&(0x7f0000002980)="6857e6f2beb4b28f3f0cd92b6aa0d904229a7e89a47da14a75c4b8844f87e69d32373f4fe169e20441af9327c0df49a73e0eaff2f239d71238dccaab2025f4647004ededd669745073fcd7548c6ac3b06d518eb60a4897a4f960e9", 0x5b}, {&(0x7f0000002a00)="5bf561eb8c1bc941fcbfe5468fd3de85044f6c3ea06f7fdca604b43e944907196abc305bb57ba0", 0x27}, {&(0x7f0000002a40)="be8044b8d1e86900fef92c208e1c0bdaee1593712ccf02ae009aa729b80bc7aa5f1c793bb57d6fb390fa796d91b4b7b70fcf4c0bad6faa8649", 0x39}], 0xa, &(0x7f0000002b40)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}], 0x30}, 0x800) [ 90.132338][ T601] bridge0: port 2(bridge_slave_1) entered disabled state executing program 2: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x5, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='[\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000500)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) [ 90.175800][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300002faf0000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000d0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0xfffffffffffffffc) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000110000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=@framed={{}, [@ringbuf_query, @snprintf, @printk={@x}]}, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1a, 0xd, &(0x7f00000004c0)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7b}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x2, 0x0, 0x0, 0x3, 0x4, 0xfffffffffffffff4, 0xfffffffffffffffc}], &(0x7f0000000300)='syzkaller\x00', 0x80000000, 0xe6, &(0x7f00000005c0)=""/230, 0x0, 0x0, '\x00', 0x0, 0x42, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x1, 0xb, 0x5, 0x4}, 0x10, 0x0, r6, 0x0, 0x0, 0x0, 0x10, 0xffff6996}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) [ 90.222581][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.230228][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.241159][ T4374] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.248045][ T4374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.255476][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.263588][ T4374] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.270430][ T4374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.277733][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.285728][ T4374] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.292570][ T4374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.299753][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.307733][ T4374] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.314643][ T4374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.321836][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.329650][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.337623][ T4374] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.344446][ T4374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.356548][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.364539][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.376751][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.384616][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.396185][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.405012][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.412837][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.420747][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.428577][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.436764][ T4374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x10001) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0x5, 0x12) r1 = syz_clone(0x40002000, &(0x7f0000000140)="f5b3b42b594b32cce9099e002f6c18ce38a8ee6598155a841991224f7978ad57eb868c1a7c6a1a8d946fad79f7a47904fd12228439d221ca827b28d52206080a1cd74733ac1f21d7eedc3e2bb79c072f147f47070ea65fbc7ef6387d444254381c76f9f221f079484f5e63dd8900aaa08cc4f7991d4e2ffa26be5318a8411d3d515556f7313c813a3781468ee5dfe5b7bf778bb4877f238b48b8fbf4bef65d231e97821cacbedcd67aeaa1581d27b40b828b45", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="b1a698a4b09e944102896e37137f8a25355695a1f733780a7290cc39924958474d767dd970fdabd423271d7879c69c277d45c3939f19d6ef83e41314e06fa805602acdba8b949b9c58c872db4fdd2f923ed30a6a602d8f3c8473e5e0d82e4184210822ca23d8594cb7b8abb16b7bbd9642891b7dc5031affc87edc8aa01e718f319c32c909a970ccf8f8666f7b9cfd540f9b4bfb6ad36a7ac964cc350a8ee5a453c6ebfc89354e5d06844eed7a32cc41df13e6a6522d69c9c474f217369ad4224802a857120ac7a2d41c962c75aaf1") r2 = perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x1, 0x89, 0x1f, 0x1, 0x0, 0x0, 0x200, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x8, 0x3}, 0x10010, 0x80000001, 0x3, 0x2, 0x7, 0x40, 0x26, 0x0, 0xb1, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x79, 0x9, 0x3, 0x0, 0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x400, 0x0, @perf_config_ext={0x12d1255a, 0x88d3}, 0x2000, 0x5, 0x2, 0x3, 0x2, 0x2, 0x0, 0x0, 0x80000001, 0x0, 0x40}, r1, 0xd, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x105201, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000440)={'pim6reg1\x00'}) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0x3, 0x0}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000600)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000640)={0x1, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0xffffffffffffffff, 0x1f, 0x10}, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x8, 0x0, r3, 0xffff0001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0x5, &(0x7f0000000480)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x3}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x200}], &(0x7f00000004c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0xdbedf2f9f8028b6b, r5, 0x8, &(0x7f0000000540)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0xc, 0xd94, 0x3ff}, 0x10, r6, 0xffffffffffffffff, 0x5, &(0x7f0000000740)=[0x1, 0xffffffffffffffff, r7, r8, r9, r10], &(0x7f0000000780)=[{0x0, 0x2, 0xa, 0xc}, {0x4, 0x1, 0x2, 0x2}, {0x3, 0x4, 0x9, 0x8}, {0x4, 0x4, 0x6, 0xb}, {0x3, 0x3, 0x1}], 0x10, 0xffffffda}, 0x90) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x3, 0x0, r7, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x2}, 0x48) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x17, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x0, r10, 0x8, &(0x7f00000009c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0xa, 0x9, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000ac0)=[r12, 0x1, r10, r8, r9], &(0x7f0000000b00)=[{0x2, 0x3}, {0xcf, 0x3, 0x0, 0x6}, {0x1, 0x2, 0xd, 0xb}, {0x5, 0x4, 0x4, 0x5}, {0x3, 0x5, 0x1, 0x9}], 0x10, 0x1}, 0x90) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000c40)={'tunl0\x00'}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c80)=r6, 0x4) syz_clone(0x180000000, &(0x7f0000000cc0)="daa66804ac7c44be11cdab28a00dd9ba092d246b89fd081233d2d80e6910b6f5b749d4069fbcb84d5ead8f46b5bb6c650a05956f6225d2cb15d449e9c0f71628b359ffff5e20a7213e161616db9159cc8c68d6dd0495af832f9d6e3762947f52f3f52f322a703425d3d7afafd5e7497c09685b3dc325fb8c42cd74eade36432bb66b704c8ab7893b2b186db2774c208e94092745154045192dd68a2a634d0cf3b39f14953b3e33af03177cf62824341251ff4c75db7a0389bbeead496c81e1ce7dbd99f6045299c322b71030d7de6177e03fc5bbee469b747d451db6595527f4231a52b3141ea3bf0ffeb8b29df238", 0xef, &(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)="9caf8e75648ac1469d8036b5fde6af2860d64bd04e3c68d4b64fca478359f80da0d2d931e6c1336000239cc152d33d94ba1cd343ed27171f72d7c75896840bb8c8b84fcb40b794afbbebfd502bf4029d3bf1d0d9b99cf79019dce634fda96720ad0989d3784479dd0c4bcc9445ef823e2cb510d163e5895a13d5b660e6a74988e3707e1d10c66d23d638525463f44206bf8208da451bcb19f5ea921e60383db91f92aa94ed0909945152c48048f1650c1d5e2b4082b5d29cf4fa") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000f00)) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000f80)=@generic={&(0x7f0000000f40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001280)={r13, 0xe0, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000fc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000001000)=[0x0], &(0x7f0000001040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe, &(0x7f0000001080)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000010c0), &(0x7f0000001100), 0x8, 0x9, 0x8, 0x8, &(0x7f0000001140)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000012c0)={@map=r14, r11, 0x13, 0x20, r13, @prog_id=r15}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000016c0)={&(0x7f0000001300)="7bda1f9f92f46d32795560f0f39e9fd94b3abd562f1b95422f955599c21dc172bd85c955cf3cd632cbc0da65ae149cf1c89ba0246d1aeae506d6c16a5a0b3b34c743a43cf3f36acacb6da9baade9449bbeddcba00c22df439e5c5af864a52b914e1daf8e058c110b1246775f379cdac6b4e9ab0320e425ab1f51e91ecf69a2cce15addf1ec3530744db4768559f96e3a015dd62c7185135a4a4c24f4997a127ca362c48272c16e442ad8e72fd9506090a0bf27b07b531eba15dd470d5384df486f4153f526", &(0x7f0000001400)=""/148, &(0x7f00000014c0)="b50536d6298cc2493eaa7c440c09aa6fac7b5e16fbe562af3f2ca6f06420861df861b5867edf8201e7262d379dda53794c58ce4e76759451b622d359f4941856a3bfca1f99858ad8d85130e7a571b50577ab904d2e4fb0c47e9ccc9bcbf82c7c04c223f40c420cc23229858ba1794f19d3734fe67623af5cd3846d3d87a758a9feff15270e78b56bbc5b66cb322261f1b57375a29467fe94604fc80edd94ca515c969f96fc6b07baa71e1f68f7400fefdf80e5a663992d2d25e02c30f23f65406b5dfb1eb29e4540674b000ae7d4335bc00e3d6aec581224434f48be66afad4067fa58fd1a56e87d8f9b67ab01628a1025e8f9e30b258ec9", &(0x7f00000015c0)="a6e23b5ecfac1970e30b88f2f626921b935115e376c8b20b1260280984f86abc4a86c7a2062598fb7535f2f2ea91772ca512e0df14e4a1671b1a8d224bdcb9c1b580dbbf60e9ec5c2563f4e09086f9aa6df44d3688513bb5a7decb473f2cf829274015d1ba8913a2ecf4efe192feee1e1ea52b57972d38a73f54551902188b65e8fddb00ecf9dc4e4ffe81bc1bd7d8510e32c3f7635ffff5dba2e99754fdb0c99844878252e553124feece2454c47be50a3e73e963137957115382355c89e3f55133b71a759df31dd76eff3a", 0x6, r9}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000019c0)={r13, 0xe0, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000001740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4f, &(0x7f00000017c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001800), &(0x7f0000001840), 0x8, 0x57, 0x8, 0x8, &(0x7f0000001880)}}, 0x10) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x8, [@restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @union={0x8, 0x3, 0x0, 0x5, 0x0, 0x4, [{0x8, 0x3, 0x7}, {0x9, 0x2, 0xfa99}, {0xf, 0x2, 0x7}]}]}, {0x0, [0x30, 0x2e, 0x5f, 0x5f, 0x61, 0x1e]}}, &(0x7f0000001a80)=""/144, 0x5c, 0x90, 0x0, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=@bloom_filter={0x1e, 0x7, 0x0, 0x2, 0x4, r12, 0x8, '\x00', r16, r17, 0x2, 0x3, 0x2, 0xa}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c40)='net_prio.prioidx\x00', 0x0, 0x0) [ 90.478260][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.486156][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.494198][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.502949][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.510910][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.518980][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.527050][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.534634][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.542962][ T5563] device veth0_vlan entered promiscuous mode [ 90.549008][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.556232][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.563638][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.570876][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.585585][ T5560] device veth0_vlan entered promiscuous mode [ 90.613493][ T5563] device veth1_macvtap entered promiscuous mode [ 90.624570][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.632867][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.640408][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.648688][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.656689][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.663517][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.670721][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.678828][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.686775][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.693591][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.700733][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.708730][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.716766][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.724619][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.732510][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.744083][ T5560] device veth1_macvtap entered promiscuous mode [ 90.752361][ T5562] device veth0_vlan entered promiscuous mode [ 90.764357][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.772100][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.780257][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.788113][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.795445][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.803096][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.811551][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.818784][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.844460][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.852578][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.860657][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.869185][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.877525][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.885494][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="00000000e1000000b70800004000d51b0adf7800007b8af8ff000000bfa2008ae100000007020000f8ffffffb703000008000000b7040000000000008500000003000000950000000000000000adfdb1522568c1afb2ced60625f891937d73cbcd1bd590aee191f9596b75d026f92dbac65e7d2d3ec687e1d178"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xe) [ 90.893530][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.901500][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.909594][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x72, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x10, &(0x7f0000000480)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, &(0x7f00000000c0)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1}, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbb}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000002280)={'veth0_vlan\x00', @random="2b0100004ec6"}) executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x200) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f00000007c0)='task_newtask\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, 0x0, 0xe) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r9, 0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f0000000100)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x0, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', r10, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x4f34, 0x3ff, 0x2, 0x40, 0x1, 0x1c000, '\x00', r10, 0xffffffffffffffff, 0x5, 0x4, 0x1, 0x2}, 0x48) write$cgroup_devices(r8, &(0x7f0000000600)=ANY=[@ANYBLOB="1e0308004d6b71ef2885630182700004110000000000000000000000000000000001"], 0xffdd) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'bridge0\x00', 0x400}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0xe, &(0x7f0000000300)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x3, 0x1, 0x0, r4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5b61}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="9e36d448b388dd965f7a3312779a", 0x0, 0x10700, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24}, 0x90) [ 90.936343][ T5562] device veth1_macvtap entered promiscuous mode [ 90.944404][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.953453][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca02, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2e0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x3, 0x300000, 0x6, 0xb10, r0, 0x9, '\x00', r1, r0, 0x4, 0x3, 0x2, 0x9}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r4}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x7, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x0, 0x61, 0x30]}}, &(0x7f00000004c0)=""/183, 0x29, 0xb7, 0x0, 0xecf}, 0x20) r6 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r6, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r6, &(0x7f0000000600)='ns/mnt\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@fwd={0x5}, @func={0x4, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f00000006c0)=""/143, 0x34, 0x8f, 0x0, 0x4}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x9, 0xab, 0x7, 0x15, r0, 0xffffffff, '\x00', r1, r5, 0x1, 0x0, 0x2, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_discard_preallocations\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r3}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r9}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x4004662b, 0x20001412) [ 91.000076][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.013925][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.028496][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)='<\xb6s:\xd04\x04@\x9cB\xba\xdd\n\xbb\xea\x9f\xba\a\x9d\xae\xd4\xc1\x8bN\x9f\xa8q\xa9Y\xfcM\xc8\xb2\xbd\xfb\x80\xf9&,Ip\xb5\xfd\xe2O\xea\b\x94\xa8\x8f\xcc\xe9\x87?8\xc0L\xe8\xabqP\xbb\xab\x82#6\x7f') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00'}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x420000, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r5}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, &(0x7f0000000980), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000440)='7\xfdb\xdah[\xb6Y[\xef\x83r\xb169\xd3\xad\xf9M\xa9\xa7\xd6\b\xb7\xb2d,\xcaBs1\xdf\x96\x10\x1a|R\"a\xb0H\x882X\x14\x82\xc6h\xfa\xda!\x13\xf7D\xd4n\x1c\x87SrB\xacvx\xe2~5S\x00\x92\byMm$\x19uW\x96\xa5\xac\xbe%\xeb\\b{\xd8\xed!8\x16\xd3IZ\x15\xe1$\xe4\xff\xa9\x83\xb1v\x9c/h0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r10, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x2b, &(0x7f00000000c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r8, 0x64, 0xfffffffffffffffe}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xb, &(0x7f00000005c0)=ANY=[@ANYRES8=r4, @ANYRES16=r0, @ANYRES64=r9], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000040)={'wg0\x00', @multicast}) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r1, &(0x7f0000000400), 0x0}, 0x20) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000580)) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='rpcb_register\x00', r11}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x7, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) [ 91.085015][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 91.104270][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.112211][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.122907][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095", @ANYBLOB="8deceef6dbedb5989a8a3df83224dcdb9114cd4c33cb887f13afcb7bd78fa728de8c61e09b49bb7a30cee46f9cb519706d17c5e401288553e0cee42424e029866f1d40d1bae506190e48444c66b8c19f709c7d3b", @ANYRES64=r2, @ANYRESDEC=r3, @ANYRES8], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0xfffffd4d) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b18, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0x1080}], 0x1}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095", @ANYRESOCT=r6], &(0x7f0000000400)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x34000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x1e) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[], 0x32600) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r6}, 0x10) unlink(&(0x7f00000007c0)='./cgroup\x00') close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r7, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='ext4_allocate_inode\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, r9}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x1, 0x0, 0x8001}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000dc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x4}, @typedef={0x0, 0x0, 0x0, 0x13, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x52}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0xde, 0x0, 0x1, 0x8, '\x00', 0x0, r3, 0x3, 0x1, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', 0x0, r3, 0x5, 0x2, 0x7}, 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x41) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000003000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200004c070000b7030000040000008500000083000000c9"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203ca3c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000000), 0x9) write$cgroup_freezer_state(r10, &(0x7f0000000540)='FREEZING\x00', 0x9) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, &(0x7f0000000440)=ANY=[@ANYRESHEX=r3, @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) [ 91.142816][ T5584] device veth0_vlan entered promiscuous mode [ 91.176213][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 91.216060][ T5584] device veth1_macvtap entered promiscuous mode [ 91.226385][ T629] device bridge_slave_1 left promiscuous mode [ 91.232552][ T629] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f00000003c0)=ANY=[], 0x7) write$cgroup_pid(r3, &(0x7f0000000500), 0x12) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454da, &(0x7f0000000080)={'batadv0\x00'}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'geneve1\x00', 0x1}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) close(0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xd65, 0x6, 0x3, 0xe5a27fa6386e4e80, r0, 0x40, '\x00', 0x0, r3, 0x3, 0x4, 0x3}, 0x34) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00', r9}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r10 = syz_clone(0x800200, &(0x7f0000000280)="94751043df760c4b57a2e0732dad7849dc84a36d96740a23b5825eb4a275541078a0feeba7c20125179be5e5c9dde97aa0063c9fc4c29b4f4d10d8ddfb931cefe771a11dce75eecb52204aee", 0x4c, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="ceb79cf870b01958f37b82a23316afc6a652aa879d0de8f4a33e25ff946c52922fa26dd27fcdea8cbe27282ce0095bfa4b85f83c3d3af0c334eeea05e0db373e52a17c778aa8dec373b246b4e8b16a8c6bd56c3cf24667aaf8b316b47da1842750e9c75d20774fa340fab603bd6d7e53c3772ee2b28fdfe3ab547a7063cf268b1324c8b204d743af1a71e3890b81aa36fa771eb20e") perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8784}, r10, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8fedd67807001175f375"], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000480)={@map, 0xffffffffffffffff, 0xf, 0x25, 0xffffffffffffffff, @prog_id=0xffffffffffffffff}, 0x20) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0)=0xffffffffffffffff, 0x4) executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) syz_open_procfs$namespace(0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r2}, &(0x7f0000000600), &(0x7f0000000940)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00', r3}, 0x29) write$cgroup_int(r1, &(0x7f0000000200), 0x42400) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100007f0000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xf, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x61d, 0x1000, &(0x7f0000001a40)=""/4096, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x5, 0x2, 0x20}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000003c0)=[{0x3, 0x1, 0xb}, {0x2, 0x3, 0x8, 0x4}, {0x4, 0x5, 0x0, 0x4}, {0x5, 0x4, 0x8, 0x9}, {0x3, 0x2, 0xf, 0x3}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x13}, 0x48) [ 91.258457][ T629] device bridge_slave_0 left promiscuous mode [ 91.270177][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.297887][ T629] device bridge_slave_1 left promiscuous mode [ 91.306064][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.321537][ T629] device bridge_slave_0 left promiscuous mode [ 91.330840][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.344903][ T629] device bridge_slave_1 left promiscuous mode executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r4, 0xffffffffffffffff}, 0x4) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000280)=@raw=[@printk={@lld}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x19, '\x00', 0x0, 0x17, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000180)={0x4, 0x1, 0x3, 0x8}, 0x10, 0x705b, 0xffffffffffffffff, 0x7, &(0x7f00000001c0)=[r2, r4, r4, r0, r4, r4, r6, r4, r1], &(0x7f0000000340)=[{0x0, 0x5, 0x3, 0x1}, {0x0, 0x4, 0x6, 0xb}, {0x4, 0x5, 0x6}, {0x5, 0x5, 0xe, 0x6}, {0x5, 0x2, 0x6, 0x7}, {0x5, 0x5, 0x3, 0x3}, {0x0, 0x5, 0x1, 0x5}], 0x10, 0x80}, 0x90) write$cgroup_devices(r4, &(0x7f0000000a40)=ANY=[], 0x8) [ 91.354279][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.365934][ T629] device bridge_slave_0 left promiscuous mode [ 91.376253][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.388386][ T629] device bridge_slave_1 left promiscuous mode [ 91.400002][ T629] bridge0: port 2(bridge_slave_1) entered disabled state executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002ac0)=ANY=[@ANYBLOB="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"/3595], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000012c0)={0x6, 0x11, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000012c0), &(0x7f00000013c0)=""/235}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r3}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)={0x1b, 0x0, 0x0, 0x100, 0x0, 0xffffffffffffffff, 0xda0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x8, 0x8000, 0x0, 0x2, 0x80, r4, 0x6, '\x00', r5, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x48) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r6, 0x0) syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/pid_for_children\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x200000000000011a, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0xc, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) [ 91.409397][ T629] device bridge_slave_0 left promiscuous mode [ 91.415502][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.427480][ T629] device veth1_macvtap left promiscuous mode [ 91.438599][ T629] device veth0_vlan left promiscuous mode executing program 2: perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'macvtap0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x87}, {0x6}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) executing program 1: bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000001ac0)='ext4_request_blocks\x00', r2}, 0x10) write$cgroup_int(r0, &(0x7f0000000000), 0x400000) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='ext4_mballoc_alloc\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r5}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xf, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000000000180000000000000000000000000000008510000000001801000020696c2500000000002020207b1af8ff00000000bf9700000000000007010600f8ffffffb702000008000000b7030000000000008500000006000000950000000000000000006189e4e5e1e326f9127a4f3f2901bac0ebc9e397f577"], &(0x7f0000000440)='GPL\x00', 0x0, 0x93, &(0x7f0000000480)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000980)=[{}, {}, {}, {0x0, 0x0, 0x1, 0x7}]}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9, 0x84, 0x144}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r6}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r6}, 0x38) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000100)=ANY=[@ANYBLOB='8-', @ANYRESOCT], 0x6a) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 91.768445][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.789853][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.808377][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x1, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000080), 0xce, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000630000000000711f00851000000600000018100000", @ANYRES32=r3, @ANYBLOB="00000000000000007900180100000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 91.820206][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={0xffffffffffffffff, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000580)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000cc0)=[0x0, 0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa7, &(0x7f0000000d40)=[{}], 0x8, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1d, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000008000001000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000c18500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x40086607, 0x20001412) sendmsg$inet(r5, &(0x7f00000007c0)={&(0x7f0000000500)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000540)="03831bf24c35ae5d2c1352299ae44b5c07adeb", 0x13}, {&(0x7f00000008c0)="1dd3498908e38db0a2789666053a82ff6d78988d3648503b2d129a5d013eae5068287c9042910e6fb295af2743539b1453b264a96f2c14957428a644a4f5bfe644725e9a443485fe802572a9b83377f1649698855f36474752ab13657cf3c5f409435119bd617263ecf61d8fad6781973a6b9239b1af892676c33a5b47c4cab37e92ba3d1185aa7c0e59b0af122abca3e2e5d06070b44c838756930f8dec9eda1716c1d2d2df27203dada41c79e32039aadeececb18ceda35475e112abfa753d51b1879f3a86a8543245543ab4c26fc3bdc7e2ee5973a683812b04087fd8186c44836d69202024aebaea2e932c819e4b", 0xf0}, {&(0x7f0000000bc0)="d9f74ad963b9cfa6e713c592f58be4a5a440b915db383f4a4aa6ceb12e005ec32253ac888460de3e472f5a0affdbd6da44e252352b79986e748a2fb8fead744f833ed41537c609198f5007b740f12fdd1fad64aafdd3fd4cef555a02c7741b2325f24ab0378c65052eb6a3d9b601f9a45a286f4e6de4850323f1b30ccd1fa1876a7165c09cff03023355852d86d6b288b15b7309d03685a17f60e06a07db2e0e7f851a14b5a814abb1df1a8fb5997aeb69a5275736ac5f0316facb4d0b8e32a2061481da9b8316edc7cbe4d3669ed0", 0xcf}], 0x3}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000600)='ext4_da_update_reserve_space\x00', r4}, 0x10) r6 = getpid() r7 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r3, &(0x7f0000000680)="f8eeff68dd23c9e251718e057609fd5262c0bf9a0371ad04c7103858cbc9a2c6162880aa34691462f95a5abf499c3ba19d0f7d5cbb705df3378cc967be23795ce2b49913cf7a797e84745a57529f5397564337dc716f5ac9b9e0e54fefdad2b8d117ce35da4cae5a85fabdf4d78e124f2342f27b83ccadc930569d931c14ca744626416f8046231a51a448a01216361ef3decaa42a3bb18fb90263448b29aeb4dd5dbdaca4fdf477bc454af68f5d4d0d978057a3a7e65647e19a4a434f79c9ed01423de2531150d797e0fd3fb70799d26cc8fea373e660617298bd", &(0x7f0000000400)=""/38}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x1, &(0x7f0000000fc0)=ANY=[@ANYBLOB="8520"], &(0x7f0000000080)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x8, 0x1, 0x40}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000640), 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r10, &(0x7f0000000800)='cpuset.effective_cpus\x00', 0x100002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000003c0)={@map=r1, 0x31, 0x0, 0xfbd, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0]}, 0x40) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x40, 0x800, 0xfffffff9, 0x2000, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5, 0x40000000000004}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000680)=0x58, 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x400000001) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000010000000000000000000000850000003600000085000000a000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x7075, 0x5, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRESOCT=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25b45}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) write$cgroup_type(r8, &(0x7f0000000080), 0x9) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r1, r2}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc020662a, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@generic={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0xf, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008003000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='jbd2_handle_stats\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r3, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='jbd2_handle_stats\x00', r6}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESHEX=r2, @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffe8082a010000000000b7040000001f0400000000000000000095", @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r7, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000c900f2ff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1, 0x402}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r11, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r11, 0x0, 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r12}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r13}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r14, &(0x7f0000000180), 0x4000) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r15}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd601, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x79, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x2000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b00)={r0, 0x0, 0x9f, 0x1000, &(0x7f0000000780)="2cdf0d498d2575e770cb7d6449acd52c0f49cf90f04809736ccd94979d7ec2d8b6d59598205b17dcd155ae5ae67d88fcfb9826278ba12e4c37506b9cb6bfa4b4f05451c5cfc660f14af77ed4e297a4342ccf43a3bba81b30cf7097bfdd21eeb1acd927f52097ae768a125e80f8cc93c7d1341684fe0cc374d50bfce3bcce0bc4b2d62fe3ae0a22cc0b56b312be7c85ebcc6b00d709ae67e32faf15cfe8a4e7", &(0x7f0000000b00)=""/4096, 0x8, 0x0, 0xd1, 0xcf, &(0x7f0000001c40)="6c32d4f549a0e69e223526f536267f63c6c8e3bdcf088640f27b1608989618891751e6b17560d52086dd79a14423d36c1bfda06229517752dbbd349b24fa0e4a5de9c8cb4a3eeeeb3fb9249c4da202c68275026361ba8287807c4a3e5c859ab388cfbe247db64757a7e24d1079c29f2131ed966d778b538e2d7384788dc70f1d6b09c58ca08d1c31e2802437ddadeecd6ae9144d0020c75160ca29c99fb08f12cfba6be639a360829e233ce4342d92e98df4e82cc0bceb3acba2381c8ad06de630bf00"/209, &(0x7f0000000840)="d632b20dc67199594b5535bb7ec4260e3f4dd38d9f8861e83b83cf8e497e38858badf35071f4d9f360aa1a0a9e17a0c05c0cb8371a04e09656e756044f2e07d9d5855ff65cf863d465d93d2c71f38eadfceff05d88a58324401ffc73b0cfcc3804454bf9af443884d50e08693f1b523ca466d07856a44977463c4c9021eee96422a41fd22587894f188c61ab6dc909a91502b50b5832d896e8fa849b3329659443d9b4c456458bf2afe988a35e91f57027268b69d8aba3963c496bb3c714031788bb20fae634f82a409e47c3baa8ba", 0x0, 0x0, 0xfffffffd}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x412402, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r11) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r6, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0xf, &(0x7f0000001b80)=ANY=[@ANYBLOB="1800009125f1e13900020000000000e36e8ec42490c5daedcf00000200000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x5, 0x0, 0x0, 0x21600, 0xc, '\x00', r12, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x9, &(0x7f00000004c0)=[0xffffffffffffffff, r6, r6, r1], &(0x7f0000000580)=[{0x5, 0x1, 0xc, 0x2}, {0x1, 0x4, 0x7}, {0x2, 0x2, 0x10, 0x1}, {0x4, 0x1, 0x7, 0x7}, {0x4, 0x1, 0xe, 0xa}, {0x3, 0x3, 0xe, 0x2}, {0x1, 0x5, 0x2, 0x3}, {0x3, 0x3, 0xc, 0x2}, {0x5, 0x1, 0x4, 0x2}], 0x10, 0x70000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7180000570000007b8af8ff00000000bfa200010000000007020000f8ffffffb703000008000000b704000000000000850000000300000095008f96c0868a6069200000ff01000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000040)='ext4_unlink_enter\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000040)='mm_lru_insertion\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a07, 0x1700) close(0xffffffffffffffff) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x0, 0xb4, 0x7f}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000001280), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xe) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095b1f3a3ffaa8c9eb16be81f7731d338"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='ext4_allocate_inode\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000060d30000a670d33ce557f7d9181100004cf832d1e7de59e502ef14ad23fb717ea3543db63a3d48e4f13cc2afdfe52293308cd1b2c2716a6e67363bc17ca055b6dacbd7b725b5135bdb2b21021d7ead3606763cfa0a967923455b847eac9d7af47e4951df645a2f564b067855ed89153853b53fa7c1f80db8eb94cf86ab2895b08182ace6bfbb745730230b48d66f6a3136b8dc11d40aba03caf78567fd8087f8f2a0a7d38808677feba75178299479943a4ac20884660fd9815d79868196cc089b9b56ab0a124d202e98ff", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x300000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x28, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x401}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x13}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x1, 0x4, 0x2, 0x9, 0xffffffffffffffff, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ldst={0x2, 0x3, 0x4, 0x5, 0x6, 0x1, 0x10}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x8001, 0xf9, &(0x7f00000005c0)=""/249, 0x41100, 0x58, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1fc28, r0, 0x5, &(0x7f0000000180)=[0x1, r0, r0], &(0x7f00000004c0)=[{0x4, 0x2, 0x8, 0x1}, {0x3, 0x3, 0xa, 0x6}, {0x1, 0x4, 0xc, 0x3}, {0x5, 0x4, 0x7, 0xb}, {0x1, 0x4, 0x1, 0xb}], 0x10, 0x81}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r2}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000140), 0x9) executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x36}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x65, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xed, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000ad7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r3}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x45a00) executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008003c00b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x4, 0x7fe4, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r1, 0x5, 0x28}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x3, 0x8, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffead, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0x1e, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, {}, {}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x48}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8007}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1000}, @map_idx={0x18, 0xd, 0x5, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x80000001, 0x0, 0x0, 0x40f00, 0x40, '\x00', r7, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x1, 0x4, 0x4, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000001a40)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x5, 0x1, 0xf, 0x9}, {0x0, 0x5, 0x6, 0x5}, {0x5, 0x5, 0x6, 0x5}, {0x3, 0x3, 0x1, 0x9}, {0x4, 0x4, 0xd, 0xa}, {0x3, 0x0, 0x7, 0x9}, {0x0, 0x5}], 0x10, 0xffffffff}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xe, r9, 0x1) openat$cgroup_ro(r9, &(0x7f0000000a40)='cpu.stat\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, r9, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x1b, 0x12, &(0x7f0000001c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@map_idx, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x4}, @tail_call, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4}]}, &(0x7f0000001cc0)='syzkaller\x00', 0x3, 0x54, &(0x7f0000001d00)=""/84, 0x41000, 0x6, '\x00', r7, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8, 0x1, &(0x7f0000001d80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r9, 0xffffffffffffffff], &(0x7f0000001dc0)=[{0x0, 0x1}], 0x10, 0x2}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000080)={&(0x7f0000000280)=""/177, 0xb1, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x2a, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xec, 0x0, 0x0, 0x0, 0xffffff96}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@call={0x85, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x4e}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffb}, @map_fd={0x18, 0x4, 0x1, 0x0, r3}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x1}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x8}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='GPL\x00', 0x83fb, 0x98, &(0x7f0000000640)=""/152, 0x40f00, 0x62, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0x5, 0x2, 0x937}, 0x10, r10, r5, 0x6, &(0x7f0000000580)=[r3], &(0x7f0000000700)=[{0x1, 0x1, 0x0, 0x3}, {0x1, 0x5, 0x0, 0x2}, {0x0, 0x4, 0x6, 0x7}, {0x3, 0x3, 0x9, 0x8}, {0x2, 0x3, 0xb, 0x2}, {0x2, 0x2, 0x0, 0x1}], 0x10, 0x800}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x3, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r11}, 0x38) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r12}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, &(0x7f00000001c0)=""/50, &(0x7f0000000380), &(0x7f0000000400), 0x2, r11}, 0x38) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r13, &(0x7f0000000200), 0x43451) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000240), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYRES16=0x0], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x957, 0x2, 0x7ff, 0x0, r2, 0x8001, '\x00', r4, r1, 0x3, 0x4, 0x0, 0x3}, 0x48) [ 92.172986][ T5707] syz-executor.0[5707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0xf}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000e2bac15d3b6641a215f099e26603a050337b2ccc70a9f928ba3c529bb6e7365e7e246317380f5884d79663e7fcaa89795d7b10e88378c33265a7af06040e3d0bbc6a5864dfa023c6ac1da574242785bbb4ece12b11da52496875e1e384042aad63a3094bf3bc0e40a79960f9f1610940e67e30611d9873d1e6cb9c4cce44c999c49ff52a6400192fd021d7158438d7686a6f66778022c93c544189b684754e7e0f77a4f498609e53104c8aa70632fcc58c757bbc06f6472622dce2729d7296959ce003ec84acd015e352484c42fc29e5aea62fb7977813f7254fd6f62fec638abf292e6c33925b29"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='track_foreign_dirty\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000c900f2ff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f2, &(0x7f0000000080)) executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000540), &(0x7f00000005c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x69}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x80000008, 0xc, 0xffffffff, 0x101, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x0, 0x4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x0, 0x1, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000000000000000eb1d95"], &(0x7f0000000040)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x2000008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9e}]}, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) close(0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda03, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x3, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2b, 'cpuacct'}, {0x2d, 'hugetlb'}, {0x6, 'blkio'}, {0x2b, 'hugetlb'}, {0x2b, 'cpuacct'}, {0x2b, 'cpu'}, {0xa487547c2813f213, 'perf_event'}]}, 0x3c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='sys_enter\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) syz_clone(0x64000000, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x15, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f00000001c0)={&(0x7f00000003c0)=@id, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000180)="57e6e32083a328c2da3964066135e463f922081ae50887ede09da114c1daa077f9611f8aa81d", 0x26}, {&(0x7f0000000280)="b57af26468ffde59db204ffaa467c0af523b9e6d93dd62dad3d2f90b45e80eb530982e2a1a0b9ebc2c7113d4f93982f87d0ced6312bdcaa996c13c02d027870ae0bdbed8b104a10605ae3939cfa8e7d4ae5e2f97b5958bed4a4430c01d04f980fac5e88de756ec949e14a35bfb3f32197c05b451", 0x74}, {&(0x7f0000000300)="3d408cd47846fd99d1d1a4df38e0afdd03a817bf3b4673e575b2c253bae12d98c4f3e4e6d317ba457f2d0de6e1fbc5a43bae0d257cda31fb579139135de49db225bf75a3dea059b4a7a9808dd72eb1bd84d0cf9959907ad6b1e1ec718aa8d5004fd0acd19045d8d6e0f04b6b4497bb3126e4ad0d033ef175a58f55d0993d32bb3a10246c0e9ed8956592d6b51d", 0x8d}, {&(0x7f0000000540)="a840c8a67da22f1b2c4e068bb1ad9c499f093b4480b55eb7b9408f5400cc74932ab986ca937640a84378eb6446626516e84b0055936bb61fac109e2624e86903d729b0b10b4f16db7da1fa3aaa808fe333de0c9316c2412cb9ed2d604f8b3fa52416302221487c294ae9dc54783573eb5e7c1027fc39fa60c39afee14fb7cf3e6ef0041470dfd6a4a356a1d7e20a437bcadc7f0b5afa9f9d68bccd88", 0x9c}, {&(0x7f0000000600)="c016c55101fc98bba00b0c2946a2b285871ce0494875c9d8979d34a99a409dcb328a6ff1e31414ec38af8d9348d49550faf55f18c1d9f281054ffbe9a13132e9a05e0542a376762a4d799b6b4f0311f62189f67e7708285a203492767e25e6bc4d28d6d3f8d9f50c2660483f8f942ecb733e84f8619101c2ec2ec357bec450d092e6068a319a9f761d766e6ac151f3f3cb790dda0a6dbc381be1a87e4d992bc55e39f166e65d1a5997bc4d255f00c45f6264f7b459ce6fc78a91f8935fa3aa5fe8be532e06387d82f07e", 0xfec7}, {&(0x7f0000000700)="f32ced1978f6103c6709573259e317066e84d42f18d090e52035bcf2ddcf8761f30c8179d42f2d06e49766e18561147a88e7ab4a817816b9da02e1744bc7eb653eb04ab70b5bf5111e01923c9bd0f4b72df99f19253083a444b5fbf214a2e9fbbc352a08731643692912aebd09546ccb28837254a30d1e53084dd7f6b7114fa3825fcbae9443ec15fb31bca97a87824d4bc8b632cf971bfb523a", 0x9a}], 0x6, &(0x7f0000000840)="a6d462c399e20d9d7ab19933a9b3d0e1d617be45eb50440e1e51f20cd773cd1b34e2669a511f6292d81a777376560dc1daae580d2419af271bdd485f32ddaa3679178bcbe6ff6f5d5d758535afbe2a930342eaa16108a32d9d31fbfe8bf4d89784440c3ff3fef2f998aebc9634", 0x6d}, 0x80) syz_clone(0x880000, &(0x7f0000000140)="47fb03b11569824e969eaa823516aa919a9b7921d1b352a3f1e08e3df31fbc76dd39ec721311660b16a0feaa3a143a67a4cc779a632b", 0x36, &(0x7f0000000980), &(0x7f0000000bc0), &(0x7f0000000c00)="a775eda9da9a095d0a4130158c3783c78159612f2de7c0db3b71a71251fbc7831f012883d1ec8bc1ff7508c49812c90548b983fd0683d81b656aea59414feaeaafc69b49e6a5e6d9f97262b019a726f083e9b0624da5d65f2cf79bffd8a70aa41560d0f67e19d89241ae78b05d464f153d9c92ab3426563c45b07929c609827caa0762173d1023c47e2516afa1b5a4ec05bc4c1857cad2d97db432498f3186494bd3862906c7a1789bd2c0ef82ae9f7d626fd25691be23e176fb20b2fda12a788a61b0b8b6b5ca6a4ee240fa5a7c9b125f5f98dd2daa") close(r3) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0xfffffffffffffe25}, 0x0) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000008c0)=""/134, 0x86}], 0x1, &(0x7f0000000a40)=""/246, 0xf6}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r0) executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086607, &(0x7f0000000040)) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x62, &(0x7f0000000200)=""/98, 0x52ec6c01bf592d32, 0x44, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r5, r8, 0x1, r8], 0x0, 0x10, 0x3ebfd31f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x661e, 0x7, 0xf775, 0x20, 0x1, 0x6d, '\x00', r6, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xb}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r10}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000080000000bf91000000000000b70200000100000085000010850000df000095000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='percpu_free_percpu\x00', r13}, 0x10) r14 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0xa, 0xc000, 0x37b0, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r15 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x28, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5a}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x7}, @generic={0x5, 0x5, 0xf, 0xd55, 0x5}, @jmp={0x5, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xd, 0x8, 0x2, 0xfffffffffffffff8, 0x1b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xc32f0ee55495058a}}}, &(0x7f0000000040)='GPL\x00', 0x19d, 0x6a, &(0x7f00000009c0)=""/106, 0x41000, 0x8, '\x00', r6, 0x22, r15, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x1, 0x3, 0xfffffff7}, 0x10, r7, r13, 0x5, 0x0, &(0x7f0000000b00)=[{0x3, 0x8002, 0xd, 0x3}, {0x4, 0x5, 0x8, 0x4}, {0x5, 0x4, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x1}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x20000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff}, @call={0x85, 0x0, 0x0, 0x77}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x1, 0x7, 0x8, 0x0, 0xbc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xaa, &(0x7f0000000540)=""/170, 0x41100, 0x65, '\x00', r3, 0x3, r4, 0x8, &(0x7f00000004c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0xb, 0x0, 0x9}, 0x10, r7, r2, 0x0, &(0x7f0000000640)=[r1, r1, 0x1, r1], 0x0, 0x10, 0x40}, 0x90) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r16, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0xc9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffbe}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair(0x17, 0x0, 0x0, &(0x7f0000001700)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d637075736554202d6370757365742063c9d04d1695586bf2e0a61aa68db2c893463f4efa2ab09d7ec861cfca5c5294bd8ce0f195022897c0c12a617e01d0d4a37a538a9d9fcaa704c77100b655c97934a849dc47ce359031d8d97812e7e941adcaff64c8bafdd843eb46dcff6b7dcfd760833b9fca25c36b5bcabbfc4711449a0bd219c77144"], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_remove_blocks\x00', r0}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r3, 0x58, &(0x7f0000000300)}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x8, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x723, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001640)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='ext4_allocate_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_queued_recursive\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 92.173057][ T5707] syz-executor.0[5707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.475304][ T5735] device syzkaller0 entered promiscuous mode executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086607, &(0x7f0000000040)) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x62, &(0x7f0000000200)=""/98, 0x52ec6c01bf592d32, 0x44, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r5, r8, 0x1, r8], 0x0, 0x10, 0x3ebfd31f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x661e, 0x7, 0xf775, 0x20, 0x1, 0x6d, '\x00', r6, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0xb}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r10}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000080000000bf91000000000000b70200000100000085000010850000df000095000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='percpu_free_percpu\x00', r13}, 0x10) r14 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0xa, 0xc000, 0x37b0, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r15 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x28, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5a}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@cb_func={0x18, 0x7, 0x4, 0x0, 0x4}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x7}, @generic={0x5, 0x5, 0xf, 0xd55, 0x5}, @jmp={0x5, 0x1, 0xd, 0x9, 0x2, 0xfffffffffffffffc, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xd, 0x8, 0x2, 0xfffffffffffffff8, 0x1b}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r14}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xc32f0ee55495058a}}}, &(0x7f0000000040)='GPL\x00', 0x19d, 0x6a, &(0x7f00000009c0)=""/106, 0x41000, 0x8, '\x00', r6, 0x22, r15, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x1, 0x3, 0xfffffff7}, 0x10, r7, r13, 0x5, 0x0, &(0x7f0000000b00)=[{0x3, 0x8002, 0xd, 0x3}, {0x4, 0x5, 0x8, 0x4}, {0x5, 0x4, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x1}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x20000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff}, @call={0x85, 0x0, 0x0, 0x77}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x1, 0x7, 0x8, 0x0, 0xbc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xaa, &(0x7f0000000540)=""/170, 0x41100, 0x65, '\x00', r3, 0x3, r4, 0x8, &(0x7f00000004c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0xb, 0x0, 0x9}, 0x10, r7, r2, 0x0, &(0x7f0000000640)=[r1, r1, 0x1, r1], 0x0, 0x10, 0x40}, 0x90) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r16, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xe, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@typedef={0xf, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x8}}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0xb}, {0x8, 0x4}, {0x9, 0x1ff}, {0x0, 0x4}, {0xb}]}]}, {0x0, [0x30]}}, &(0x7f0000000480)=""/174, 0x87, 0xae, 0x1, 0xf2eb}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x1f, 0x1, 0x100, r0, 0x4, '\x00', r1, r2, 0x3, 0x3, 0x5, 0x1}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={'pim6reg1\x00', 0x1}) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000680)='devices.deny\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000006c0), 0x9) socketpair(0x6, 0x1, 0x5, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r9 = openat$cgroup_int(r4, &(0x7f0000000780)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) r10 = openat$cgroup_ro(r0, &(0x7f0000000b80)='memory.swap.current\x00', 0x0, 0x0) r11 = syz_clone(0x4001000, &(0x7f0000000bc0)="bbe5a4d5b73b953ca122c1dc1d77a6dd14df29afacd43cafc126d718fc4b7ac94a7ff0dd68899f24286c7e1b616fce0a4db764ba10961703390f94e15069c6f5868a881c9e44aeb37b8f8f84d6bbb7d6861bebdada8e0f6798d31983a65942efc9e0b3ac68550f45ac5570831928a3b695bc2488a255dc3b8d9a5a750001b8c2f2d4232e34c36ec62bb2ee1daddbbf8cc2940e0b428da8033bbdff475cefe735fcb5f1524995ab2bd0680f69091c2120da8c25ef395d07224179bde06705db69f7526066f6f3", 0xc6, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="3f6eb48044728613ea8590455abf6354e888e1994ef6929aaabe6a65b0dd6a7d8532de888f555b516dbc2393f5281346f0a376ce7ca294bd023e2f120ac2ed4131b0d12b615a8c4b82ad5c43892d4e387b57e133f82db0d0b00ca89441023903117a6ce5ba3b4d6313c5b37eeb74caae0eb17ce420739e8a1c7de2dbcaf915960e4fc457a33de49184b6b0d48e6c7ffd17578eb138e02f0dd5350e30134aae15ab1513d1038de941d3fd2033397ad2c01684a7c08264caf7bcfdf72f50a11b6935766a043749") sendmsg$unix(r6, &(0x7f0000000ec0)={&(0x7f00000007c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000840)="5cdbf6a3c819713e88a5cbdc4c1649251efe87b0f1c5d47b7e89277d5c5ef264cf57405a717ec354487c8f4e1514f7386168c1c69db73f10261eb9ed073c4b4fc3c0c848e92254cb15684a8e06962f1c10bc505b6d0ed330dbf53d167e0fc32cca97e17cf32c4b364f7cb7e554d45a332592302eda206a91167fbfe187423ed3c927fd26e409d31378b156488cd7d9411915a692f0236e65d35d001e55f2d4a08a2b00b98e023e", 0xa7}, {&(0x7f0000000900)="9bbd93fae1ba810ca828091113abbaad430f1fcfbfab635e52d48a4e0474819af981c004adfae20d170fecd7d5239efe6d6cf28b824ce99e7fd3d39b58182ed259ebbb526e69a7c3eea928c58541647741a2a76883f8d1de6fce0b496a6d8f9bca72885f1ce8bece58e1f7b1bab82a9efdd288cf986e5f66ae8d0fe9257aeaef1eee0e267ce9adb223afc53fd472080809e3", 0x92}, {&(0x7f00000009c0)="b85beab3f180b2213bbe8047dcc76ef7fb5c27f4f10149c7791077a2dc0a0f885e2dcdcd17ec57919f4562645a21a26fd75875fbd7990bbee397c7aa202af7dad38716b649c5aa177ad1516534b0a675b23ca9d8dc719227741dd96ff45c3cb2bbf2779eb37512a23eb6be711c0f392ad2f7c86b925564c761b8450ea23f02e8497a338d0e0b400eea880f6505122fbc122f2a7610e97f7f0a16b5c3c1ec7acb8e2f254b71ce3b4f64dbfe21b3097455feaef24539702005447c3fb780e78ffee33440808d117cb1d0d75150fe4ba25406683b0bc8ffc58df9e8cfa9c2488ba87a048f57d6de58f091166a", 0xeb}, {&(0x7f0000000ac0)="39324d5a06bb740e80a5472abb9ef0815f38efbebf2c49c06bf0f84276813a339dea4618d34a93d0200abfab8e7959a5091654d652cbbc0b7387501fdb53eff35335a75db47ebfddc1d310286de0c0b813073e2e", 0x54}], 0x4, &(0x7f0000000e40)=[@rights={{0x18, 0x1, 0x1, [r5, r2]}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r9, r2, r5, r10, r9, r3, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee01, 0xee01}}}], 0x70, 0x800}, 0x5) recvmsg$unix(r6, &(0x7f00000022c0)={&(0x7f0000000f00), 0x6e, &(0x7f00000021c0)=[{&(0x7f0000000f80)=""/236, 0xec}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/241, 0xf1}, {&(0x7f0000002180)}], 0x4, &(0x7f0000002200)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r20, 0x2401, 0x3) ioctl$TUNSETCARRIER(r12, 0x400454e2, &(0x7f0000002300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002380)={&(0x7f0000002340)='target_cmd_complete\x00', r14}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002400)={&(0x7f00000023c0)='rxrpc_recvmsg\x00', r18}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r21 = perf_event_open(&(0x7f0000002540)={0x2, 0x80, 0x6f, 0x0, 0x1, 0xb0, 0x0, 0x5, 0x41192, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2dbe61ebf36804af, @perf_config_ext={0x8000}, 0x40, 0x101, 0x8, 0x7, 0x0, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x3f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f00000024c0)={0x5f0eb1f9385780b2, 0x80, 0x1, 0xe5, 0x3, 0x4, 0x0, 0x8e4, 0x180, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000002480), 0xf}, 0x84, 0x80000001, 0x3f1cddc, 0x3, 0x9, 0xfff, 0x401, 0x0, 0x7fff, 0x0, 0xffffffff}, r10, 0x10, r21, 0x1) ioctl$TUNATTACHFILTER(r17, 0x401054d5, &(0x7f0000002600)={0x2, &(0x7f00000025c0)=[{0x40, 0x1f, 0x7}, {0x401, 0x1f, 0x7, 0x1}]}) mkdirat$cgroup(r19, &(0x7f0000002640)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002700)={{r0, 0xffffffffffffffff}, &(0x7f0000002680), &(0x7f00000026c0)=r15}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x14, 0x6, &(0x7f0000002740)=@raw=[@jmp={0x5, 0x1, 0x3, 0xc, 0xb, 0x80, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r22}}, @generic={0x3, 0x2, 0x0, 0x3, 0xe4}], &(0x7f0000002780)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x45, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000027c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002800)={0x5, 0x7, 0xb8}, 0x10, 0x0, r16, 0x5, 0x0, &(0x7f0000002840)=[{0x1, 0x4, 0x6, 0x1}, {0x0, 0x5, 0x3, 0x5}, {0x5, 0x1, 0x0, 0x5}, {0x2, 0x5, 0xf, 0xc}, {0x1, 0x3, 0xc, 0x2}], 0x10, 0x401}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000029c0)={r13, &(0x7f0000002980)="9c8bf6a1dc8c068a6c13c902f24b1ec032"}, 0x20) r23 = perf_event_open$cgroup(&(0x7f0000002a40)={0x4, 0x80, 0x30, 0x80, 0x67, 0x1, 0x0, 0x9, 0x40, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000002a00), 0x8}, 0x404, 0xfffffffffffffd62, 0x5, 0x4, 0x79ef, 0xb2, 0x400, 0x0, 0x3c5d, 0x0, 0x4}, r10, 0x5, r17, 0x9) ioctl$PERF_EVENT_IOC_ID(r23, 0x80082407, &(0x7f0000002ac0)) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0xc9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffbe}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair(0x17, 0x0, 0x0, &(0x7f0000001700)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d637075736554202d6370757365742063c9d04d1695586bf2e0a61aa68db2c893463f4efa2ab09d7ec861cfca5c5294bd8ce0f195022897c0c12a617e01d0d4a37a538a9d9fcaa704c77100b655c97934a849dc47ce359031d8d97812e7e941adcaff64c8bafdd843eb46dcff6b7dcfd760833b9fca25c36b5bcabbfc4711449a0bd219c77144"], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_remove_blocks\x00', r0}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r3, 0x58, &(0x7f0000000300)}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x8, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x723, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001640)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='ext4_allocate_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_queued_recursive\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xe, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@typedef={0xf, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x8}}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0xb}, {0x8, 0x4}, {0x9, 0x1ff}, {0x0, 0x4}, {0xb}]}]}, {0x0, [0x30]}}, &(0x7f0000000480)=""/174, 0x87, 0xae, 0x1, 0xf2eb}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x1f, 0x1, 0x100, r0, 0x4, '\x00', r1, r2, 0x3, 0x3, 0x5, 0x1}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={'pim6reg1\x00', 0x1}) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000680)='devices.deny\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000006c0), 0x9) socketpair(0x6, 0x1, 0x5, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r9 = openat$cgroup_int(r4, &(0x7f0000000780)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) r10 = openat$cgroup_ro(r0, &(0x7f0000000b80)='memory.swap.current\x00', 0x0, 0x0) r11 = syz_clone(0x4001000, &(0x7f0000000bc0)="bbe5a4d5b73b953ca122c1dc1d77a6dd14df29afacd43cafc126d718fc4b7ac94a7ff0dd68899f24286c7e1b616fce0a4db764ba10961703390f94e15069c6f5868a881c9e44aeb37b8f8f84d6bbb7d6861bebdada8e0f6798d31983a65942efc9e0b3ac68550f45ac5570831928a3b695bc2488a255dc3b8d9a5a750001b8c2f2d4232e34c36ec62bb2ee1daddbbf8cc2940e0b428da8033bbdff475cefe735fcb5f1524995ab2bd0680f69091c2120da8c25ef395d07224179bde06705db69f7526066f6f3", 0xc6, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="3f6eb48044728613ea8590455abf6354e888e1994ef6929aaabe6a65b0dd6a7d8532de888f555b516dbc2393f5281346f0a376ce7ca294bd023e2f120ac2ed4131b0d12b615a8c4b82ad5c43892d4e387b57e133f82db0d0b00ca89441023903117a6ce5ba3b4d6313c5b37eeb74caae0eb17ce420739e8a1c7de2dbcaf915960e4fc457a33de49184b6b0d48e6c7ffd17578eb138e02f0dd5350e30134aae15ab1513d1038de941d3fd2033397ad2c01684a7c08264caf7bcfdf72f50a11b6935766a043749") sendmsg$unix(r6, &(0x7f0000000ec0)={&(0x7f00000007c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000840)="5cdbf6a3c819713e88a5cbdc4c1649251efe87b0f1c5d47b7e89277d5c5ef264cf57405a717ec354487c8f4e1514f7386168c1c69db73f10261eb9ed073c4b4fc3c0c848e92254cb15684a8e06962f1c10bc505b6d0ed330dbf53d167e0fc32cca97e17cf32c4b364f7cb7e554d45a332592302eda206a91167fbfe187423ed3c927fd26e409d31378b156488cd7d9411915a692f0236e65d35d001e55f2d4a08a2b00b98e023e", 0xa7}, {&(0x7f0000000900)="9bbd93fae1ba810ca828091113abbaad430f1fcfbfab635e52d48a4e0474819af981c004adfae20d170fecd7d5239efe6d6cf28b824ce99e7fd3d39b58182ed259ebbb526e69a7c3eea928c58541647741a2a76883f8d1de6fce0b496a6d8f9bca72885f1ce8bece58e1f7b1bab82a9efdd288cf986e5f66ae8d0fe9257aeaef1eee0e267ce9adb223afc53fd472080809e3", 0x92}, {&(0x7f00000009c0)="b85beab3f180b2213bbe8047dcc76ef7fb5c27f4f10149c7791077a2dc0a0f885e2dcdcd17ec57919f4562645a21a26fd75875fbd7990bbee397c7aa202af7dad38716b649c5aa177ad1516534b0a675b23ca9d8dc719227741dd96ff45c3cb2bbf2779eb37512a23eb6be711c0f392ad2f7c86b925564c761b8450ea23f02e8497a338d0e0b400eea880f6505122fbc122f2a7610e97f7f0a16b5c3c1ec7acb8e2f254b71ce3b4f64dbfe21b3097455feaef24539702005447c3fb780e78ffee33440808d117cb1d0d75150fe4ba25406683b0bc8ffc58df9e8cfa9c2488ba87a048f57d6de58f091166a", 0xeb}, {&(0x7f0000000ac0)="39324d5a06bb740e80a5472abb9ef0815f38efbebf2c49c06bf0f84276813a339dea4618d34a93d0200abfab8e7959a5091654d652cbbc0b7387501fdb53eff35335a75db47ebfddc1d310286de0c0b813073e2e", 0x54}], 0x4, &(0x7f0000000e40)=[@rights={{0x18, 0x1, 0x1, [r5, r2]}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r9, r2, r5, r10, r9, r3, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee01, 0xee01}}}], 0x70, 0x800}, 0x5) recvmsg$unix(r6, &(0x7f00000022c0)={&(0x7f0000000f00), 0x6e, &(0x7f00000021c0)=[{&(0x7f0000000f80)=""/236, 0xec}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/241, 0xf1}, {&(0x7f0000002180)}], 0x4, &(0x7f0000002200)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r20, 0x2401, 0x3) ioctl$TUNSETCARRIER(r12, 0x400454e2, &(0x7f0000002300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002380)={&(0x7f0000002340)='target_cmd_complete\x00', r14}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002400)={&(0x7f00000023c0)='rxrpc_recvmsg\x00', r18}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r21 = perf_event_open(&(0x7f0000002540)={0x2, 0x80, 0x6f, 0x0, 0x1, 0xb0, 0x0, 0x5, 0x41192, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2dbe61ebf36804af, @perf_config_ext={0x8000}, 0x40, 0x101, 0x8, 0x7, 0x0, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x3f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f00000024c0)={0x5f0eb1f9385780b2, 0x80, 0x1, 0xe5, 0x3, 0x4, 0x0, 0x8e4, 0x180, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000002480), 0xf}, 0x84, 0x80000001, 0x3f1cddc, 0x3, 0x9, 0xfff, 0x401, 0x0, 0x7fff, 0x0, 0xffffffff}, r10, 0x10, r21, 0x1) ioctl$TUNATTACHFILTER(r17, 0x401054d5, &(0x7f0000002600)={0x2, &(0x7f00000025c0)=[{0x40, 0x1f, 0x7}, {0x401, 0x1f, 0x7, 0x1}]}) mkdirat$cgroup(r19, &(0x7f0000002640)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002700)={{r0, 0xffffffffffffffff}, &(0x7f0000002680), &(0x7f00000026c0)=r15}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x14, 0x6, &(0x7f0000002740)=@raw=[@jmp={0x5, 0x1, 0x3, 0xc, 0xb, 0x80, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r22}}, @generic={0x3, 0x2, 0x0, 0x3, 0xe4}], &(0x7f0000002780)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x45, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000027c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002800)={0x5, 0x7, 0xb8}, 0x10, 0x0, r16, 0x5, 0x0, &(0x7f0000002840)=[{0x1, 0x4, 0x6, 0x1}, {0x0, 0x5, 0x3, 0x5}, {0x5, 0x1, 0x0, 0x5}, {0x2, 0x5, 0xf, 0xc}, {0x1, 0x3, 0xc, 0x2}], 0x10, 0x401}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000029c0)={r13, &(0x7f0000002980)="9c8bf6a1dc8c068a6c13c902f24b1ec032"}, 0x20) r23 = perf_event_open$cgroup(&(0x7f0000002a40)={0x4, 0x80, 0x30, 0x80, 0x67, 0x1, 0x0, 0x9, 0x40, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000002a00), 0x8}, 0x404, 0xfffffffffffffd62, 0x5, 0x4, 0x79ef, 0xb2, 0x400, 0x0, 0x3c5d, 0x0, 0x4}, r10, 0x5, r17, 0x9) ioctl$PERF_EVENT_IOC_ID(r23, 0x80082407, &(0x7f0000002ac0)) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3c000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0xc9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffbe}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair(0x17, 0x0, 0x0, &(0x7f0000001700)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d637075736554202d6370757365742063c9d04d1695586bf2e0a61aa68db2c893463f4efa2ab09d7ec861cfca5c5294bd8ce0f195022897c0c12a617e01d0d4a37a538a9d9fcaa704c77100b655c97934a849dc47ce359031d8d97812e7e941adcaff64c8bafdd843eb46dcff6b7dcfd760833b9fca25c36b5bcabbfc4711449a0bd219c77144"], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_remove_blocks\x00', r0}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r3, 0x58, &(0x7f0000000300)}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x8, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x723, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001640)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='ext4_allocate_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_queued_recursive\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008004000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xe, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@typedef={0xf, 0x0, 0x0, 0x8, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x8}}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x1}, {0xb}, {0x8, 0x4}, {0x9, 0x1ff}, {0x0, 0x4}, {0xb}]}]}, {0x0, [0x30]}}, &(0x7f0000000480)=""/174, 0x87, 0xae, 0x1, 0xf2eb}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x0, 0x1f, 0x1, 0x100, r0, 0x4, '\x00', r1, r2, 0x3, 0x3, 0x5, 0x1}, 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={'pim6reg1\x00', 0x1}) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000640)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000680)='devices.deny\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000006c0), 0x9) socketpair(0x6, 0x1, 0x5, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r9 = openat$cgroup_int(r4, &(0x7f0000000780)='hugetlb.1GB.rsvd.limit_in_bytes\x00', 0x2, 0x0) r10 = openat$cgroup_ro(r0, &(0x7f0000000b80)='memory.swap.current\x00', 0x0, 0x0) r11 = syz_clone(0x4001000, &(0x7f0000000bc0)="bbe5a4d5b73b953ca122c1dc1d77a6dd14df29afacd43cafc126d718fc4b7ac94a7ff0dd68899f24286c7e1b616fce0a4db764ba10961703390f94e15069c6f5868a881c9e44aeb37b8f8f84d6bbb7d6861bebdada8e0f6798d31983a65942efc9e0b3ac68550f45ac5570831928a3b695bc2488a255dc3b8d9a5a750001b8c2f2d4232e34c36ec62bb2ee1daddbbf8cc2940e0b428da8033bbdff475cefe735fcb5f1524995ab2bd0680f69091c2120da8c25ef395d07224179bde06705db69f7526066f6f3", 0xc6, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="3f6eb48044728613ea8590455abf6354e888e1994ef6929aaabe6a65b0dd6a7d8532de888f555b516dbc2393f5281346f0a376ce7ca294bd023e2f120ac2ed4131b0d12b615a8c4b82ad5c43892d4e387b57e133f82db0d0b00ca89441023903117a6ce5ba3b4d6313c5b37eeb74caae0eb17ce420739e8a1c7de2dbcaf915960e4fc457a33de49184b6b0d48e6c7ffd17578eb138e02f0dd5350e30134aae15ab1513d1038de941d3fd2033397ad2c01684a7c08264caf7bcfdf72f50a11b6935766a043749") sendmsg$unix(r6, &(0x7f0000000ec0)={&(0x7f00000007c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000840)="5cdbf6a3c819713e88a5cbdc4c1649251efe87b0f1c5d47b7e89277d5c5ef264cf57405a717ec354487c8f4e1514f7386168c1c69db73f10261eb9ed073c4b4fc3c0c848e92254cb15684a8e06962f1c10bc505b6d0ed330dbf53d167e0fc32cca97e17cf32c4b364f7cb7e554d45a332592302eda206a91167fbfe187423ed3c927fd26e409d31378b156488cd7d9411915a692f0236e65d35d001e55f2d4a08a2b00b98e023e", 0xa7}, {&(0x7f0000000900)="9bbd93fae1ba810ca828091113abbaad430f1fcfbfab635e52d48a4e0474819af981c004adfae20d170fecd7d5239efe6d6cf28b824ce99e7fd3d39b58182ed259ebbb526e69a7c3eea928c58541647741a2a76883f8d1de6fce0b496a6d8f9bca72885f1ce8bece58e1f7b1bab82a9efdd288cf986e5f66ae8d0fe9257aeaef1eee0e267ce9adb223afc53fd472080809e3", 0x92}, {&(0x7f00000009c0)="b85beab3f180b2213bbe8047dcc76ef7fb5c27f4f10149c7791077a2dc0a0f885e2dcdcd17ec57919f4562645a21a26fd75875fbd7990bbee397c7aa202af7dad38716b649c5aa177ad1516534b0a675b23ca9d8dc719227741dd96ff45c3cb2bbf2779eb37512a23eb6be711c0f392ad2f7c86b925564c761b8450ea23f02e8497a338d0e0b400eea880f6505122fbc122f2a7610e97f7f0a16b5c3c1ec7acb8e2f254b71ce3b4f64dbfe21b3097455feaef24539702005447c3fb780e78ffee33440808d117cb1d0d75150fe4ba25406683b0bc8ffc58df9e8cfa9c2488ba87a048f57d6de58f091166a", 0xeb}, {&(0x7f0000000ac0)="39324d5a06bb740e80a5472abb9ef0815f38efbebf2c49c06bf0f84276813a339dea4618d34a93d0200abfab8e7959a5091654d652cbbc0b7387501fdb53eff35335a75db47ebfddc1d310286de0c0b813073e2e", 0x54}], 0x4, &(0x7f0000000e40)=[@rights={{0x18, 0x1, 0x1, [r5, r2]}}, @rights={{0x34, 0x1, 0x1, [r8, r3, r9, r2, r5, r10, r9, r3, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee01, 0xee01}}}], 0x70, 0x800}, 0x5) recvmsg$unix(r6, &(0x7f00000022c0)={&(0x7f0000000f00), 0x6e, &(0x7f00000021c0)=[{&(0x7f0000000f80)=""/236, 0xec}, {&(0x7f0000001080)=""/4096, 0x1000}, {&(0x7f0000002080)=""/241, 0xf1}, {&(0x7f0000002180)}], 0x4, &(0x7f0000002200)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r20, 0x2401, 0x3) ioctl$TUNSETCARRIER(r12, 0x400454e2, &(0x7f0000002300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002380)={&(0x7f0000002340)='target_cmd_complete\x00', r14}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002400)={&(0x7f00000023c0)='rxrpc_recvmsg\x00', r18}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002440)='./cgroup.net/syz1\x00', 0x200002, 0x0) r21 = perf_event_open(&(0x7f0000002540)={0x2, 0x80, 0x6f, 0x0, 0x1, 0xb0, 0x0, 0x5, 0x41192, 0x6, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2dbe61ebf36804af, @perf_config_ext={0x8000}, 0x40, 0x101, 0x8, 0x7, 0x0, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x3f}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f00000024c0)={0x5f0eb1f9385780b2, 0x80, 0x1, 0xe5, 0x3, 0x4, 0x0, 0x8e4, 0x180, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000002480), 0xf}, 0x84, 0x80000001, 0x3f1cddc, 0x3, 0x9, 0xfff, 0x401, 0x0, 0x7fff, 0x0, 0xffffffff}, r10, 0x10, r21, 0x1) ioctl$TUNATTACHFILTER(r17, 0x401054d5, &(0x7f0000002600)={0x2, &(0x7f00000025c0)=[{0x40, 0x1f, 0x7}, {0x401, 0x1f, 0x7, 0x1}]}) mkdirat$cgroup(r19, &(0x7f0000002640)='syz1\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002700)={{r0, 0xffffffffffffffff}, &(0x7f0000002680), &(0x7f00000026c0)=r15}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x14, 0x6, &(0x7f0000002740)=@raw=[@jmp={0x5, 0x1, 0x3, 0xc, 0xb, 0x80, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r22}}, @generic={0x3, 0x2, 0x0, 0x3, 0xe4}], &(0x7f0000002780)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x45, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f00000027c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002800)={0x5, 0x7, 0xb8}, 0x10, 0x0, r16, 0x5, 0x0, &(0x7f0000002840)=[{0x1, 0x4, 0x6, 0x1}, {0x0, 0x5, 0x3, 0x5}, {0x5, 0x1, 0x0, 0x5}, {0x2, 0x5, 0xf, 0xc}, {0x1, 0x3, 0xc, 0x2}], 0x10, 0x401}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000029c0)={r13, &(0x7f0000002980)="9c8bf6a1dc8c068a6c13c902f24b1ec032"}, 0x20) r23 = perf_event_open$cgroup(&(0x7f0000002a40)={0x4, 0x80, 0x30, 0x80, 0x67, 0x1, 0x0, 0x9, 0x40, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000002a00), 0x8}, 0x404, 0xfffffffffffffd62, 0x5, 0x4, 0x79ef, 0xb2, 0x400, 0x0, 0x3c5d, 0x0, 0x4}, r10, 0x5, r17, 0x9) ioctl$PERF_EVENT_IOC_ID(r23, 0x80082407, &(0x7f0000002ac0)) executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0xfffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x45f8ff3c, 0x0, 0x3}, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES8=r0, @ANYRESOCT=r3, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000009e9b85000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rxrpc_rx_icmp\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0xc9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffbe}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair(0x17, 0x0, 0x0, &(0x7f0000001700)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d637075736554202d6370757365742063c9d04d1695586bf2e0a61aa68db2c893463f4efa2ab09d7ec861cfca5c5294bd8ce0f195022897c0c12a617e01d0d4a37a538a9d9fcaa704c77100b655c97934a849dc47ce359031d8d97812e7e941adcaff64c8bafdd843eb46dcff6b7dcfd760833b9fca25c36b5bcabbfc4711449a0bd219c77144"], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_remove_blocks\x00', r0}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r3, 0x58, &(0x7f0000000300)}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x8, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x723, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001640)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='ext4_allocate_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_queued_recursive\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000a80)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x14, 0x4, 0x4, 0x8, 0x1014}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000bc0)={&(0x7f0000000780)=@id, 0x10, 0x0}, 0x841) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x7fffffffffffffff) executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, r0, 0x5, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="ec663189d3348bf13f872a468352b72482b5b2b364a29c6f0f2c4e741bf6457d1418455e157253231681a3889f39b3da6b60dbe404cb9a145d0d49cfd1668a32b96ff302975748993a8a534144d211c681ff3d91ffa436d40b9afe648ec8bde2f7553fb5d3f3b8423873903abd024284bfd01511c149b6101851f7aae4675df76e7d32d7b91659e4adcc14ddfff8a2b49d1393de72b9d970ee7f45a755c1d9f7b4d43e37e17d6eaff5fe352d507eb0424ab937980ae8fae8a9062b651a53b6543733e259ee3083a308a78ac50f0972629b74e6aadefedf2352d024d8f27d4bc8703493b08bbe75e34ee5796d0d275cae3d3c0eba179e145feee0c8acc98af7888a374dbe705e058fc565e40677890a39e6999ae47202a9237803e9eee30f368725ca8571a8f6a8ba396905f4f023a60acb644bab6b0b8964aa514c37f23509c685648d6adb0e230aca690c91e664bc49fa30ae42a2c71abc7517181d4157ef996628b3624f367519970366acca85d399e2c7703930e2abd4bdbac076230ad16368ccb350357d57626ea47a15f0fa16bd5efa8233fa3ea1183da730204a455a673c783c10a26411c5de816699f7af3401b9f38592a4cd9f3f0b7de18cd69f831eee87a3d2edb64ecf517d201f32f86b80fcd3287330f286465260370527e6116df0651001405563622e14af715f6c3dd10e1986e3b95ebf618ff42bdd7a74f0d0cc2cc8dab1048eb5fdbfb72cb16f9e2a196b512720cbfbb4696f291200a153c383cc441091c62649a88ef173a42eced93a374e4f0a078244e56c14b3c4cc9625b3e9e1853839ecb00d6cfc2d2398634935aedd9a545e4b13895a3b8b05c8fca9af2bba82762db85a449f5d9c6ff87b724f19dc1805eca58445e67782a30f03e7b1272685ab8306c255604360b0d6e53cc443b0b81bcf92b470b8734b7b7b2ccf2d51fc1a8b43d8dba290e875f35b0bdb66790a3bb4d8391c5fdde5f461b5922c56f8a858865c0fd8b39cb79e8e182342ef0398641ca3c76620482705878ff0d9fe2eaae18a8ad73313663e36feca9bae81834482bb19c651e273bc04333963f2a64d516761280db45fc4217b5c2ab73a8a04c5d2c2aced37bb2825d17f68c4d65dfcc54057a46f045bf435391b7304ee376977220e71e97919cd67e3f0f0f63e0dcee8d90d80ead12a5eda22db217bd362c1a4f9244c99da91d618c6b71b21ed80826d4df95aee10786e61b3141002e342490f2d842051305d2e8d41aca580a13cd48a850eada7dfee4bda67a5491acf4cfdd3919135e7b113a1973595b99d6ba152ae8cc63fd95c1d7d4a59b038c426ffdb949fe1a6004df2bbae2acce3f5720419dc597229f2d120c689b07a344e75f4c631d83b3130cc927412daa9607c8c0fa254cde27306360a9a5d18ff9d4d4ed38162a5202ba214db4486887b5831d727bd93e6e7cddfa4d3480cb3b4683b1de52bdff534016719324051f81bdf49a5c12dd7b389107b3eb5dc4858caebe8c0a9866ff632deebc16492f95d202ce0f454476ab77871d3188ec83fc74f2ec1055893b2a138cce27ac5553c5496cbf147002a9c55fdb202969a4802ca3556453a58d2aa8e19f40e577fa280625468d385af8659a0f3ab69fabf4fa1326f7a7ebad98a23958c91f28c4b03ff9f343b6ecdb82e820bcb7de6f51d0fcfbbcef902d21a7eed03ea125363b758085022ade27451ba5e0acd9a0044ec50571d234855448be132e14517ae38b798482cc07e1c009c1a4cdd5c42f3862dd6d4c3b18f9c41d0bf5b709d742877ef7ee6d9932c6d7a9fd09bede9f80645a5c4b97ae48734985131f948bf20e93f82b93d6e69479491158d83655244d91bb5e9dfdf103e2238a95a92f35750769b87dce1d0e8bac4e6ee5467f9800a12fe27a2c8f727bbda617899ca26d13ec3b68b4acd7200b3206852aafb13c94681413ee7d0987f4d067b4bc5fc5e01ebe9bdbfc0198232f92da3371d12023388f86a4bb4db9bd559570aef27a96812dd2583c72732922266b98c89c264311577621ceb2625dac0af0fd08f5c27a658645777cb36d687d6f0e6835587cbe65ed922cbd1190b1d60259024be61e7e32b1ecb5e72799103c3a3ea91191667418fedf79d839200ee75da4d68fd6facdd1243f30727c40c6a7c4ffa3d937f4c21b076d146f439d8961258526d56336f7d94e945f90053ef865dd9f939b12d8b6b72b1f20a050b69b8a3b8bc88584766bf9783116c8fc8c4883f8dca31dbfd2775675d868136e5f5e16e3508986750fa8825231fed43ae2b444f5992011f0b80b1f3b0e397ff98fe81da3bd00593329f3014315fb4828fdfec77c8f3c8a92278866f7d299f9a0818e36d1bbad629a61345e01e495dfc4412fcc8b64eac5259de21dae5f5b34c06ee81c0e46b12203b639cfef7f12871287abca6b2f70ffa2cb225585bfbf2c0cd010bdd1b2b3f560016e4db6c30a26e517b608633aa40ab1802da8e94188bad14ab007e415ec41c3dabf4d2817a43a082313529e4a80596807b785af9391117f780db637f2214bb8082373303da889ffd89fa43f4cca427b43e3c17942d314a577112cfb31e841ae40fd18220e9aaa24e382936c0b859a3a425c2018b093e42648b7517dcce9af1366dc5ea8fd575001cbe880ddbb0a768033ee3802c68c4b2fc290fcb84f1e33318543fd2ddf065503c0767c86fcde6931797f275ee4c149d616ff02a9a019c223c16cfd6e618b07c7bd8009d3201a92b91a0944ff21d71ffc53c39b7a318c6451d80b05f9d9c81fd1a78ef35e14cbebc1b4e2de28039301042c0fa09ad2e43d5f78ab4104218bab2da5034050bbf625c6803496dd3d77b574aed51badd3e9967548014b8b318dfb2e0a6ce6637cee786806ec06b359d6569c65df2e538b43862be27d4ddb2710447ed7e56cb4a02779c8767e11056cfaca1ab1aea20d4198a050e98695ae3f2a0aadb5b34b6b945379b81259ebe7abe6d3ca23cae048429b6c850813706f59231034fce07c4111961193d581e3bbbd6c9afd8b3d1e0604807dbd880d2ccc5266818a18287e8c4bda311be83c6f1c5e7f571b9f5ab1f84f8252df9d62f75865adcdd61eaaf7df4cbdd994ab17d2d5d684f95715d4636a6cb69fa2619c6b76ee060202a0a8c934aa537d2c5cf736142349b19fb9b532b05e6dff05c4c635f4134bcc0ef2e38c3fd75d8664d7dfa3139e1b2c2cbbdbe4fc0e2e80870ade368b730d4c06946b608088991f346765afaad6765e5a16267b2d249ee22ea1c6cb85d5d0f8ee48204a5dc48ae6415e3802fd8a431d249f95c72f6895978b36c424e40f83dfe1d0ca01dca14c4a308e926fe726ea0b456dcd976147e61744675f81f38bd5ef06ed76692ac8ac03744c8dc313f06aa28832a3286e626d5e29c748c21164475c739d3f6c6ad046fbb1a149867faf770c089b3513a0649d787208f06e7db6f8a44a9e32c6bd8dd9cca53bcd8ba7ec49d4068d7018b4c8fbd13070f9b0d02d3686b54f96a21e74e346c380a99f21f33925d4a39d510842ed84f2605a15051a784d8216364c2f8ec79f7884ec151ac56d11e30e058d2c49998147c1d54e04aea5d2e9bcc5bf051690d7aa905fdd68528309afda3fd5920cecfae73f6d5f8962e647f5e909748ff9105097118feecf28d6d514ede8cb2d4201da6efc9f3c24893570b227dfe673158e6c17bfcd91625bc4f87eb6fc67e5b647b18231d", 0xa53}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000f7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r4}, &(0x7f0000001c00), &(0x7f0000001c40)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) syz_clone(0x8200000, &(0x7f0000000680)="766b24f17be4a80d6c", 0x9, &(0x7f00000006c0), &(0x7f0000000980), &(0x7f0000002440)="5685d79d1f3c0f411172d1e92a3625f7e80d47c80d02b108918f5b3e8fba2629f0d34464de7ca13d591a8b13b5e530adba97c540") r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x40086607, 0x20001412) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x8, 0x3, 0x5, 0x37b2, r1, 0x5, '\x00', r2, r8, 0x5, 0x0, 0x4, 0x9}, 0x48) close(r9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f00000016c0)='ext4_request_inode\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x37, &(0x7f0000000000)=ANY=[@ANYRES8=r10, @ANYRES32, @ANYBLOB="0000000000000000851000000000000085100000faffffff"], &(0x7f0000000080)='GPL\x00'}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x26e1, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711233000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x41009432, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f0000000380)=r4, 0x12) write$cgroup_pid(r0, &(0x7f0000000200)=r4, 0x12) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x200, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r5, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b700000002000000bfa30000000000007603000028feffff7a0af0fff8ffffff61a4f0ff000000005d040000000000007f000000000000002704000001ed0a0025000000170000003e040000000000007b0300fe000000002d03000000000000c600f9ffffff00009500000000000000023bc065b7a379d17cf9333379fc9e84af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a0800000098efd2a102ee010400006e7a1de4a21f379dbf01de00b1b564fef3bef7054803d0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc532ef58de3c1b7646cb7798b3e6440c2fbdb00a3e35208b0bbf12cd8dff095edc710e4000000000000009fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b8123deda8a3658d42ecbf28bf6d8e8afcb913466aaa7f6df70252e79166d85827513acd02b5a655a314d31a76e42f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f08050ec6850600000000000000d5f728d236619074d6ebdf098bc908f50ae728a40f9411fe7226a4040b96e37c4f46010400000000c3da29faf75ddd1aa96960bca97af133824b881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d4cab080078fce8c5c81b7037181fc2f18f781aaa6e2957d7e39cc1baddcb7ec6667e699f24e41697ee7ea23e4b29a8b6cc9a1f5a7b3caae05f13792292cb949b3aab06b1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb40df77b8bb84b0e733a63784ccc214d930cbb7e090df9a2867b3acec439c163fcd7071b53ac29df826f8ae6d6e18c1eacf5bf8707f0d5217e9bb5a05d9e22ce67f1231bd236ed200073826593c4e1a0f50a74bb482e486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e9978931485747292c6fe6e188750cf4f87cce2aa7d67c6133a9f05954cde298a35ea6d715ba80aee63300000000000000000000000000000000000040000000000000000386000000b854adb4f8080064e8407c6bdb37114c80fbaa4a0ec5aaf4b0ac6f2128668279eb6fc1caa80e64461c9a1be8fa0061ea9d55ee4716bea8e1cebf9ed39325ab4c5530dd6ee9fffc00000000000000d7c5af73c683625aaad5fea5004a76c9f8975ed4c5e4eb3e77e9885f69754932609f19e2f615a01cb6d17fbf5cb539403cb0572534f054d5514ad8264f7b029b2bdf2ca4958a62a6e744f9a4c1e646e1dd2ca19583f0f8b0dc53debd7d44f334e6ed7445a9580f970e483b307c4b3c018bc194b23d37e6a2e52d8288e5aab6fec586d52386e8c07a88c88e8faec5f1b16b2014f6952ce7d6be12c6bdb9651ca6fc907061be311d1354e6295698594a73136237bee068d3819400e43544830a3f74b7942f22336953978a5b2032da4238cc61162c04c1297395b73e18c9387615a2bc87d9e2445f3d323d3fac347926a4bac694c55fe9d145906d410f58f1951405d10504efe402cae085afef5dbd617e87dd4a50d7eb8e327fb5db12cbd6a9efe8e671c4f251cabdfe3400a670d14b9b3cd8d86e492997a0168c022ef3536bd1dc731f4f9f8cb6c3857fb8aaaa95024f8da775f72950212b84fc6133ae14d1429cd4905dabb52e43af7e65acf97b4951fa1e967d16a5ed642efc855a4a46b85cd079934ad3188276efae9387eaa232697526e24b5d4fded86c3811ccd00520150b16000080122965558074956da5e4c3bbefcb64aa8be4456ed2caf0f467b6bbf3aa4371f5e76ab3f60afea80bb066aafb7517f787b090f419a20278a3c779e03afd9a6af6fd518e5dce030f88ec5a5cb7601a161da0f8089322d84ac523040d13e1f1300c2c6555bce60d95dd3288e53435713f03add23f14c8db5555c62de4f6260a483632a2ab447f88dd6efec73a0271a19ca3aa860aa4dcaeebe3d53040b853a7c02a5fcc08b3a572969bbe91c921ac1476027772c87d172ab29967e38ba49e3e57fafea83e495a6a1d1a4ebf83434986091dd66ffe3ffed0c39552a312e2db596d9c827e02f6fc13c8ddbb50bfd7dd8aa2f35f259fc83e007fe79d2d25e30830b92fca00a292dd3b856faa4b7e66e1b64505f65900839df71a97d4d07d37f7ecf8ed9a22da26ae674bba16c204f6b2f8f74fc56b7126d7c11ece6e88ec41192aaee75415c58d264a2b6adae02c821b62428902aad499825ab85a348638384cd12e61dbde5c47056f0a20b4e2a2328d5db5cfe56557a129e6be231acf5f57995c60d9fca5f63a0dfd18054717120bda466d04774b53208ad8b022719ca77a4e0a66b4708f791d849a5e2aaa0074a9560ede2600df5a5c41392fe9460080fcb1e65233fb8dbeec4c86dbcf6a0673e38d2d3615e5bfbde44afe0fa7564231fff7e7f1f3ad68492dd2ccb1decb15b5d7d3e37e8b7d28921c4b9280979521173f522df408d9818b6cc400098abb869921911480a876fbba698801937e8b4264eb6f5137bdaa075fdd88d22230592a790000000000000000000000003527dfd01b47000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f316aa0886c174b73decb46c1c85edf50d8fcbac5ff76b365611666da86a8e65b308706bd7c000000000000003f7c54d5cb9076b81b7741ec03877afb520400000000000000c3ae49f88c462ea2050acf2d9a97d3be29a5614d1eba2c98cf0236401e02d7c445e50f76419ab4f78f67a09e63dd4faa2e7b59399fa5ee0b41e14a6fe6894e901a523fcbadfeff535f2514bc834e876810d9a6a78e70a9e22860c36a724770b4185de44db6bf21fef32a8d5b36d9014fa841061e63d40f4e536314beda5738fee012365f963b2a85e7d8075c333475b9f0284405e30700000041285fbe0bdd37220e31d4731614a50c16c6a41744c3d24eab511317f97b7b4a1c2ec33fedc46e9bf0fa640eebd3d58f0ebdb7cb8ccffd6d6ab7e0e843591d2618e2d2cdc7081c8fafffe8c350a5c554a387de4ee7aac6478d99de7dd82bef044a6d33c789d566c90c46ad581aa22f910547a77d55e26bf19f1d4661550b177ef53933a305e69b8a95119dcf5bda599d625054776151b2cd1fcde238bdc527594a6c17aa9728af24e2bb7a3830e7092b01b119ea4e7e7f0e21527d622cc29c9f0c8720195368f8374337ab4d130619d93c5ef37e7ddd0b2da147e6e513455b88753452de959a6cbfa1ffbc7ad5d8c3b48017fd31dcf72f337b639253f44cb27a12174bc4c191e21015d0c431a71906eb9c6a14c8a060459ef26787ce3d1cbfd5cc459f0048b5d06f6cbd3e9b34c89f3fb2f951ae81d7fcc8bc0000000000000000000000000000000000000000009231feef3117197c7963c2ba910969f776c8b2ea3970f358107945d9e74e9bdfa58e68b65a9201bc4b73b431df96d49f363917f90e3fa1eaf553db1c761dd9b634a9c4d7c21da4fe6d953ed9438cad0f8dfe03e5e2f73019352f1fb682a5a6ebbf24ebc49e3d7058e696ebc2ab3f4b642f36c9006c0067e24a64aa8c53df824a4ee271e35ed90000800847683c08bfda74a143c855030ae004ac797c575c202d8091eb77565212548ead770d68ad9fa2b2528798df1c36fc438d9c98f168490b41e158bb2e2d8ed19d44b9cce67c9c522b5136be09ed1b97ea3d5b317508df23e92c56fc2eb74d27d3861d91745b8fb9f6cc20e9f8b174000c62c4a2b212332a073fc5d0be7347e41454cb27e081c43e92ae7f9f046600db85d945a4666b588629ce0809d5c8506308688db21ec04d365497bf900600"/2767], &(0x7f00000001c0)='GPL\x00'}, 0x48) [ 93.444559][ T5756] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.451684][ T5756] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.459091][ T5756] device bridge_slave_0 entered promiscuous mode [ 93.465617][ T5757] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.472744][ T5757] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.480763][ T5757] device bridge_slave_0 entered promiscuous mode [ 93.501914][ T5756] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.508829][ T5756] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.516033][ T5756] device bridge_slave_1 entered promiscuous mode [ 93.522881][ T629] device bridge_slave_1 left promiscuous mode [ 93.528918][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.536204][ T629] device bridge_slave_0 left promiscuous mode [ 93.542340][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.550193][ T629] device bridge_slave_1 left promiscuous mode [ 93.556108][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.563633][ T629] device bridge_slave_0 left promiscuous mode [ 93.569642][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.577833][ T629] device veth1_macvtap left promiscuous mode [ 93.583751][ T629] device veth0_vlan left promiscuous mode [ 93.589570][ T629] device veth1_macvtap left promiscuous mode [ 93.595406][ T629] device veth0_vlan left promiscuous mode [ 93.783030][ T5757] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.789974][ T5757] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.797453][ T5757] device bridge_slave_1 entered promiscuous mode [ 93.847361][ T5758] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.854268][ T5758] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.861675][ T5758] device bridge_slave_0 entered promiscuous mode [ 93.889656][ T5759] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.896643][ T5759] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.903969][ T5759] device bridge_slave_0 entered promiscuous mode [ 93.910621][ T5758] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.918039][ T5758] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.925345][ T5758] device bridge_slave_1 entered promiscuous mode [ 93.938137][ T5759] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.944970][ T5759] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.952633][ T5759] device bridge_slave_1 entered promiscuous mode executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r1, 0x0, 0x20000000}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r1, &(0x7f0000000240)="6b476b9948cf2c1251a21eed8378116b9c07674ebc56566d1161285188346d4e457362afb99de9dc7ea4497098f7d0b21a081d651fff56552e", &(0x7f0000000280)=""/140}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf56e}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0xfffff000, 0xe, 0xfffffffe, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000ac0)='rpcgss_createauth\x00', r7}, 0x10) syz_clone(0x1e8a9080, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3f000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 94.112107][ T5756] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.118966][ T5756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.126054][ T5756] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.132861][ T5756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.151160][ T5757] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.158149][ T5757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.165223][ T5757] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.172045][ T5757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.191474][ T5759] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.198431][ T5759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.205498][ T5759] bridge0: port 1(bridge_slave_0) entered blocking state executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 94.212319][ T5759] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000002b4a9bc3cc0c7902ac237c974c0000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000090018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x76, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0x10, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000000)='GPL\x00', 0x1000, 0x0, &(0x7f0000000200), 0x41100, 0x20, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x6, 0x101, 0xc218}, 0x10, 0x0, r1, 0x8, &(0x7f0000000580)=[r0, 0x1, r0, r0, r0, 0xffffffffffffffff, r6, r7, r2, r0], &(0x7f00000005c0)=[{0x2, 0x5, 0x0, 0x6}, {0x3, 0x2, 0x9, 0x3}, {0x1, 0x1, 0x4, 0x4}, {0x3, 0x4, 0x7, 0x3}, {0x3, 0x3, 0x0, 0x9}, {0x4, 0x3, 0x4, 0x8}, {0x2, 0x3, 0x4, 0xb40eedc791313032}, {0x4, 0x4, 0x10, 0xc}], 0x10, 0x4a6}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000630122000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r10}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') unlink(&(0x7f0000000140)='./cgroup\x00') [ 94.259270][ T5758] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.266225][ T5758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.273327][ T5758] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.280115][ T5758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.304036][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.311256][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.318623][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.325706][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.334191][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.341516][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.349534][ T357] bridge0: port 2(bridge_slave_1) entered disabled state executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe603, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffd55, 0x0, 0x0, 0x40, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104a, 0x10000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000006c}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f0000000580)=ANY=[@ANYBLOB="180000fdffffff000000000000000000187f00087fab3831ae58b0f0f51af8f2e009f7f0042d0d9bc97dac7a3803e9f71bfb0e749e9b95673330ce79dccabed5153a2fcbd990a3c69c1635fd80e76d1601f2643704753e9e07ac820e839b5830bb4093ab3d1ae9f8cd881e4fb9e87dea3bd3113f2458580c70ce73", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f00000019c0)={0x0, 0x0, &(0x7f00000018c0)=[{0x0}, {0x0, 0x54}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 94.357243][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.393303][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.400973][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.409061][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.416303][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.423644][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.431838][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.439932][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.446779][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.453947][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.462130][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.470037][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.476771][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.483920][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000080), 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)="d66425ae9e81982fe6afc27ffd1a7942ace109a733dc1abdcadca8a4df6aa54cf0fded455cc5e9ef5582c17caef2c44dfe19b687ed92deef9591f5c456ec7761a3fb6bd3fba3ff7d3d7891abfb44b8518d15333e5521be04deed2be3c805407187d74d84efe6c951875b7aa26550a0401da8bb4a103b402b764e78c16ff11a61a8458c3376d56453d6260809b95c4ac45f5785b046e91a4fc24b6fb3f33a2ec853549b1003143ca932a5e8aa3f3649007d", 0xb1}, {&(0x7f0000000180)="ee9c589bbc96738c457dcfdabffbe770bebef898d1db817168cb8e057b043b881119f24521621fefb810fe1c76ac31adf554011cd50615c17255c3ad12dd10ed3fd5da4b8c7235507aa43b35a2e0db6a4108016f93d5317e6d7ceb044530588c8097bcb62781f71a77c0571346f77fcae2a4a1ec0015bb0092a25deff45af57e3ad5aee46966090ef0e33dc7af05b08d88aeb188c1d2dcee69d9bb1eb7706f917b62361affefa4bc718e9c35393a10c6973f39a6c8a33861df2c8454d14292beda5a84e50e59b72e22b35d4d0bc6d6b82e0f6845b65e79fd868a34723a152055c3d277d027b79163ba4fa2658e4a7b813f0dba121122711835a2f278b5524a4d3b2479d1c8969b55868b00c505fbeb0e45199525bcefc66df112ee22988dba0b6077755a8174eeed996e87e97670603d44e4fa46f011d0d52900bd6eb93f32b43cfe95aef6973a3971bbcaa8ad9dccfaf6fc2681d8c053c6d381374b919a891d270e3934fcb0075ce9ccb470f9fa7e9bbb988e1d4ac43ea5ba443f1fe351cead09204bdf68b9e2cae5acae23338ddcb8f5406722affbffaec71987cd518697869a5007803567bb3bb8328b9282dd1e0e1314921cc9c16ea2d7ebd1481742e244a2b2fd0482704717cc85797552be88ee83c349d968d0d56621e7015b67c14dc44b0cfffed6ac22d0eafdecd76da6e81bf8c34fb549b8628ca772a1307bc289d0a3fd1299003c05391d76137a5003d73a330576002c423801a626cb1d6ec146fc4985440c7434b0355f0b74966725c131e1c4cb4c80897ea84ae332e640fc20a7275f33bc925fc5c31057c911c3544f35c978a7c854de417a6fbabc480700fcbb964f97e3174c4d9843a25cf647790b47dc1fa70b0f7d216f2777d13074348390b4adddb08069b3f7b5b960b5cc15fec3020a3d21e67e7a551fa959c100447a1b8ed08cf495e44c7a52034e29ae2cf1d98e9cc09b5666e628b7a437d0c3db699ea5d0cab99dc1dce6622efe1740960cc5e9449efe193d70daba29746dcf483cc2c432a8b33f71dec5495eaeb161184fd673fc95c0d0b29a8ba9a51ba447dc37637e2edd4fa4ee75d41a44a8da6a8c882010dca3da3d389ee466a1cbe4bde3c1b194b8ea8459e4715bb50474d7e44479740cb2cbfb6aed3236c0937dafab877a85035894f20311ed38f8ec49c130bb7e5fb5e27144df0377fb6502d07e640da18b5a424a6f5ef034c8056f80c143f30f41d52c7553d3deb93eab32c4f58401846bbe52792880fd6bbbddae6048a0d572c874aef4cec2503fdcf7732819f5ffc93bc197b933b821b7ec11ea51075fcd3f7118b55165b5e8ab1ffb8a4ee0c4374a19e8c8d0bc4c5dc2cff56c1430cb4276243633ed147ddc67962aa24ee1690e4316e5342406b7fc085686684da8faab0132032b5458af3f20a6dfd02bff37f89eea267a7cca288bee53be35389e8166eb4a77104ba71013904cbfec8dbf1c4dd02bd30de0264a854f6b69df161ea245d24574de9153542f4a9242b65fdc993109c5800bb0a1a78dbd1c34ac6bea5594a37348530ddeab669e94ab991cc583b98c215cc77b7181e43d9572787d20813b48d591d04376b297f1daefd18dee8289ef58c61a39e9878313184920c82b1a4632652f8a9ffab2ffa6b59f1094a044c17d9928a86b872e87134f34c185eb6e443593b4695f0d12fa9c26a6cd3258085b88d5c1af9969b10280eec258809659cf7e26398fd4df396ecdea47c69c89644fd22bd114e36d7d31d31c508b571bf767d2462023550b85325227ffe02a4ded75c78f029020e93dfbba72aa2efad92c29d22d87e616d3300fb4a6f7f506fb7aeb05911b42cae969ecfaf37bbe03cd562913ba70710bfa64bb5f0995de4ce667df0896771d91d1c433f593f0f067c0f4e9087cc116cc8154421967c25051b2c78df821a225a2b2cc213ab9d8547387510bda9cfe00a2b9a920c9a3373d5c3a0443ecdc8d7c549c5a23f2a7de64a97133fcfdfb0a9115a4d7babad3acc7cf74b394cb36bec47da30c9f379ea2e9d2c55cc320327c9aec4a8aa68379520440e9f90fd08fd5fed8befd46c3a196278f764b179c5d0236036c476a402b20864d0597de3a3d79b3b755dda52aaa98a70f3d5fd71846dac6e2a6bebd0ecb9078a54d1ac1a393ddd9560e2c3c1e631251e8891a2ce6df4553f5d5d2e81bb6fcf90ebf107642bbf657a36330f3dea9120b25d13df10f3cc4085648c5d0832595c9a06cdb993ff9ef9478c3f76c12e672e287479268110cc2cc754111e4dad5641cef9fb992d42ef73ee0f50d4395d79cfaeed219b3d87032edccb3c55d6efaa565138fd52237aeaadf26ec3ef98b33824e5cff7fd68961bb1fcfa9cca5b6345e3e4042a33dc17e07bb33bd3194d6ef8017b1250956071489cca22809aa33e337bfae557fe8e47df9f70b6e2ec83bf5f1cf25c12441e5615f18758a55ef21b273231611003b7063773b208bf05b83894be9b2674cca446ac818ad6954835ac9bb2d4854fedc7140ee454d102dd10d428c15641392505458fd3de76809c862c53145a9f1e4a302a78fdebda6d752d7dd0e7d8f688f8f9d7c4acb37dcd1fddd2670af958a210f1ce150a876d47999ecd3b1ede497d4aee0601c459ffdf6499412c79d2f74bc59f8149ce2b6b33ccb5784035ff51cc98cc05b150e111104c1e98ccda2f569bd1f44f3b2fcd7359fbf50e9b9a83369b9e8dca720b6d98aa89e032011cf34c3df886c017f4df193ddc238a725c5ff352cabb98294d43c88004afb983fd1ca79b30278aa392c7e6f4a44630c37aa46ff615a85e37d9bb1b58ff76c73334e0a2905111e73ddb4b5cfae489600161c954a0efe377bf58ddff745ab2e2f511b5e65fc1801022e45bbba098c22fdb38df3a4171f0eeddadb8fd8b7b04a5f47ccfe5e2362df2957d5fbe4afcc6af9edc0bbf508810104de924a0511187ef7635b832746c9cd162f02201482fba876cd80edf4623956f6a8334e359188647c4c563aff587841bd3a7353cc3a15aca663b0264aa0a3393d6891b8889b5782547d121f06920c47b6b2b8714205e36bfc98f374335acd5b08fc09449c0523e5e6b359150e03f8e1cb3b9879d0f7ba8576039816c62bf1942fcef58e0378b7979dc31565b9c800dab1c075c94acc952297922ea4e32c8c73aa9706df44ccb83e09724b3a1c2198082fc2a488efaf1b2befc18f4e8a008f72d992ac5e8274647df43e575f3987cf7c3f36294b118c1b9aaf46034068bc042c8aced16ec5643c6f59bc61e3738cfc9c08e5e64abea0f3a53c2f6d8e229f09c43f42cc6050d3d07fdd1c03d2bc3179e4793fff1e3b6094a2cae116c3cff28a34952fdc6c7598dcc564a416d4ebd1d37a443cf5447c069ecaf191b06acc4fadd03ffa21db5d959cdaddeb0da10beea24bc81b253890db733590d20c7aae962f889181e9954240e209dcac2e7d954377afacb173ddbe35f2f696d397f1eabde358fd10db96701a8bcd4d13330cd3202305301185a8cbced03c9bfcb9312f45885befbfd287ce0cb522f03a88986202707f25a66f3b7f041da2f8b2a5b5f304fe3f28e59b2f318eb33c3cbef6532e126c91f22684403b44ad0ba2ba3e8c8be44052111373b14b5c87b4da81107cf46a34ae65b74d40b809c849a704036144cd11df1aa4969cd9b60d66d98b39979433be7ca2f3f89c0f986ad096fab24de0ba69f4da071ff663e68fc4f3e63f7bbfe7f38d63daea977501bad978f297bbeb0be0c0551fcccdfb2d51fe12bd900f8e2f2ed62714f6068a2aff95c79ea703a98cefa62a5b662a49a85a6a99ec5534c1786446b794a2fe173ee859d75c9923e0cf996e57df00a86e469a6f43ec0e974a62fea1937164a8d085c63130fd3a7dad7759616dc2ca0d44225124b9ad1bbfc33b8c3f0ea830148cb177b2bbe3aebcf3305e797c2fea0c41a2e9035551c7b4b9ece6c97bc15f6c26ec13293fd5d5bc7e1fa79b5fe7b587b9f3db4acfb720f7558bbef21287dcbe7de17f1f460925f4a980ddde466c96910d7148d2bbf33f1f83dcd541a1bf2d864bf4e1fc2768d9c49724a6980e4f517a1173165f0fed59ebd4af37a82b035231827f803e0af626a738c3147d5c3448affcb2711495dad50a48e8a8e9a53b6a8a6eeed38e2e7f4cb2ae97f46e19f47547da5baaddb2cb706334237169e62979a18ade4a244bafaf25264cacf97694011797f4034dfdee3085f4b349ddab4d247daf0d118b01f457dbe6f7333e9cb44cc23d6d5fa41d3d9e456b50c2227d93fb5ae9b757e1f7c628c956f3c31ec0f83e72546fbb535fe96143ff6bdf0a2bf00ca84134997fd6ed43b1719d45e4da5758d086b1b9603d72e2a9dca225d7ade48f8056892f764788e94f3ddde7aeb1e50eabca33036f5acfa188f71aff0384b5a816952a13408460a83224811cfe273dee5f14ff301eba1dbb07d603b598bf93908dbfbf7fb8194e7ae4d0150149bb9fb59e8d0a335bbf1b731b126c717a35a97501b9c4fc1918993c19d75ac7c28e3bd843417b54ac196816e1e66d149661129084e0442c40d76518501e9e174b70061fdd8719a23e0a8b2b6e0d19d90fd4602b771851ce7c3f94a91c90d5739efd771a1faa010c23499103e60a15ce5a5392bad7ed3d032742c44148d25bf7ec7ee3be45034322f0ce4cfae941ba3a7bb362f756b03dc893b0f80c411398da37ea2c987befdca3dc6ce5848d14703ed8553fff29554de3e95d77ef8f203604939a77f2d4a3a7aee8246348ad8ac91cf657e1f99a5c41e6be52088b94b855947c326fc1e9b87f2d69924b14621f0a4a98bf87a9144b282870f390da3a277d9f1580741a49809a094e703945d0708e0714d0985d337f0c2a7a64e5101c9bef4ab8e6cb3b82720197b70c57b8bff6ad9b6881bcc1243823777c15f32cad058d0522e5b38da2f8f6a33b2e3051ed005546434fc337a25d0858ad3431336332219635431d1027298a656457149ff10438be18da6802890e7d8f3aa39644b17eff83e84fc8d99433971ab6f2b227756b44c4de16f88549234d686ea07d722036eeb4b00fb4798e4ab48ac581e07e01f45d7685840ea948890067a5d0c3c06b8447aedb8ca2013d96b5f10027fcbd5be0e359812695d2db8bfb89a5ae4c2d9ea04ee8ddef95544e0a189545a8b34c8bff9860bf6c3f18031e51fe0456d5fd85ff64ef25ef175730c6048865e2d639b7dd4c554df90ff570d3af1151d7598983ae583db9fadf432766837c854a056d07379bf3cf6d8ee1d1ac86421b17b58add4012acc3a5701bd6236941329ad1fb02b1ba26c5b675404c6178aebd8aa9152103019f02e20461c5ad906318c8a74c45cfa49bcbdfb81ecaec25a37efd932e774bcbfb4c53b2ab43046329a9a2b9772a1f9295e5fadf4db9d95fd7f21c0a034614829034e435d50d63c68c72f9cbec7f390ffd88113a2b92e01931ca5a2bfd0fd667fc74fc9f2e53499523b036d3aacb8153a2016e477aee7a9adc34c4684490b7d7d0d764e5dad51faeec57f2a8366f58dbc99b40e6eb058bd2ab463eb4f45f24d9d04aeb05bb07dfc22d6ae9db6311f53e3d4464ee40ac7da9eee6ddd2655aeee1e0efc4ece49817819735b51f06134ccb4f949af37aa0694d42ce8dd699255dcb17263e2f789a50d9efd4672c17a9e78aaa6b4a4f8466fe4bd935c3740b228051cfa639d0bfc0e76bc71ef7d07985b00b166f9a4037e0d1d80bc8fdd8c4e835195c81971b3b91cb83ddb0d6b6522425e7347d08", 0x1000}, {&(0x7f0000001180)="667ce03f9dce677db824b57b98888246af7d9b06236df8039b5ac6dff81cd83215bb73c0a42d2f1ea1d04541a52262551d467d88defa1d0248947fd6dcff283dd1d9cfc7477a8528ca043bf1c948dcad869551cee6ecdeafd47bb5e6cfe92efe23871c8cd464c86c5d0c8cd850b97436b916982d26bcb5e9bd9b5e5558954d44074767fe2ea946e858a319c9e7662bd7616ea916e29a2e463d4762078596c87093a0274682e2bda76135a83e2aee4284b9ff92ea82da6199bdbd8b8465573296ec4fdd46aa64b1160ed7b09a83a27f4a6b86b1bc0bfc2be96fd59ec9b62e40926ff9bc9e", 0xe4}], 0x3, &(0x7f00000012c0)=[{0x70, 0x84, 0x800, "55cd6ae0fc8328e9ca1079ede7170d9ef46560939237d1aadaee24ebf94da8af7a1098d01937deea6bf1d8d5e3bf5e3a25af388efb043a5da9e459e186c379d33c68f172fec23d9c25fac4ec4f7bc1c47a1c0c7168cd44e1d38988422d"}, {0x70, 0x111, 0x8, "ea36d11702b60c5d886dd9e932f23264b09a1ba5f691c4affa1658c0e4027c5b959d137b4c554febe0f35924cc8c50b90f5bf486e897d92bf89dd1d974c83bfaa488116155a6723ea36d7e262be51d0d1ec7ec606ce71e7ff81aefb9521682"}, {0x58, 0xff, 0x9, "d09f773985738d077789215e12581abac7210d76a7544b1c1489c44ffcf45a6d8e8e715719cb4fc563b69ac75814072f72bd7e93a0f22d825e04c97fd1eba61ceb2b67903d"}, {0x18, 0x29, 0x46, "217c0a7b1de2"}, {0x88, 0x10f, 0x6, "ee1cba516a0784233bb099bd4e867d31f529be3e061baaf7e91b3ab35fcf41d1152dd9a7181fbf33403555b8d258719a316e30975002c1eae9606da9aa803a203fe83b5dc970db83be535eb233a764abdad2ecce4df844a8b6f4d70c4c386f9e4387de85d2c19d3bc076d0699bcd73beed76"}], 0x1d8}, 0x20004081) mkdir(&(0x7f0000001500)='./file0\x00', 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001540)={[{0x2d, 'rlimit'}, {0x6, 'cpu'}, {0x2d, 'hugetlb'}]}, 0x16) r3 = syz_clone(0x400, &(0x7f0000001640)="d5dd3d771a47656e9ae17ae7636ee20584e7a5b251de86725ac634d079ec6b87d519d45810e57de17445e843c9ae2930c35523a5451da85076cb32f1f81e29e257c16cde74a8786e53053f1e4aa5f106229abe9fe22fccea6673616c7bc0d7177df55184a38e9fc13ca1a7d40cb3a28b443c4bda6ac7f18905685d9ec082a228cd566498a49cfa79fefcf62ff61aed8d7ae247f5e5ef145a5c391ac42c793a6b10e485d7c29c6f0cb9", 0xa9, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="9d01a9ba24046ab5f85aae0795eb6ce98c64a9f46d8c6d598a6a0c83cf62b76d0281401d88f5aaafdfe884907540c323fda7b65ec71473aa98d3fc98654c4d5403a9956da65d09f5d563e6bdd4f59157b5b823c8262911eef893") r4 = perf_event_open$cgroup(&(0x7f0000001840)={0x0, 0x80, 0x80, 0x1, 0x3f, 0x1, 0x0, 0xfffffffffffffff8, 0xc, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001800), 0x6}, 0x88, 0x9, 0x1, 0x9, 0x5, 0x3, 0xffe4, 0x0, 0x86, 0x0, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000015c0)={0x1, 0x80, 0x8, 0x4, 0x4, 0x3, 0x0, 0x2, 0x80000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000001580), 0x2}, 0x26, 0x5c45eb15, 0x9, 0x1, 0x0, 0x0, 0x40, 0x0, 0x102c, 0x0, 0xea}, r3, 0x7, r4, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000018c0)=@abs, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001940)=""/212, 0xd4}], 0x1, &(0x7f0000001a80)}, 0x100) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001b00), &(0x7f0000001b40)}, 0x20) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002180)={0xffffffffffffffff, 0xe0, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000001f00)=[0x0], &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000001f80)=[{}], 0x8, 0x10, &(0x7f0000001fc0), &(0x7f0000002000), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002040)}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f00000021c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0xd, 0x2, 0x0, 0xf, 0x1, [{0x1, 0x9}, {0x1, 0x101, 0x6}], "0e"}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x5d, 0x4}, @fwd={0x7}, @typedef={0x8, 0x0, 0x0, 0x8, 0x4}, @restrict={0xae13, 0x0, 0x0, 0xb, 0x3}, @struct={0x8, 0x2, 0x0, 0x4, 0x1, 0x8f2, [{0x1, 0x2, 0x8000}, {0x10, 0x1, 0x3}]}, @enum={0xe, 0x8, 0x0, 0x6, 0x4, [{0x8, 0x7}, {0x6, 0xffff8001}, {0x0, 0x6}, {0x9, 0x6}, {0xf, 0x400}, {0x10, 0x7f}, {0x8, 0x2}, {0x0, 0x4e}]}]}, {0x0, [0x2e, 0x61]}}, &(0x7f00000022c0)=""/12, 0xe8, 0xc, 0x1, 0x9}, 0x20) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002340)={0x0, 0x80000001, 0x8}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002400)={{0x1, 0xffffffffffffffff}, &(0x7f0000002380), &(0x7f00000023c0)='%-010d \x00'}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002440)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002500)=@generic={&(0x7f00000024c0)='./file0\x00'}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002600)=@bpf_lsm={0x1d, 0x29, &(0x7f0000001c80)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @generic={0x1, 0xb, 0x3, 0x6fb0, 0x2400000}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}], &(0x7f0000001e00)='syzkaller\x00', 0xa49, 0x7f, &(0x7f0000001e40)=""/127, 0x40e00, 0x3, '\x00', r8, 0x1b, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000002540)=[r2, r11, r12, r13, r0, r14, 0x1], &(0x7f0000002580)=[{0x0, 0x2, 0xf, 0x2}, {0x5, 0x5, 0xc, 0x1}, {0x2, 0x1, 0xb, 0x8}, {0x1, 0x2, 0xe, 0x1}, {0x5, 0x5, 0x6, 0x8}, {0x1, 0x3, 0xb, 0xc}, {0x1, 0x2, 0x2}], 0x10, 0x7ff}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000026c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r15, &(0x7f0000002940)={&(0x7f0000002700), 0x6e, &(0x7f0000002800)=[{&(0x7f0000002780)=""/108, 0x6c}], 0x1, &(0x7f0000002840)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000003b40)={&(0x7f0000002980)="91d1219bf00435c3f10c79b2e695cce1311ec7a3ce0ea125474cfc2153f4cb46c84336bf6be955487c04aff01b3ef6a225eab3e494ca0a47be3c4ed6e45eb03969d53ef70dca2c", &(0x7f0000002a00)=""/50, &(0x7f0000002a40)="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", &(0x7f0000003a40)="2b9edcc2cb219fe79b3bde9c638c89612227afa73b76fd45b50c196bd7c09f261ab6f5824856dc18a05e42522e738653b293ca55679043512d72f2a83af69869deb0c8347069c0b81d77a62ff9da78305e8f4be2437257b4d17d04be175fc1507c846bb09eca95263133da0de726bafd1b61cf3742d14068a1f63fd9147733fd1ea5c4c45fdee7b115cb9d433397698560865452741a89e1512635813e51c9a73d9a01b0547db801f9bd5b4daa513ee21b685e881264e9bd2c8b2adde2c335ac30120397ead3662896ef7f0778fdfcc86adc2f586bf3918ef7ad131218083aecbb7c930325831ad2af18e83b9f23b5c6faacc1dd6c", 0x41, r12}, 0x38) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003b80)={[{0x2b, 'perf_event'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2b, 'rlimit'}]}, 0x26) ioctl$TUNSETPERSIST(r20, 0x400454cb, 0x0) r22 = openat$tun(0xffffffffffffff9c, &(0x7f0000003bc0), 0x20101, 0x0) ioctl$SIOCSIFHWADDR(r22, 0x8924, &(0x7f0000003c00)={'bond0\x00', @multicast}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003e80)={r5, 0x58, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000003f40)={0x1a, 0x12, &(0x7f0000003c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffff8}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @cb_func={0x18, 0x819c00899035012b, 0x4, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003d00)='syzkaller\x00', 0xfffffff7, 0x90, &(0x7f0000003d40)=""/144, 0x0, 0x12, '\x00', r23, 0x4, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003ec0)={0x5, 0x6, 0xb8, 0x6}, 0x10, r9, 0xffffffffffffffff, 0x0, &(0x7f0000003f00)=[r21, r19]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000004000)={r18, r20, 0x0, r17}, 0x10) [ 94.491985][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.500017][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.506865][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.513968][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.521972][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.529879][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.536712][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.543844][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.551542][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.559492][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.567265][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.591673][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.599797][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.607535][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.614668][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.621911][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.630231][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.637927][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.645965][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.653892][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.660723][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.667851][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.675782][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.683818][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.690647][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.697816][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 94.705640][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.713362][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 94.721131][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.749311][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.768372][ T5759] device veth0_vlan entered promiscuous mode [ 94.779662][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.787647][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.794861][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.802066][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.810155][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.818076][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.824890][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.832118][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 94.840403][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.848315][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.855127][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.862296][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.870354][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.878391][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.886232][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.893465][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.905174][ T5759] device veth1_macvtap entered promiscuous mode [ 94.918670][ T5756] device veth0_vlan entered promiscuous mode [ 94.926163][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.934207][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.942300][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.949917][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.958369][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.965557][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.972771][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.984080][ T5757] device veth0_vlan entered promiscuous mode [ 94.990091][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.997937][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.005830][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.013234][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.029182][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.037180][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000a80)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_mark_inode_dirty\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x14, 0x4, 0x4, 0x8, 0x1014}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000bc0)={&(0x7f0000000780)=@id, 0x10, 0x0}, 0x841) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x7fffffffffffffff) executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x27, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000700)={r0, &(0x7f0000000300), 0x20000000, 0x1000000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x2, 0x2, &(0x7f0000000200)=@raw=[@call={0x85, 0x0, 0x0, 0x16}, @exit], &(0x7f0000000180)='syzkaller\x00'}, 0x80) [ 95.045216][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.053198][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.068251][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.081403][ T5757] device veth1_macvtap entered promiscuous mode [ 95.091748][ T5756] device veth1_macvtap entered promiscuous mode executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x40001) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_request_inode\x00', r2}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x15, 0xa, 0x0, 0x0, 0x60, 0x61, 0x11, 0x54}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) [ 95.105844][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.113955][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 95.122484][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.137601][ T5796] syz-executor.1[5796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.138021][ T5796] syz-executor.1[5796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.155872][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.175550][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.184212][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.192372][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000002b4a9bc3cc0c7902ac237c974c0000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000090018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x76, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0x10, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000000)='GPL\x00', 0x1000, 0x0, &(0x7f0000000200), 0x41100, 0x20, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x6, 0x101, 0xc218}, 0x10, 0x0, r1, 0x8, &(0x7f0000000580)=[r0, 0x1, r0, r0, r0, 0xffffffffffffffff, r6, r7, r2, r0], &(0x7f00000005c0)=[{0x2, 0x5, 0x0, 0x6}, {0x3, 0x2, 0x9, 0x3}, {0x1, 0x1, 0x4, 0x4}, {0x3, 0x4, 0x7, 0x3}, {0x3, 0x3, 0x0, 0x9}, {0x4, 0x3, 0x4, 0x8}, {0x2, 0x3, 0x4, 0xb40eedc791313032}, {0x4, 0x4, 0x10, 0xc}], 0x10, 0x4a6}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000630122000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r10}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') unlink(&(0x7f0000000140)='./cgroup\x00') executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0xc9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffbe}, 0x78) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair(0x17, 0x0, 0x0, &(0x7f0000001700)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2d637075736554202d6370757365742063c9d04d1695586bf2e0a61aa68db2c893463f4efa2ab09d7ec861cfca5c5294bd8ce0f195022897c0c12a617e01d0d4a37a538a9d9fcaa704c77100b655c97934a849dc47ce359031d8d97812e7e941adcaff64c8bafdd843eb46dcff6b7dcfd760833b9fca25c36b5bcabbfc4711449a0bd219c77144"], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000540)='ext4_remove_blocks\x00', r0}, 0x10) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r3, 0x58, &(0x7f0000000300)}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x8, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000000)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x723, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000001640)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x48001000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='ext4_allocate_blocks\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_queued_recursive\x00', 0x100002, 0x0) write$cgroup_subtree(r10, &(0x7f0000000240)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 95.200823][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.209033][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.217160][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.225127][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.246407][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, r0, 0x5, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="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", 0xa53}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000f7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r4}, &(0x7f0000001c00), &(0x7f0000001c40)=r5}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=""/55}, 0x20) syz_clone(0x8200000, &(0x7f0000000680)="766b24f17be4a80d6c", 0x9, &(0x7f00000006c0), &(0x7f0000000980), &(0x7f0000002440)="5685d79d1f3c0f411172d1e92a3625f7e80d47c80d02b108918f5b3e8fba2629f0d34464de7ca13d591a8b13b5e530adba97c540") r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x40086607, 0x20001412) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x8, 0x3, 0x5, 0x37b2, r1, 0x5, '\x00', r2, r8, 0x5, 0x0, 0x4, 0x9}, 0x48) close(r9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f00000016c0)='ext4_request_inode\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x37, &(0x7f0000000000)=ANY=[@ANYRES8=r10, @ANYRES32, @ANYBLOB="0000000000000000851000000000000085100000faffffff"], &(0x7f0000000080)='GPL\x00'}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.current\x00', 0x26e1, 0x0) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008006900b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 95.262151][ T28] audit: type=1400 audit(1713626683.216:149): avc: denied { create } for pid=5799 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 95.294078][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x84}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000800000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xaf, 0x12) syz_clone(0x20021100, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00', 0x4000}) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) write$cgroup_devices(r0, &(0x7f0000000080)={'a', ' *:* ', 'w\x00'}, 0x8) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x2, 0xc1, 0xff, 0xca, 0x0, 0x13, 0x40000, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001, 0x2, @perf_bp={&(0x7f00000000c0), 0xc}, 0x109828, 0x7, 0x0, 0x4, 0x5, 0x6, 0xc000, 0x0, 0x5, 0x0, 0x5}, r1, 0x3, r0, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x40001, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x7, 0xa, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f}, [@alu={0x7, 0x0, 0xc, 0x6, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x52}, @call={0x85, 0x0, 0x0, 0x38}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000280)='syzkaller\x00', 0xffff9d23, 0xa9, &(0x7f00000002c0)=""/169, 0x41100, 0x4, '\x00', 0x0, 0x31, r0, 0x8, &(0x7f0000000380)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x6, 0x1, 0xfffffffc}, 0x10, 0xffffffffffffffff, r0, 0x3, &(0x7f0000000400)=[r0, r0, r0, r0], &(0x7f0000000440)=[{0x4, 0x3, 0x4, 0x1}, {0x2, 0x5, 0x10, 0x4}, {0x0, 0x4, 0xe, 0x3}], 0x10, 0x40}, 0x90) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1b) close(r0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18d, 0x18d, 0x9, [@datasec={0x1, 0x8, 0x0, 0xf, 0x1, [{0x3, 0x7, 0xfffff97d}, {0x4, 0x9, 0x6}, {0x1, 0x9, 0x3}, {0x3, 0x800}, {0x3, 0x5, 0x7}, {0x1, 0x2c, 0xae}, {0x2, 0x3, 0x7fffffff}, {0x4, 0x5, 0x81}], "1f"}, @enum={0xf, 0x6, 0x0, 0x6, 0x4, [{0x6, 0x20}, {0xc, 0x401}, {0x7, 0x8}, {0x10, 0x5}, {0x9, 0x4}, {0x0, 0x3}]}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x55, 0x0, 0x53, 0x5}, @struct={0x9, 0x3, 0x0, 0x4, 0x0, 0x4, [{0x5, 0x5, 0x8b2}, {0x1, 0x4, 0x81}, {0x9, 0x0, 0x40}]}, @union={0xf, 0x5, 0x0, 0x5, 0x1, 0x9, [{0x1, 0x3, 0x6}, {0x8, 0x2, 0x80}, {0x3, 0x1, 0xff}, {0xf, 0x2, 0x400}, {0xc, 0x5, 0xfffffff9}]}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x5f, 0x0, 0x18}, @volatile={0xf, 0x0, 0x0, 0x9, 0x4}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x4}, {0x5}, {0xe, 0x2}, {0xf, 0x2}, {0xf, 0x5}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x0, 0x0, 0x5f, 0x30, 0x2e, 0x0, 0x30]}}, &(0x7f0000000700)=""/118, 0x1b1, 0x76, 0x0, 0x6}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000009c0)={r3, 0x20, &(0x7f0000000980)={&(0x7f00000007c0)=""/195, 0xc3, 0x0, &(0x7f00000008c0)=""/169, 0xa9}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r0, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x400, 0x0, r0, 0x6, '\x00', r4, 0xffffffffffffffff, 0x3}, 0x48) socketpair(0x15, 0x1, 0x5, &(0x7f0000000b40)) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='rxrpc_timer\x00', r0}, 0x10) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000c40)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x3, 0x5, 0x3aad63b6, 0x3420, r0, 0x1, '\x00', r4, r3, 0x0, 0x1, 0x1, 0xb}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d00)={r0, 0xffffffffffffffff}, 0x4) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000fc0)={&(0x7f0000000ec0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@const={0xf, 0x0, 0x0, 0xa, 0x5}, @var={0x4, 0x0, 0x0, 0xe, 0x2, 0x1}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000f00)=""/143, 0x38, 0x8f, 0x0, 0x81}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001180)={r3, 0x20, &(0x7f0000001140)={&(0x7f0000001080)=""/61, 0x3d, 0x0, &(0x7f00000010c0)=""/91, 0x5b}}, 0x10) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001200)=@generic={&(0x7f00000011c0)='./file0\x00', 0x0, 0x18}, 0x18) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001240)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x80, '\x00', 0x0, r0, 0x2, 0x2, 0x4}, 0x48) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001300)=@o_path={&(0x7f00000012c0)='./file0\x00', 0x0, 0x4000, r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x14, 0xa, &(0x7f0000000d40)=@raw=[@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @map_fd={0x18, 0xb, 0x1, 0x0, 0x1}], &(0x7f0000000dc0)='GPL\x00', 0x7fff, 0x82, &(0x7f0000000e00)=""/130, 0x41100, 0x40, '\x00', r4, 0x1c, r9, 0x8, &(0x7f0000001000)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x1, 0xb, 0x20, 0x1f}, 0x10, r10, r11, 0x5, &(0x7f0000001340)=[r8, r7, r12, 0xffffffffffffffff, r13, r7, r5, r0, r5, r5], &(0x7f0000001380)=[{0x5, 0x5, 0x0, 0x6}, {0x2, 0x1, 0xa, 0xd9c52efc305163da}, {0x0, 0x3, 0x5, 0x4}, {0x0, 0x5, 0x0, 0x9}, {0x2, 0x5, 0x8}]}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r7}, &(0x7f00000014c0), &(0x7f0000001500)=r0}, 0x20) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001580)={'gre0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001980)={0xffffffffffffffff, 0x0, 0xc6, 0x6f, &(0x7f0000001640)="b5c4fbaeb45ee8d8bd578aec36a6d2ca2e4f4af9779d289849cebf19b67f78fce975e22f2afeb348bfcc439eb30560062504644825d1adb1b84e6a93c92e961009f652ee47af2355d27f19cb8f1f583795c82ffcea55d4e1d96db188dd45934dfd31fe30f97da9ba0cff929399d9afc935a40832b04457608129a32aae41b3a271fc6a57474f6e2b33030517524ce49d3ad160b8d4cdf99892e0672e910aa7d82c53a962fcde8cd62b3696a36b004451197c72b9ad167600d09ff25b31c93810a48b0eab1580", &(0x7f0000001740)=""/111, 0x9, 0x0, 0xe9, 0xad, &(0x7f00000017c0)="3288cc6541bb5e01f2cb6dc4aa46d257d3b3863b4eaa73b7f67e9d0417a1f92d8eb214bcce073a203f3cb1e159a05f924ca13bcf364ab279b4bb5ece4d319d3976be53cac1847eace9e875b6174eeb8ab26dbc1fe454828e4ddb21e0c4713b379fde67a22ad39395b284838c285c2db75d66d339a6ae8634ba81de4e6fce673770c86fc1d3c11220ed1348b301e5452ec4be9622de8e88c2b5c4e5a46bf90b509dd85dea1be812b5c99562f79e3aa5d8e26479fdfad59e5bb0b43a35cd3ca98ff21ece11ecbd3a74e352a89b264d02900e64ad4ec6a2abde114a1c63766ee216a22d01371df452056d", &(0x7f00000018c0)="74c198a946a30a73226abd7c1f30c9bf0250300a6dfbd3d1aef6a1f0a177baa9481b961264c95a56b8d8102a0ee698b0969400eb37f0252aabf4ec6d4b768a160f415da54a7bdc38a75b8bbbace68d04d1f64b4c3baca73587b6026f9b2e59698085de37eb83cb7d06a38a83f2d14c0cfab5c48745c6bd536b7a8fd98d385d090a823dbc1a6846b0f7f6eb5624ef7956ff35f5a5efe901484c18534998eb0b629e5d941dfb6c76231fbb99d078", 0x0, 0x0, 0x17b9}, 0x50) [ 95.313716][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.324039][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.337670][ T5802] EXT4-fs warning (device sda1): ext4_group_extend:1862: can't shrink FS - resize aborted [ 95.352929][ T5758] device veth0_vlan entered promiscuous mode executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 95.368463][ T5806] device veth0_vlan left promiscuous mode [ 95.374557][ T5806] device veth0_vlan entered promiscuous mode [ 95.385629][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 95.393812][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.405879][ T5758] device veth1_macvtap entered promiscuous mode executing program 3: socketpair(0x2c, 0x3, 0x8, &(0x7f0000002840)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@call]}, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x48, &(0x7f00000002c0)=r0, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$ITER_CREATE(0x21, 0x0, 0x0) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) r3 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) syz_clone(0x17061500, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r2, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000002b4a9bc3cc0c7902ac237c974c0000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000090018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000040)=@framed={{0x76, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x50}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0x10, &(0x7f0000000180)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffff9}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], &(0x7f0000000000)='GPL\x00', 0x1000, 0x0, &(0x7f0000000200), 0x41100, 0x20, '\x00', r3, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x6, 0x101, 0xc218}, 0x10, 0x0, r1, 0x8, &(0x7f0000000580)=[r0, 0x1, r0, r0, r0, 0xffffffffffffffff, r6, r7, r2, r0], &(0x7f00000005c0)=[{0x2, 0x5, 0x0, 0x6}, {0x3, 0x2, 0x9, 0x3}, {0x1, 0x1, 0x4, 0x4}, {0x3, 0x4, 0x7, 0x3}, {0x3, 0x3, 0x0, 0x9}, {0x4, 0x3, 0x4, 0x8}, {0x2, 0x3, 0x4, 0xb40eedc791313032}, {0x4, 0x4, 0x10, 0xc}], 0x10, 0x4a6}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000630122000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r10}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') unlink(&(0x7f0000000140)='./cgroup\x00') [ 95.423693][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 95.431939][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.441124][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000040), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000002300001801000025786c2500000000074720207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r9}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x8, 0x0}, 0x8) socketpair(0x18, 0x3, 0x7ff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) openat$cgroup_devices(r3, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='spmi_write_end\x00', r3}, 0x10) socketpair(0x27, 0x6, 0x3, &(0x7f0000000180)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r3, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)=r3}, 0x20) r7 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x40, 0x9, 0x4, 0x3f, 0x0, 0x6, 0x40000, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x4, @perf_config_ext={0xffffffff7fffffff, 0xacc6}, 0x145, 0x200, 0xd0, 0x4, 0x101, 0x0, 0x24d9, 0x0, 0x3f, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r4, 0x1) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)='%pI4 \x00'}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r0, 0x4) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0xc010, r2}, 0x18) r10 = syz_clone(0x20000000, &(0x7f0000000480)="c1cdec102e399d998695edd8978e5cfee49f4b9301464a95c6b21b73e2450d7c9b2cf1784f4c729124ce91a404817fca085c80ed116cb59244011f8486079ef30e7de43ec3726fdc5eb5cd0f3c13d62c5c885b171aad0f3da19964f15d6adf852f9059ad1d27365c4bed2380d873f54a03edfbe27f0d757d5c7f24d61c9a0da652091cde8063f0cc0606fb0a02be7e44d3e784e24a0fe26a254be92a8985288ed75f294401c5582a69540caf6e4613fbbe9f205a9309036bcb4e544f5dfb3d851117619f64c9989ebd15cac4eb72eea64777f64bf76e3a50b42f548645edb9748f1d730ff83bff7c51f728730e6d7780aa", 0xf1, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="bcd5f078f41390c5bd74a90df3b6f15527cb2196efa7eca936b05b202cd057d50c6e6ca7e41f8ba2593cbb3ec0fa56efbd84e98d90855f8f4429ab11aa9e4475e771f2b2100753b313245393476c1319c0b78ee46cbb5baaa18b33cde466fb3d1fa2a36c3c6457617e0f48364cb87948a7a318e559e1a4b13378705fc5a21d0d9461c271bc4e90ea2c5fd6c5ffb1bcc2416ed5631e7a2660c39a225305d462b7391c0d80144556b3b7edca900555b840eb30b0c40eebd3c5e0f762f22871fe") write$cgroup_pid(r3, &(0x7f00000006c0)=r10, 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={r3, 0x20, &(0x7f0000000800)={&(0x7f0000000700)=""/23, 0x17, 0x0, &(0x7f0000000740)=""/155, 0x9b}}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000b40)={&(0x7f0000000880)="4ca3e69b6c082fd1fffcc9208121b698037ed4217317d7eb51d8913c68549bd4ea212980115afed4e6801cb9456ee7e3dcc38541", &(0x7f00000008c0)=""/239, &(0x7f00000009c0)="35571ddc3f9e91172856ebd794d753b89f4dae5c1cdea7cc7ce7db4e15b2b4ae82562be3d393c794f9323299457f5ffca3c18f0a2cf57fa88f4a9e1cb88ddbfdc0608ddad576d9f6badc45fa11c3261949bff67c258eb1520b6b58403df3d15130f80d6c471beb030c49eeedaeab0bfc17947985ecfbf19496", &(0x7f0000000a40)="54968adf34efaedfa1cd5c31a9d4ad2467a71f99abe6ca38166282b9a17bac8beadfca1366efcac3f6ed8db1d05b9940ee66a84fc5234bd7e721b9caacaec6739d2c1216ee0bc7a77e00d45f3f1efba094ed2cc0c29a48c558603e688267ff5cd436d8fa06ccdf0065897f87601f305682fc373a031bc190e3723314662b466a856829f2308aff5969a683fc1e194b2b2dbac785c992525b6251b5f2b78c1f837651ec1e7d8bc09c0263569d187455169ecae10834c743e45862b13aa4f16e311696768770b12e078bd7ef3e64653a1610cc1e", 0x9, r3, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000b80)='spmi_write_end\x00') r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000bc0)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0xe1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r3, 0xe0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000ec0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000f00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000f40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000f80), &(0x7f0000000fc0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001200)=@generic={&(0x7f00000011c0)='./file0/../file0\x00', 0x0, 0x28}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_ext={0x1c, 0x19, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_fd={0x18, 0x6, 0x1, 0x0, r11}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffff9}, @jmp={0x5, 0x0, 0x6, 0x6, 0x8, 0xfffffffffffffffc, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000d40)='GPL\x00', 0x401, 0xea, &(0x7f0000000d80)=""/234, 0x41000, 0x55, '\x00', r12, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001180)={0x4, 0x3, 0xfffffffc, 0x5}, 0x10, 0x19719, 0xffffffffffffffff, 0x3, &(0x7f0000001240)=[r13, r9, r6, r8], &(0x7f0000001280)=[{0x0, 0x5, 0x0, 0xc}, {0x4, 0x1, 0x1, 0x8}, {0x1, 0x4, 0xe, 0xa}], 0x10, 0x60000000}, 0x90) perf_event_open(&(0x7f0000001380)={0x0, 0x80, 0x1, 0x5, 0x4, 0x5, 0x0, 0x2e, 0x4000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x1}, 0xc, 0x6, 0x7, 0x4, 0xa0, 0x7fff, 0x8001, 0x0, 0x2, 0x0, 0xfffffffffffffffa}, r10, 0xb, 0xffffffffffffffff, 0xbf65a64f78d29655) close(r1) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000001400)=r3, 0x4) socketpair(0x29, 0x4, 0x7, &(0x7f0000001440)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000001480)='blkio.bfq.io_service_bytes_recursive\x00') socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000014c0)={0xffffffffffffffff}) close(r14) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@bloom_filter={0x1e, 0x5, 0xdb, 0x40, 0x20, r9, 0x8, '\x00', r12, r3, 0x3, 0x3, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001600)={r3, 0x58, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001680)=@bloom_filter={0x1e, 0xffff1e53, 0x100, 0xffffffff, 0x951, r15, 0x40, '\x00', r16, 0xffffffffffffffff, 0x1, 0x1, 0x2, 0x9}, 0x48) executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000080), 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)="d66425ae9e81982fe6afc27ffd1a7942ace109a733dc1abdcadca8a4df6aa54cf0fded455cc5e9ef5582c17caef2c44dfe19b687ed92deef9591f5c456ec7761a3fb6bd3fba3ff7d3d7891abfb44b8518d15333e5521be04deed2be3c805407187d74d84efe6c951875b7aa26550a0401da8bb4a103b402b764e78c16ff11a61a8458c3376d56453d6260809b95c4ac45f5785b046e91a4fc24b6fb3f33a2ec853549b1003143ca932a5e8aa3f3649007d", 0xb1}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="667ce03f9dce677db824b57b98888246af7d9b06236df8039b5ac6dff81cd83215bb73c0a42d2f1ea1d04541a52262551d467d88defa1d0248947fd6dcff283dd1d9cfc7477a8528ca043bf1c948dcad869551cee6ecdeafd47bb5e6cfe92efe23871c8cd464c86c5d0c8cd850b97436b916982d26bcb5e9bd9b5e5558954d44074767fe2ea946e858a319c9e7662bd7616ea916e29a2e463d4762078596c87093a0274682e2bda76135a83e2aee4284b9ff92ea82da6199bdbd8b8465573296ec4fdd46aa64b1160ed7b09a83a27f4a6b86b1bc0bfc2be96fd59ec9b62e40926ff9bc9e", 0xe4}], 0x3, &(0x7f00000012c0)=[{0x70, 0x84, 0x800, "55cd6ae0fc8328e9ca1079ede7170d9ef46560939237d1aadaee24ebf94da8af7a1098d01937deea6bf1d8d5e3bf5e3a25af388efb043a5da9e459e186c379d33c68f172fec23d9c25fac4ec4f7bc1c47a1c0c7168cd44e1d38988422d"}, {0x70, 0x111, 0x8, "ea36d11702b60c5d886dd9e932f23264b09a1ba5f691c4affa1658c0e4027c5b959d137b4c554febe0f35924cc8c50b90f5bf486e897d92bf89dd1d974c83bfaa488116155a6723ea36d7e262be51d0d1ec7ec606ce71e7ff81aefb9521682"}, {0x58, 0xff, 0x9, "d09f773985738d077789215e12581abac7210d76a7544b1c1489c44ffcf45a6d8e8e715719cb4fc563b69ac75814072f72bd7e93a0f22d825e04c97fd1eba61ceb2b67903d"}, {0x18, 0x29, 0x46, "217c0a7b1de2"}, {0x88, 0x10f, 0x6, "ee1cba516a0784233bb099bd4e867d31f529be3e061baaf7e91b3ab35fcf41d1152dd9a7181fbf33403555b8d258719a316e30975002c1eae9606da9aa803a203fe83b5dc970db83be535eb233a764abdad2ecce4df844a8b6f4d70c4c386f9e4387de85d2c19d3bc076d0699bcd73beed76"}], 0x1d8}, 0x20004081) mkdir(&(0x7f0000001500)='./file0\x00', 0xa) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001540)={[{0x2d, 'rlimit'}, {0x6, 'cpu'}, {0x2d, 'hugetlb'}]}, 0x16) r3 = syz_clone(0x400, &(0x7f0000001640)="d5dd3d771a47656e9ae17ae7636ee20584e7a5b251de86725ac634d079ec6b87d519d45810e57de17445e843c9ae2930c35523a5451da85076cb32f1f81e29e257c16cde74a8786e53053f1e4aa5f106229abe9fe22fccea6673616c7bc0d7177df55184a38e9fc13ca1a7d40cb3a28b443c4bda6ac7f18905685d9ec082a228cd566498a49cfa79fefcf62ff61aed8d7ae247f5e5ef145a5c391ac42c793a6b10e485d7c29c6f0cb9", 0xa9, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="9d01a9ba24046ab5f85aae0795eb6ce98c64a9f46d8c6d598a6a0c83cf62b76d0281401d88f5aaafdfe884907540c323fda7b65ec71473aa98d3fc98654c4d5403a9956da65d09f5d563e6bdd4f59157b5b823c8262911eef893") r4 = perf_event_open$cgroup(&(0x7f0000001840)={0x0, 0x80, 0x80, 0x1, 0x3f, 0x1, 0x0, 0xfffffffffffffff8, 0xc, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000001800), 0x6}, 0x88, 0x9, 0x1, 0x9, 0x5, 0x3, 0xffe4, 0x0, 0x86, 0x0, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000015c0)={0x1, 0x80, 0x8, 0x4, 0x4, 0x3, 0x0, 0x2, 0x80000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000001580), 0x2}, 0x26, 0x5c45eb15, 0x9, 0x1, 0x0, 0x0, 0x40, 0x0, 0x102c, 0x0, 0xea}, r3, 0x7, r4, 0x8) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000018c0)=@abs, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001940)=""/212, 0xd4}], 0x1, &(0x7f0000001a80)}, 0x100) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001b00), &(0x7f0000001b40)}, 0x20) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002180)={0xffffffffffffffff, 0xe0, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000001f00)=[0x0], &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000001f80)=[{}], 0x8, 0x10, &(0x7f0000001fc0), &(0x7f0000002000), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002040)}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f00000021c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0xd, 0x2, 0x0, 0xf, 0x1, [{0x1, 0x9}, {0x1, 0x101, 0x6}], "0e"}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x5d, 0x4}, @fwd={0x7}, @typedef={0x8, 0x0, 0x0, 0x8, 0x4}, @restrict={0xae13, 0x0, 0x0, 0xb, 0x3}, @struct={0x8, 0x2, 0x0, 0x4, 0x1, 0x8f2, [{0x1, 0x2, 0x8000}, {0x10, 0x1, 0x3}]}, @enum={0xe, 0x8, 0x0, 0x6, 0x4, [{0x8, 0x7}, {0x6, 0xffff8001}, {0x0, 0x6}, {0x9, 0x6}, {0xf, 0x400}, {0x10, 0x7f}, {0x8, 0x2}, {0x0, 0x4e}]}]}, {0x0, [0x2e, 0x61]}}, &(0x7f00000022c0)=""/12, 0xe8, 0xc, 0x1, 0x9}, 0x20) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002340)={0x0, 0x80000001, 0x8}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002400)={{0x1, 0xffffffffffffffff}, &(0x7f0000002380), &(0x7f00000023c0)='%-010d \x00'}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002440)={0x1b, 0x0, 0x0, 0x3f, 0x0, 0x1, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x2}, 0x48) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002500)=@generic={&(0x7f00000024c0)='./file0\x00'}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002600)=@bpf_lsm={0x1d, 0x29, &(0x7f0000001c80)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @generic={0x1, 0xb, 0x3, 0x6fb0, 0x2400000}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}], &(0x7f0000001e00)='syzkaller\x00', 0xa49, 0x7f, &(0x7f0000001e40)=""/127, 0x40e00, 0x3, '\x00', r8, 0x1b, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000002540)=[r2, r11, r12, r13, r0, r14, 0x1], &(0x7f0000002580)=[{0x0, 0x2, 0xf, 0x2}, {0x5, 0x5, 0xc, 0x1}, {0x2, 0x1, 0xb, 0x8}, {0x1, 0x2, 0xe, 0x1}, {0x5, 0x5, 0x6, 0x8}, {0x1, 0x3, 0xb, 0xc}, {0x1, 0x2, 0x2}], 0x10, 0x7ff}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000026c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r15, &(0x7f0000002940)={&(0x7f0000002700), 0x6e, &(0x7f0000002800)=[{&(0x7f0000002780)=""/108, 0x6c}], 0x1, &(0x7f0000002840)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000003b40)={&(0x7f0000002980)="91d1219bf00435c3f10c79b2e695cce1311ec7a3ce0ea125474cfc2153f4cb46c84336bf6be955487c04aff01b3ef6a225eab3e494ca0a47be3c4ed6e45eb03969d53ef70dca2c", &(0x7f0000002a00)=""/50, &(0x7f0000002a40)="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", &(0x7f0000003a40)="2b9edcc2cb219fe79b3bde9c638c89612227afa73b76fd45b50c196bd7c09f261ab6f5824856dc18a05e42522e738653b293ca55679043512d72f2a83af69869deb0c8347069c0b81d77a62ff9da78305e8f4be2437257b4d17d04be175fc1507c846bb09eca95263133da0de726bafd1b61cf3742d14068a1f63fd9147733fd1ea5c4c45fdee7b115cb9d433397698560865452741a89e1512635813e51c9a73d9a01b0547db801f9bd5b4daa513ee21b685e881264e9bd2c8b2adde2c335ac30120397ead3662896ef7f0778fdfcc86adc2f586bf3918ef7ad131218083aecbb7c930325831ad2af18e83b9f23b5c6faacc1dd6c", 0x41, r12}, 0x38) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003b80)={[{0x2b, 'perf_event'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2b, 'rlimit'}]}, 0x26) ioctl$TUNSETPERSIST(r20, 0x400454cb, 0x0) r22 = openat$tun(0xffffffffffffff9c, &(0x7f0000003bc0), 0x20101, 0x0) ioctl$SIOCSIFHWADDR(r22, 0x8924, &(0x7f0000003c00)={'bond0\x00', @multicast}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003e80)={r5, 0x58, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000003f40)={0x1a, 0x12, &(0x7f0000003c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffff8}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @cb_func={0x18, 0x819c00899035012b, 0x4, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000003d00)='syzkaller\x00', 0xfffffff7, 0x90, &(0x7f0000003d40)=""/144, 0x0, 0x12, '\x00', r23, 0x4, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003ec0)={0x5, 0x6, 0xb8, 0x6}, 0x10, r9, 0xffffffffffffffff, 0x0, &(0x7f0000003f00)=[r21, r19]}, 0x90) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000004000)={r18, r20, 0x0, r17}, 0x10) executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0xfffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x45f8ff3c, 0x0, 0x3}, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES8=r0, @ANYRESOCT=r3, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000009e9b85000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rxrpc_rx_icmp\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='(([)]\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 95.463832][ T28] audit: type=1400 audit(1713626683.416:150): avc: denied { create } for pid=5808 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 95.491601][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.500060][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x6, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000f00)={0x40, 0x0}, 0x8) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001180)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0xfffffff7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x17, 0x1c, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x81}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@alu={0x7, 0x0, 0x3, 0x5, 0x7, 0x8, 0x10}, @exit, @jmp={0x5, 0x0, 0x5, 0x2, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @generic={0x5a, 0x4, 0x8, 0x8, 0x1ff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000d40)='GPL\x00', 0xd5ab, 0xf2, &(0x7f0000000d80)=""/242, 0x41100, 0x68, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000ec0)={0x5, 0x6, 0x80000000, 0x6}, 0x10, r8, r6, 0x3, &(0x7f0000001200)=[r9, r7, r7, r7, r10, r7, r7, r7], &(0x7f0000001580)=[{0x4, 0x3, 0x1, 0xc}, {0x5, 0x5, 0xd, 0x8}, {0x5, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={0xffffffffffffffff, 0x58, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000001780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x6, [@ptr={0x3}, @typedef={0x10, 0x0, 0x0, 0x8, 0xffffffff}, @typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @volatile={0x1, 0x0, 0x0, 0x9, 0x4}, @fwd={0x4}, @var={0x4, 0x0, 0x0, 0xe, 0x5}, @enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x4, 0x5}, {0x3, 0x9}, {0xc, 0x1000}, {0xb, 0x4}, {0xc}, {0xb, 0x1}, {0xf, 0x9}, {0x1}]}]}, {0x0, [0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001280)=""/130, 0xc2, 0x82, 0x1, 0x1}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x60, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001240), &(0x7f0000000400), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x62, &(0x7f0000000200)=""/98, 0x52ec6c01bf592d32, 0x44, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r13, r16, 0x1, r16], 0x0, 0x10, 0x3ebfd31f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x19, 0x0, 0xec1a, 0x401, 0x142db027cc2a43d8, r5, 0x0, '\x00', 0x0, r12, 0x5, 0x2, 0x2}, 0x48) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r18 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0xa, 0xc000, 0x37b0, 0x5c, 0x0, 0xffffffffffffffff, 0xecc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r19 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x28, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000002000000000000005a00000018110000", @ANYRES32=r18, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000184700000400000000000000000000001855000007000000000000000000000005f5550d05000000dd29fcff010000001837000005000000000000000000000018320000020000000000000000000000dd28f8ff1b0000008520000001000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r18, @ANYBLOB="0000000000000000b705000008000000870000002aac355ae883913a00000000b702000001000000850000008a059554b7000000000000f99400000001000000"], &(0x7f0000000040)='GPL\x00', 0x19d, 0x6a, &(0x7f00000009c0)=""/106, 0x41000, 0x8, '\x00', r14, 0x22, r19, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x1, 0x3, 0xfffffff7}, 0x10, r15, r17, 0x5, 0x0, &(0x7f0000000b00)=[{0x3, 0x2, 0xd, 0x3}, {0x4, 0x5, 0x8}, {0x5, 0x4, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x1}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x20000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0xa, 0x7, &(0x7f0000000f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x20000003}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3}]}, &(0x7f00000015c0)='syzkaller\x00', 0x4, 0xc3, &(0x7f0000000fc0)=""/195, 0x40f00, 0x10, '\x00', r11, 0x21, r12, 0x8, &(0x7f0000000f80)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, r15, 0xffffffffffffffff, 0x1, 0x0, &(0x7f00000013c0)=[{0x0, 0x6e4, 0xc, 0x7}], 0x10, 0x100}, 0x90) r20 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0xf, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000700)='GPL\x00', 0x3, 0xfb, &(0x7f0000000740)=""/251, 0x41100, 0x40, '\x00', 0x0, 0x29, r2, 0x8, &(0x7f0000000840)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x1, 0xbfbc}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000008c0)=[r3, r3], 0x0, 0x10, 0xfffffffc}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xb, 0xb, &(0x7f0000000340)=@raw=[@generic={0x4, 0x0, 0x3, 0x3, 0x20}, @map_val={0x18, 0x2}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @jmp={0x5, 0x0, 0x4, 0x0, 0x2, 0x50, 0x8000000000000010}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x92}, @generic={0x66, 0x4, 0x6, 0x0, 0x332}, @cb_func={0x18, 0xc}], &(0x7f00000003c0)='GPL\x00', 0x6, 0xc1, &(0x7f0000000500)=""/193, 0x41100, 0xa, '\x00', 0x0, 0x1d, r4, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, r15, r20, 0x8, &(0x7f00000009c0)=[r3, r7, r3], &(0x7f0000000a00)=[{0x0, 0x1, 0xf, 0x7}, {0x5, 0xfffffffe, 0x5, 0x7}, {0x5, 0x1, 0x3, 0x1}, {0x5, 0x1, 0x8, 0x8}, {0x1, 0x3, 0x3, 0xa}, {0x0, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x2, 0x4}, {0x9132, 0x1, 0x10, 0x4}], 0x10, 0x7}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 95.578898][ T629] device bridge_slave_1 left promiscuous mode [ 95.588192][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.602136][ T629] device bridge_slave_0 left promiscuous mode [ 95.614668][ T629] bridge0: port 1(bridge_slave_0) entered disabled state executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x400, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x6, 0x0, 0x0, 0x11}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000005c0)=""/158, 0x30, 0x9e, 0x1}, 0x20) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) [ 95.630992][ T629] device bridge_slave_1 left promiscuous mode [ 95.644546][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.663074][ T629] device bridge_slave_0 left promiscuous mode [ 95.682049][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.706707][ T629] device veth1_macvtap left promiscuous mode [ 95.725517][ T629] device veth0_vlan left promiscuous mode executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 95.742210][ T629] device veth1_macvtap left promiscuous mode [ 95.760974][ T629] device veth0_vlan left promiscuous mode executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0xfffffffc, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x45f8ff3c, 0x0, 0x3}, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYRES64=r1, @ANYRES32=r1, @ANYRES8=r0, @ANYRESOCT=r3, @ANYRES8=r0, @ANYRES32=0x0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000009e9b85000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rxrpc_rx_icmp\x00', r4}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x6, 0x4, 0x0, 0x1}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000f00)={0x40, 0x0}, 0x8) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001180)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0xfffffff7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x2}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x17, 0x1c, &(0x7f0000000c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x81}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@alu={0x7, 0x0, 0x3, 0x5, 0x7, 0x8, 0x10}, @exit, @jmp={0x5, 0x0, 0x5, 0x2, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @generic={0x5a, 0x4, 0x8, 0x8, 0x1ff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x20}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000d40)='GPL\x00', 0xd5ab, 0xf2, &(0x7f0000000d80)=""/242, 0x41100, 0x68, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000ec0)={0x5, 0x6, 0x80000000, 0x6}, 0x10, r8, r6, 0x3, &(0x7f0000001200)=[r9, r7, r7, r7, r10, r7, r7, r7], &(0x7f0000001580)=[{0x4, 0x3, 0x1, 0xc}, {0x5, 0x5, 0xd, 0x8}, {0x5, 0x5, 0x0, 0x2}], 0x10, 0x3}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={0xffffffffffffffff, 0x58, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000001780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x6, [@ptr={0x3}, @typedef={0x10, 0x0, 0x0, 0x8, 0xffffffff}, @typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @func={0x5, 0x0, 0x0, 0xc, 0x1}, @volatile={0x1, 0x0, 0x0, 0x9, 0x4}, @fwd={0x4}, @var={0x4, 0x0, 0x0, 0xe, 0x5}, @enum={0x3, 0x8, 0x0, 0x6, 0x4, [{0x4, 0x5}, {0x3, 0x9}, {0xc, 0x1000}, {0xb, 0x4}, {0xc}, {0xb, 0x1}, {0xf, 0x9}, {0x1}]}]}, {0x0, [0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000001280)=""/130, 0xc2, 0x82, 0x1, 0x1}, 0x20) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x60, 0x6, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x94, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001240), &(0x7f0000000400), 0x8, 0x6a, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%pS \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='syzkaller\x00', 0xffffffff, 0x62, &(0x7f0000000200)=""/98, 0x52ec6c01bf592d32, 0x44, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[r13, r16, 0x1, r16], 0x0, 0x10, 0x3ebfd31f}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x19, 0x0, 0xec1a, 0x401, 0x142db027cc2a43d8, r5, 0x0, '\x00', 0x0, r12, 0x5, 0x2, 0x2}, 0x48) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r18 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0xa, 0xc000, 0x37b0, 0x5c, 0x0, 0xffffffffffffffff, 0xecc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) r19 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x28, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000002000000000000005a00000018110000", @ANYRES32=r18, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000184700000400000000000000000000001855000007000000000000000000000005f5550d05000000dd29fcff010000001837000005000000000000000000000018320000020000000000000000000000dd28f8ff1b0000008520000001000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r18, @ANYBLOB="0000000000000000b705000008000000870000002aac355ae883913a00000000b702000001000000850000008a059554b7000000000000f99400000001000000"], &(0x7f0000000040)='GPL\x00', 0x19d, 0x6a, &(0x7f00000009c0)=""/106, 0x41000, 0x8, '\x00', r14, 0x22, r19, 0x8, &(0x7f0000000a80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000ac0)={0x4, 0x1, 0x3, 0xfffffff7}, 0x10, r15, r17, 0x5, 0x0, &(0x7f0000000b00)=[{0x3, 0x2, 0xd, 0x3}, {0x4, 0x5, 0x8}, {0x5, 0x4, 0xa, 0xb}, {0x5, 0x2, 0xa, 0x1}, {0x2, 0x4, 0xa, 0x1}], 0x10, 0x20000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0xa, 0x7, &(0x7f0000000f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fffffff}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x20000003}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x3}]}, &(0x7f00000015c0)='syzkaller\x00', 0x4, 0xc3, &(0x7f0000000fc0)=""/195, 0x40f00, 0x10, '\x00', r11, 0x21, r12, 0x8, &(0x7f0000000f80)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, r15, 0xffffffffffffffff, 0x1, 0x0, &(0x7f00000013c0)=[{0x0, 0x6e4, 0xc, 0x7}], 0x10, 0x100}, 0x90) r20 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x3, 0xf, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000700)='GPL\x00', 0x3, 0xfb, &(0x7f0000000740)=""/251, 0x41100, 0x40, '\x00', 0x0, 0x29, r2, 0x8, &(0x7f0000000840)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x1, 0xbfbc}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000008c0)=[r3, r3], 0x0, 0x10, 0xfffffffc}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xb, 0xb, &(0x7f0000000340)=@raw=[@generic={0x4, 0x0, 0x3, 0x3, 0x20}, @map_val={0x18, 0x2}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @jmp={0x5, 0x0, 0x4, 0x0, 0x2, 0x50, 0x8000000000000010}, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x92}, @generic={0x66, 0x4, 0x6, 0x0, 0x332}, @cb_func={0x18, 0xc}], &(0x7f00000003c0)='GPL\x00', 0x6, 0xc1, &(0x7f0000000500)=""/193, 0x41100, 0xa, '\x00', 0x0, 0x1d, r4, 0x8, &(0x7f0000000640)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, r15, r20, 0x8, &(0x7f00000009c0)=[r3, r7, r3], &(0x7f0000000a00)=[{0x0, 0x1, 0xf, 0x7}, {0x5, 0xfffffffe, 0x5, 0x7}, {0x5, 0x1, 0x3, 0x1}, {0x5, 0x1, 0x8, 0x8}, {0x1, 0x3, 0x3, 0xa}, {0x0, 0x4, 0x9, 0x6}, {0x2, 0x3, 0x2, 0x4}, {0x9132, 0x1, 0x10, 0x4}], 0x10, 0x7}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='ext4_es_remove_extent\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000ac900000000003b81fee8850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='ext4_da_release_space\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000240), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES64=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='rss_stat\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x86, &(0x7f0000002600)}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000007112070000000000950000000000000175eef0892e5064f8d8dc4ae02b7d1fccd9cf9b56374b2cae8a824949e6285bac6b374ca22f0624146c2c4055ada53ec40036f84ead45e4bc4a3730fbd93b19f4905868f7dbb6eba740cc2220ecaa59afab5ecc8cf945dbaa32b7b0749701decec8ab01119a9dc55a49d802e6ec016ddf6ebf3374cf132eb3c7cbb108b6a42160c851cfad479050f3f725c5d75c400ce4bcb7bc8522240c5c5df107bf7525cc6d05301c6b9b91fb2503dbd2"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000400)=@framed={{}, [@call]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x5451, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='ext4_es_remove_extent\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x400, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x6, 0x0, 0x0, 0x11}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f00000005c0)=""/158, 0x30, 0x9e, 0x1}, 0x20) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000990000000042001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000001980)=ANY=[@ANYBLOB="18000000002782f2b1153d9d69e99d430981000000000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[], &(0x7f0000000600)='GPL\x00', 0xfffff826, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x3, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r6, 0x400454c9, 0x3) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r7}, 0x10) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008006b00b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000001000000000000003b810000850000007b000000850000000800000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'macvlan1\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {0x3d, 0x20}, {0x6}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='ext4_es_remove_extent\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000ac900000000003b81fee8850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='ext4_da_release_space\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000240), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRES64=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='rss_stat\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x86, &(0x7f0000002600)}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000007112070000000000950000000000000175eef0892e5064f8d8dc4ae02b7d1fccd9cf9b56374b2cae8a824949e6285bac6b374ca22f0624146c2c4055ada53ec40036f84ead45e4bc4a3730fbd93b19f4905868f7dbb6eba740cc2220ecaa59afab5ecc8cf945dbaa32b7b0749701decec8ab01119a9dc55a49d802e6ec016ddf6ebf3374cf132eb3c7cbb108b6a42160c851cfad479050f3f725c5d75c400ce4bcb7bc8522240c5c5df107bf7525cc6d05301c6b9b91fb2503dbd2"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000400)=@framed={{}, [@call]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x5451, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='ext4_es_remove_extent\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000990000000042001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000001980)=ANY=[@ANYBLOB="18000000002782f2b1153d9d69e99d430981000000000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[], &(0x7f0000000600)='GPL\x00', 0xfffff826, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x3, &(0x7f0000000080)={&(0x7f0000000040)='ext4_es_lookup_extent_exit\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r6, 0x400454c9, 0x3) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc028660f, &(0x7f00000005c0)=0x400000001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r7}, 0x10) executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x2d, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008006b00b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000001000000000000003b810000850000007b000000850000000800000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='ext4_es_insert_delayed_block\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'macvlan1\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {0x3d, 0x20}, {0x6}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x2000) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x63000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="bc00000000000000790300000000000063000000000000009500050000002235"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x23) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0xfffff5ab, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r8, 0x5}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1c, 0x4, 0x8, 0x8, 0x120, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffc}, 0x48) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1a, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @map_val={0x18, 0x2, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0xb}, @map_idx_val={0x18, 0xe, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xfffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @exit]}, &(0x7f00000001c0)='GPL\x00', 0x800, 0x1, &(0x7f0000000780)=""/1, 0x40f00, 0x20, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x20001, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xe, 0x3f, 0x10000}, 0x10, 0x0, r10, 0x4, &(0x7f0000000880)=[r4, r9, r9, r11, r4], &(0x7f00000008c0)=[{0x0, 0x5, 0x3}, {0x4, 0x2, 0x7, 0x5}, {0x9, 0x5, 0xb, 0x7}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x401}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r13 = gettid() perf_event_open(0x0, r13, 0xbfffffffffffffff, 0xffffffffffffffff, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000001e00000000000004180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000cff2758545b4252ae0ae12acca4e190000000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x44) executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_journal_start\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xa60a, 0x3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095000000000000003f9fa24a03eb8d140d0dd303281b70c9cf48ea880c5ea4fe15ffc4"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000010000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x4000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r3}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x7, 0x10}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b80)={r0, 0xe0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000900)=[0x0], &(0x7f0000000940)=[0x0, 0x0], 0x0, 0x6e, &(0x7f0000000980)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000009c0), &(0x7f0000000a00), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000a40)}}, 0x10) r6 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000bc0)='io.pressure\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0xe, 0xe, &(0x7f0000000700)=@raw=[@ldst={0x3, 0x3, 0x3, 0xa, 0x1, 0xfffffffffffffffc, 0x1}, @ldst={0x0, 0x0, 0x0, 0x9, 0x3, 0x4, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_fd={0x18, 0x6, 0x1, 0x0, r4}, @ldst={0x2, 0x3, 0x1, 0x0, 0x3, 0xffffffffffffffff, 0xffffffffffffffff}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xdbbe0}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x3f}], &(0x7f0000000780)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x50, '\x00', r5, 0xcbe98d1e609c4143, r6, 0x8, &(0x7f0000000c00)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x7, 0x0, &(0x7f0000000c40)=[{0x0, 0x2, 0x6, 0xa}, {0x2, 0x5, 0x1, 0xb}, {0x0, 0x2, 0xf, 0x5}, {0x5, 0x3, 0x2, 0x1}, {0x2, 0x1, 0xa, 0xc}, {0x4, 0x4, 0x10, 0xc}, {0x4, 0x4, 0x10, 0xb}], 0x10, 0x6}, 0x90) socketpair(0x0, 0x0, 0x0, &(0x7f0000004080)) socketpair(0x2b, 0x2, 0x8, &(0x7f0000001780)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000440)='GPL\x00', 0x4, 0x99, &(0x7f0000000480)=""/153}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r7, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x6, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, @exit, @exit, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}], &(0x7f0000000040)='GPL\x00', 0xffffffff, 0x1c, &(0x7f00000001c0)=""/28, 0x41000, 0x0, '\x00', r8, 0x0, r9, 0x8, &(0x7f00000006c0)={0x4}, 0x8}, 0x90) sendmsg(0xffffffffffffffff, 0x0, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/uts\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x40049409, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x0, 0x0, 0x0, 0x11}]}}, 0x0, 0x2a}, 0x20) executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x20, 0xca2, 0x2a8e, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x4, 0x3, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000107000000000000000026001811000057d4937c0ba5163953a32bf856bfecfcc3287ed8a8d8e2ef080ef59c13a1c83ed2d7184f58ee6e3993ba51029b69b930b09ddc1139033e2c531b6c64f9090f8ae6f1855d9e257f3214589b4bc150539f7f04780ba91da14e1b98dd95df84e9", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000f475927a3c89bb5a61b757b5755a8cd108bfa2000000000000b704000000000000850000000100fc009500"/65], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree_skb\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x252eb85fd067a863, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='ext4_begin_ordered_truncate\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x0, 0x20000005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18010000000000000000000000000000851000000600000018100000", @ANYRES32=r7, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000a60a00000000000018000000202078250000000000202020db05f8ff00000000bf510000000000000701000000feffffb702000008000000b703000000000000850000002d0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xde, &(0x7f0000000340)=""/222}, 0x23) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x13, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 96.444160][ T5843] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.451221][ T5843] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.458764][ T5843] device bridge_slave_0 entered promiscuous mode [ 96.477550][ T5843] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.484543][ T5843] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.491890][ T5843] device bridge_slave_1 entered promiscuous mode [ 96.534588][ T5848] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.541459][ T5848] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.548589][ T5848] device bridge_slave_0 entered promiscuous mode [ 96.556378][ T5848] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.563365][ T5848] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.570913][ T5848] device bridge_slave_1 entered promiscuous mode executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008007000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 96.611354][ T5844] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.618461][ T5844] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.625681][ T5844] device bridge_slave_0 entered promiscuous mode [ 96.644002][ T5844] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.650901][ T5844] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01001800000000034e54dca235646afe187a8e70ef4d000000400000003c000000050000000400000000000007000000000d0000000000000c040000001000000000000007000000000000000000000003000000000400069e257574d44c301c5e66913f391ec336fc7dfff917"], &(0x7f00000001c0)=""/70, 0x59, 0x46, 0x0, 0xff}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16, 0x0, 0x0, 0x55}, 0xc7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0x1, 0x0, r3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r4, &(0x7f0000000d40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xa0b7) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='tegra_dma_isr\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) unlink(&(0x7f0000000140)='./cgroup\x00') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0xd6, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000012c0)={0x0, 0x0, &(0x7f00000011c0), &(0x7f0000001200), 0x80000000, r7}, 0x38) [ 96.658158][ T5844] device bridge_slave_1 entered promiscuous mode [ 96.709125][ T5845] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.715964][ T5845] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.723617][ T5845] device bridge_slave_0 entered promiscuous mode [ 96.750747][ T5845] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.760204][ T5845] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.767765][ T5845] device bridge_slave_1 entered promiscuous mode [ 96.849539][ T5843] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.856624][ T5843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.863783][ T5843] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.870599][ T5843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.921798][ T5848] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.928651][ T5848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.935722][ T5848] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.942537][ T5848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.988283][ T5844] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.995111][ T5844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.002233][ T5844] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.009020][ T5844] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000ddffffff850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3}, 0x80) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x2e, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xe9b8}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000280)='GPL\x00', 0x1, 0x1e, &(0x7f0000000640)=""/30, 0x41000, 0xcf52fc4e4659a19b, '\x00', 0x0, 0x2, r2, 0x8, &(0x7f00000009c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000a00)={0x2, 0xe, 0x1, 0x6}, 0x10, r3, 0xffffffffffffffff, 0x3, &(0x7f0000000a80)=[r4, 0xffffffffffffffff], &(0x7f0000000ac0)=[{0x0, 0x2, 0x4, 0x6}, {0x3, 0x2, 0x9, 0xa}, {0x5, 0x1, 0x8, 0xb}], 0x10, 0x6d}, 0x90) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0x197, 0x6, 0x218c, 0xffffffffffffffff, 0xe17, '\x00', r6, r5, 0x1, 0x1, 0x5, 0x9}, 0x48) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', r6, r7, 0x3, 0x3, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x2, 0x8, 0xd0eb}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='ext4_drop_inode\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r10}, 0x9) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='ext4_ext_handle_unwritten_extents\x00', r12}, 0x9) ioctl$SIOCSIFHWADDR(r11, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) unlink(&(0x7f0000000140)='./cgroup\x00') [ 97.055483][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.062919][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.069949][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.078986][ T19] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.086167][ T19] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.094076][ T19] bridge0: port 1(bridge_slave_0) entered disabled state executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() write$cgroup_pid(r2, &(0x7f0000000380)=r3, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x840f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0x3402, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x2, 0x0, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="18001100000000000000000000000000950000000000003fb93905987f5f00"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0xc, &(0x7f00000000c0), 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="18060000000000abacb5a58e4a70ec97820f0000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7030000000000008500000019000000b70000000000000095000000"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r6, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000400000000000000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000087010000f8ffffffb702000008000000b703000000000000850000002d000000950020000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000400)={0x0, 0x3, [@link_local, @broadcast, @empty]}) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xe, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00fe0000000071104900000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0xc, &(0x7f0000000040)=@framed={{}, [@printk={@li}, @call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f0000000200)='GPL\x00', 0x7, 0x1009, &(0x7f00000026c0)=""/4105}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001500)={r8, 0x0, 0xe, 0x96, &(0x7f0000001580)="7bff3d3123384c5e301d61177732b6b7f4da65440eb316591fc72da6ee754701abed46fca8cdbbbbd2bbcefcce31a2dab5be6f0117fa8de646ead59773d0717f599ba017b6f19f483161bce4b283cedb85fcd15a914bc740c5134a1651d6c5850a9afcd1b07b31f10eeea611b60be2d8506811c95e2b2d125900e839578248f635da1eb931dfacf78ace469fdba5f757c27ebf7cc1d063e5cc8a3a85783ef06e0c0004c6e90faa8e215bfec5d8e5f928966106e5e5995deac7f87e05e7d344ce428354a2034e443d6ef2ab961343623e614d4bf9df", &(0x7f0000001440)=""/150, 0x0, 0x0, 0x79, 0x3, &(0x7f0000000180)="edc731f46e2fade7b621e460c7575533ca75f3940e7d2f0e8048b9bec2db1e5aec2ea44ad0f15d22991608bbfe092e1cebb77130ddb70b0acbed37c71830599fe344e591abd5f72778eb42d0f6ea69240f4cd429d2fa74797092b12742a1a003527b90181a0dd4ea34b9cd80b1ed26afad4d51a98f2d5904a1", &(0x7f0000001240)="0da951", 0x0, 0x9}, 0x28) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000380)={&(0x7f0000000300)=""/59, 0x3b, 0x0, &(0x7f0000000540)=""/111, 0x6f}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000b40)=ANY=[@ANYBLOB="18000000000000000000000000000000181100004393d45169342882f9076bc2e669ef51e8cc55c1ccd325b3ebfdeaed0c7b3d0d2d9ca0b7bcb8a40eeb14b3885e102daabbb517d9418058a456784dcdc0232758c9e418d1be0c47667bd35cf566d2e148fe5179be26f6b30af0319bee0719789a6a45fc4a9acddb5b29c6fb0056cb6160f08820ef5e0c369086902849774a916541394a8c900b", @ANYRESHEX=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_ext_remove_space_done\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) [ 97.101199][ T19] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x5, 0x7fe2, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x24bdb) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='ext4_es_lookup_extent_enter\x00', r5}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) [ 97.155717][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.167933][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.175506][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.183470][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.190300][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.197581][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.205461][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.212329][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.230818][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.238961][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.245795][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) socketpair(0x28, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc\aj\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc\aj\xfef;q1\xff\xd3r\xa3\xc81U\x8ez.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcd\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r5, @ANYBLOB], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) sendmsg$inet(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000000)="61c771300e1d2b81814c5501c424c0cb06010cadcfb7d0e6547a5d0721e78e8b75369199ddc118be57a348cdd6e3abb317b2342d7819f528", 0x38}, {&(0x7f0000000280)="534959a5bedfb6bb2b6ccc897117a8693f95714dad468a4e12e998dbd6cff5013832dea9bf78e81ca846fab0aadf0ec0ff2199784f366865786aab7e7e8992462adec89e4cbbdbe0b7040607ac593be2dd67b68eaf8cbf64a8de6cf992b283d118382fb18da8a7f37e135ad0ddf64ab07a08e8c0a8831efd38d92f572455ad24ca450e0e299cf484586db836cd4b33acbf7fad733d35341886840473ddcb7e3a8c154bf088a774015d67b368d66d73", 0xaf}, {&(0x7f0000000040)="51994ab58e1ae3", 0x7}, {&(0x7f0000000340)="9c142894185012d9a4d70b0764bd21696b4b4c270d0c25ca803cf9ad80aee95f810f5ca3d90467cd912eae978f10b399a9fa037b74645b7334481f9cd4670ebde7e33d6fc8bf5560efb3ad8ce6d16f2948f3", 0x52}, {&(0x7f0000000540)="5b665b33accd3f3c3613df7b11b6997dbcd698e72f0bbd01aaacf92df3a2b196480188811c9401dfe56095908f272ee1ba3e671dc0eb929470aa7977227464574662d240463c56024912b26610e8fa53d4a14c6a67b487157e740ffa76351fbdc3c1e3ea78f0d9098b69ad778cc6aa438c757fa1cb5ae96759828b36b0e148513bcdd420239f22b3b2e1b8764aeb0df66366a9ea11fe674db5709b243ad8a1c3fb56ad665b69798b7c96faded8e2527e1cf5d35e65894e0074a8fb9e5b05c5d82831c483a17b423966e3eeff7e5eedac1b22bc790ff7a407a1b76b6ab98e3684260b627206d98fe50ad7c3866b7f1e34e594", 0xf2}, {&(0x7f0000000640)="cc09ac28382c9c232fd51ba197f764abfc2a98d548932fbcca0f00df5e9ebdfa1efe4d5a629460c866b75ea27ca19ee83cb88db87a934ea850aad27dd68dfdb8ae2edfa0fd1fed34d7f505c566f27ed0f4180aae65d2c590d2c7adb0eb20b1f70267c2ced284ca0f7a2790c4224e93f5b5c671ae5a4bdef0786e519c6c805bd2959820033c148d864cc5ccdc05c5b50930d25412d70115c9f60b2719d9198ffc035726baba8d11b22dc874adf21535aa75a645b9ae034ea70cf1daf3ace4560e4ee88de64c73f028895d5a66dc9e577c63c12730cbcc504b7fd00ae6365a617726d4b0f19db03a322a1d6c598e5ff2ad287e290c159437e9f3", 0xf9}, {&(0x7f0000000740)="179309e70737f69973ad30fa71d825867fde4b1014b00de97ad440c5b748252d7b3bcf70b261e7ba3fb3de7ce3d81b26aadedbb7a79eac36b9e3a4bd6b40bcc6700ecf4c80ccc94152248e5124c50f2ef00ad61d548295ed5ee4032ba3a0b45a2555a62c5ddbea7ad7aec6cf9dc422140c1fcd7f363e9dd6ae4e9680a9f8e4665d0a7e9eb3b7711da7883e81a10fb65324ee9df0d4747e8199cda3b4b52e800b432285a09cc443fe8c4e238a2e4e5289eb1a5fcb5206a0396c219efaac809d16f95d7cea318b25b9c8a97a83c6cab4", 0xcf}, {&(0x7f0000000840)="5c47e75873f794c4ffb6d3cce9d0e67d69b166ca1baabc027c3194d10bd7bb567d0099d98791aa13fb25402181d2037970f01575339aa739cf108ab716a27d7dee736092b48c935186134cf0f41b59dd44d45e1425b5e41830468a907056f2fedd4ab3ebc7cba93e313d6a90f33ee323eed35caf4063a2249c32f4ef66c728e214a9dc65d6a104d9900d6f59aba3c37303a32601aace1a", 0x97}, {&(0x7f00000003c0)="00be414c528900a257f5b1320e076a91de9da480b2ca1aec7d8498006a0f17fd38079a6107fbf3ba57406fecb0f5318f2b74", 0x32}], 0x9, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0xff}}], 0x18}, 0x20000000) perf_event_open(&(0x7f0000000bc0)={0x1, 0x80, 0x4, 0x9, 0x1f, 0x67, 0x0, 0x8000, 0x10020, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x1f}, 0x404, 0x7, 0x6af, 0x7, 0x6, 0x6eb0, 0x7, 0x0, 0x8, 0x0, 0x9}, 0x0, 0x8, r3, 0x9) (async) r10 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x80, 0x4, 0x9, 0x1f, 0x67, 0x0, 0x8000, 0x10020, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x1f}, 0x404, 0x7, 0x6af, 0x7, 0x6, 0x6eb0, 0x7, 0x0, 0x8, 0x0, 0x9}, 0x0, 0x8, r3, 0x9) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x21, 0x1, 0x3f, 0x5, 0x0, 0x5, 0x26118, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x4, @perf_bp={&(0x7f0000000b00), 0xd}, 0x21, 0x1, 0xff, 0x0, 0x4, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x680}, 0xffffffffffffffff, 0xa, r10, 0x8) (async) perf_event_open(&(0x7f0000000b40)={0x4, 0x80, 0x21, 0x1, 0x3f, 0x5, 0x0, 0x5, 0x26118, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x4, @perf_bp={&(0x7f0000000b00), 0xd}, 0x21, 0x1, 0xff, 0x0, 0x4, 0x2, 0x1000, 0x0, 0x0, 0x0, 0x680}, 0xffffffffffffffff, 0xa, r10, 0x8) [ 97.253016][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.260546][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.268470][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.275283][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.282736][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.290833][ T357] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.297700][ T357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.304850][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.312790][ T357] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.319630][ T357] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.326951][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 97.369657][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.377956][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.399903][ T357] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.430120][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.438325][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.446013][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.453271][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.460544][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.468324][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.476006][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.484053][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 97.491970][ T601] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.498797][ T601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.506015][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.514057][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.521973][ T601] bridge0: port 2(bridge_slave_1) entered blocking state executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f00000000c0)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0x10}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, '\x00', 0x0, 0x4}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x200004, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140), 0x0, 0xffffffff, r0}, 0x38) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) [ 97.528806][ T601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.542728][ T5843] device veth0_vlan entered promiscuous mode [ 97.559280][ T5844] device veth0_vlan entered promiscuous mode executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pressure(r1, &(0x7f0000000280)={'some'}, 0x2f) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x5, [@union={0xb, 0x5, 0x0, 0x5, 0x0, 0x8, [{0x3, 0x3, 0xfff}, {0x2, 0x3, 0x81}, {0x10, 0x3, 0xfff}, {0x1, 0x5, 0xc7}, {0x5, 0x2, 0x6}]}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x1, [{0x2, 0x2, 0x6}]}]}, {0x0, [0x30, 0x5f, 0x2e]}}, &(0x7f00000003c0)=""/250, 0x7d, 0xfa, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x7, 0xc0, 0x0, 0x10001, 0x2040, r0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0], 0x0, 0x9b, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0xb9, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f00000005c0)=0x7fffffffffffffff) [ 97.574229][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.582382][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.590584][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.599199][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.606981][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.614867][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.623293][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.631451][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.639155][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.647180][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.654367][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.657092][ T5890] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 4294967295 (only 8 groups) [ 97.661645][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008007200b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 97.679691][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.692095][ T5843] device veth1_macvtap entered promiscuous mode [ 97.713483][ T5848] device veth0_vlan entered promiscuous mode [ 97.721177][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r1, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='jbd2_update_log_tail\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r4}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x4004662b, 0x20001412) write$cgroup_type(r0, &(0x7f0000000000), 0x9) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000002400000024000000060000000000000001000004000000000300000002000000000000000000000000000005000004000000005f"], &(0x7f0000000280)=""/265, 0x42, 0x109, 0x1}, 0x20) [ 97.732816][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.740775][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.749674][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 97.760772][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.768941][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x8000, 0x8000, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{r2, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f0000000040)='%pS \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r2}, &(0x7f0000000800), &(0x7f0000000980)='%-010d \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x18, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000080007b8af8ff00000000b7080000800000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x70355f8b) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) [ 97.776933][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.784714][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.793410][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.801756][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.809520][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{r4, 0xffffffffffffffff}, &(0x7f0000000480), &(0x7f0000000040)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r5}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x800, 0xff, &(0x7f00000002c0)=""/255, 0x40f00, 0x30, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000200)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x9, 0xff}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[r1, r0, r0, r1, r1, r0, r5], &(0x7f00000004c0)=[{0x10000, 0x5, 0x10, 0x8}, {0x2, 0x5, 0xe, 0xb}, {0x5, 0x5, 0x3, 0xb}, {0x2, 0x2, 0x5, 0x4}], 0x10, 0xf5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='block_split\x00', r2}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) [ 97.847978][ T5844] device veth1_macvtap entered promiscuous mode [ 97.858395][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.865680][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.874409][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.883050][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="4e0a0000ffff000000000000000000230542148b4716db7415665734cd376651a9bf4745b8204e89ec03ab00aeeaef9318dc2eee8d20a300846776a01bdaabc4b398f0e0b0e2c18b7dac741c1d44d6e7eab0f00896b3100f272bc33c1c5bbe3193798c1ce08cb7a88a090630d2ed9550beffc0aeac25fac1e3978dea4d402600efe06b4c810e125d5c4f6eb91b472558b205353b745f58fde5cb6a6cde6ae1d77ee07fc7f700000000000000749875c0da98103b01980bcad0e601f80b6468b10c044e5b38051298088ea2a2", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000800000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x20827000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='jbd2_handle_stats\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) [ 97.891888][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.900046][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.908283][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.916233][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.924268][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.931765][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.939957][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.949243][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.957016][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.983690][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.991059][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x2d, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_journal_start\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xa60a, 0x3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="bc00000000000000790300000000000063000000000000009500050000002235"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x23) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0xfffff5ab, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r8, 0x5}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x1c, 0x4, 0x8, 0x8, 0x120, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0xfffffffc}, 0x48) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x1a, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @map_val={0x18, 0x2, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0xb}, @map_idx_val={0x18, 0xe, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xfffffffb}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @exit]}, &(0x7f00000001c0)='GPL\x00', 0x800, 0x1, &(0x7f0000000780)=""/1, 0x40f00, 0x20, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x20001, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0xe, 0x3f, 0x10000}, 0x10, 0x0, r10, 0x4, &(0x7f0000000880)=[r4, r9, r9, r11, r4], &(0x7f00000008c0)=[{0x0, 0x5, 0x3}, {0x4, 0x2, 0x7, 0x5}, {0x9, 0x5, 0xb, 0x7}, {0x5, 0x1, 0xd, 0xa}], 0x10, 0x401}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r12}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r13 = gettid() perf_event_open(0x0, r13, 0xbfffffffffffffff, 0xffffffffffffffff, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000001e00000000000004180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000cff2758545b4252ae0ae12acca4e190000000085000000060000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x44) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x63000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1895000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000500)={'lo\x00', @link_local}) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8990, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1502"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) ioctl$TUNSETOFFLOAD(r9, 0x4010744d, 0x20000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r7}, &(0x7f0000000a00), &(0x7f0000000a40)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r7}, &(0x7f0000000880), &(0x7f00000008c0)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000140)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5a, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x5}, 0x10, 0xffffffffffffffff}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r10}, 0x10) [ 98.142994][ T629] device bridge_slave_1 left promiscuous mode [ 98.153451][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.179180][ T629] device bridge_slave_0 left promiscuous mode [ 98.197224][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.220770][ T629] device bridge_slave_1 left promiscuous mode [ 98.240750][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.263080][ T629] device bridge_slave_0 left promiscuous mode [ 98.281400][ T629] bridge0: port 1(bridge_slave_0) entered disabled state executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1895000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000500)={'lo\x00', @link_local}) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8990, &(0x7f0000000000)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x00 \'Y\x17]\x15c\xcaR\xdd\x98OGK\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf1\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1502"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) ioctl$TUNSETOFFLOAD(r9, 0x4010744d, 0x20000000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r7}, &(0x7f0000000a00), &(0x7f0000000a40)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r7}, &(0x7f0000000880), &(0x7f00000008c0)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000140)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5a, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x5}, 0x10, 0xffffffffffffffff}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r10}, 0x10) executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x2d, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) [ 98.309813][ T629] device bridge_slave_1 left promiscuous mode [ 98.324434][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.346668][ T629] device bridge_slave_0 left promiscuous mode executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r0], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_journal_start\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0xa60a, 0x3}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r10, 0x0, &(0x7f0000001700)=""/53}, 0x20) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x63000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 98.366263][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.391118][ T629] device bridge_slave_1 left promiscuous mode executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0xf5848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000300)='hrtimer_init\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000016c0)={'pimreg0\x00', 0x41}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x9, [@restrict={0x7, 0x0, 0x0, 0xb, 0x2}, @fwd={0x2}, @typedef={0x10, 0x0, 0x0, 0x8, 0x2}, @enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0xe, 0x3}, {0x8, 0x3f}, {0x7, 0x6}]}, @union={0x1, 0x7, 0x0, 0x5, 0x0, 0x9, [{0x0, 0x4, 0x9}, {0x10, 0x5, 0x6}, {0x9, 0x5, 0x65}, {0xb, 0x0, 0x8}, {0xa, 0x3, 0x7ff8}, {0xc, 0x5, 0x4}, {0x1, 0x0, 0x200}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x1}]}]}, {0x0, [0x30, 0x30, 0x30, 0x30, 0x2e, 0x5f, 0x5f]}}, &(0x7f0000000680)=""/161, 0xdd, 0xa1, 0x1, 0x3f}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x51, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r11, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) close(r1) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r13}, 0x10) [ 98.421331][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.454185][ T629] device bridge_slave_0 left promiscuous mode executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="000000010000000002000000000000007b8af8ff000000009da200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000ac0)='jbd2_handle_extend\x00', r2}, 0xfffffeb7) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1846000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000c9000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000d00)=""/156, 0x147, 0x9c, 0x0, 0x401}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x8001, 0x0, 0x7fff, 0x1280, r8, 0x8, '\x00', r10, r11, 0x3, 0x3, 0x4, 0x8}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r9, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0], 0x0, 0xc5, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x46, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000fc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x63, 0x5, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0x1, [{0xe, 0x3, 0x2}, {0xa, 0x2, 0x80000001}, {0x6, 0x1}, {0x1, 0xc7, 0xffffffff}]}, @typedef={0xc}, @datasec={0x9, 0x0, 0x0, 0xf, 0x3, [], "f36261"}, @const={0x5, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x61, 0x61, 0x6f]}}, &(0x7f0000000800)=""/199, 0x81, 0xc7, 0xfffffffc, 0x5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x6, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x7, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa}]}, &(0x7f0000000400)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x50, '\x00', r12, 0x0, r13, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x5, 0x2, 0x10000, 0x400}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000980)=[{0x1, 0x5, 0x1, 0x2}, {0x1, 0x4, 0xc, 0x6}, {0x0, 0x3, 0x2, 0x9}, {0x2, 0x5, 0x9, 0x5}, {0x0, 0x3, 0xc, 0x3}, {0x5, 0x1, 0x7, 0x2}, {0x5, 0x1, 0x2, 0xb}], 0x10, 0x401}, 0x90) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000540)={&(0x7f0000000780)=""/64, 0x40, 0x0, &(0x7f0000000680)=""/39, 0x27}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000002280)=ANY=[@ANYBLOB="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"/2634], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, r15, 0xffffffffffffffff, 0x38}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r15}, 0x80) r16 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000b00)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r16, &(0x7f0000000b40)=0xdc9, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000e00)=0x2400000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r1}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="850000004f0000002c15c3077da6c8d4ad8a3d9ac70180563dcc2eed1303a568f3d49914e528e6b1287ff72abf81dc9834a4c129c84cd2c4bc8a8d229849a2e7f0c8a4ebdde3baa1e81d18cb5cc01771ea5c974ef08dd38f0c56e8e55e688e60bdd4281e70ff380832f01cf4aacea3cb7a7a17f7b4c460c7fd5b0516d5af1ea628b1006f7fd2", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000710d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018000000010000000000000001000000184f00"/96], &(0x7f0000000040)='GPL\x00', 0x200, 0x8, &(0x7f0000000080)=""/8, 0x40f00, 0x5d, '\x00', r12, 0x37, r14, 0x8, &(0x7f0000000f80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x8000}, 0x10, r15, r2, 0x8, &(0x7f0000000300), &(0x7f0000000340)=[{0x4, 0x3, 0x4, 0xb}, {0x0, 0x3, 0x2}, {0x1, 0x3, 0x5, 0x4}, {0x1, 0x5, 0xfffffffe, 0x9}, {0x2, 0x5, 0xc, 0xa}, {0x4, 0x5, 0xe, 0x8}, {0x4, 0x5, 0x6, 0xb}, {0x0, 0x3, 0x5}]}, 0x90) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) [ 98.473525][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.488629][ T629] device veth1_macvtap left promiscuous mode [ 98.501043][ T629] device veth0_vlan left promiscuous mode [ 98.515410][ T629] device veth1_macvtap left promiscuous mode [ 98.525726][ T629] device veth0_vlan left promiscuous mode [ 98.538980][ T629] device veth1_macvtap left promiscuous mode [ 98.549225][ T629] device veth0_vlan left promiscuous mode [ 98.562433][ T629] device veth1_macvtap left promiscuous mode [ 98.578052][ T629] device veth0_vlan left promiscuous mode executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0xf5848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="000000010000000002000000000000007b8af8ff000000009da200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000ac0)='jbd2_handle_extend\x00', r2}, 0xfffffeb7) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f00000000c0), 0x12) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1f, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1846000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000c9000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000140)=[{}, {}], 0x10, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000d00)=""/156, 0x147, 0x9c, 0x0, 0x401}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x8001, 0x0, 0x7fff, 0x1280, r8, 0x8, '\x00', r10, r11, 0x3, 0x3, 0x4, 0x8}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r9, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0], 0x0, 0xc5, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x46, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000fc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x63, 0x5, [@union={0xb, 0x4, 0x0, 0x5, 0x0, 0x1, [{0xe, 0x3, 0x2}, {0xa, 0x2, 0x80000001}, {0x6, 0x1}, {0x1, 0xc7, 0xffffffff}]}, @typedef={0xc}, @datasec={0x9, 0x0, 0x0, 0xf, 0x3, [], "f36261"}, @const={0x5, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x61, 0x61, 0x6f]}}, &(0x7f0000000800)=""/199, 0x81, 0xc7, 0xfffffffc, 0x5}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x6, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x81}, [@map_val={0x18, 0x7, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xa}]}, &(0x7f0000000400)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x50, '\x00', r12, 0x0, r13, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x5, 0x2, 0x10000, 0x400}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000980)=[{0x1, 0x5, 0x1, 0x2}, {0x1, 0x4, 0xc, 0x6}, {0x0, 0x3, 0x2, 0x9}, {0x2, 0x5, 0x9, 0x5}, {0x0, 0x3, 0xc, 0x3}, {0x5, 0x1, 0x7, 0x2}, {0x5, 0x1, 0x2, 0xb}], 0x10, 0x401}, 0x90) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000540)={&(0x7f0000000780)=""/64, 0x40, 0x0, &(0x7f0000000680)=""/39, 0x27}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000002280)=ANY=[@ANYBLOB="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"/2634], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, r15, 0xffffffffffffffff, 0x38}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r15}, 0x80) r16 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000b00)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r16, &(0x7f0000000b40)=0xdc9, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000e00)=0x2400000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r1}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="850000004f0000002c15c3077da6c8d4ad8a3d9ac70180563dcc2eed1303a568f3d49914e528e6b1287ff72abf81dc9834a4c129c84cd2c4bc8a8d229849a2e7f0c8a4ebdde3baa1e81d18cb5cc01771ea5c974ef08dd38f0c56e8e55e688e60bdd4281e70ff380832f01cf4aacea3cb7a7a17f7b4c460c7fd5b0516d5af1ea628b1006f7fd2", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000710d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018000000010000000000000001000000184f00"/96], &(0x7f0000000040)='GPL\x00', 0x200, 0x8, &(0x7f0000000080)=""/8, 0x40f00, 0x5d, '\x00', r12, 0x37, r14, 0x8, &(0x7f0000000f80)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x3, 0x0, 0x8000}, 0x10, r15, r2, 0x8, &(0x7f0000000300), &(0x7f0000000340)=[{0x4, 0x3, 0x4, 0xb}, {0x0, 0x3, 0x2}, {0x1, 0x3, 0x5, 0x4}, {0x1, 0x5, 0xfffffffe, 0x9}, {0x2, 0x5, 0xc, 0xa}, {0x4, 0x5, 0xe, 0x8}, {0x4, 0x5, 0x6, 0xb}, {0x0, 0x3, 0x5}]}, 0x90) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000300)='hrtimer_init\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000016c0)={'pimreg0\x00', 0x41}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xbc, 0xbc, 0x9, [@restrict={0x7, 0x0, 0x0, 0xb, 0x2}, @fwd={0x2}, @typedef={0x10, 0x0, 0x0, 0x8, 0x2}, @enum={0x5, 0x3, 0x0, 0x6, 0x4, [{0xe, 0x3}, {0x8, 0x3f}, {0x7, 0x6}]}, @union={0x1, 0x7, 0x0, 0x5, 0x0, 0x9, [{0x0, 0x4, 0x9}, {0x10, 0x5, 0x6}, {0x9, 0x5, 0x65}, {0xb, 0x0, 0x8}, {0xa, 0x3, 0x7ff8}, {0xc, 0x5, 0x4}, {0x1, 0x0, 0x200}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x1}]}]}, {0x0, [0x30, 0x30, 0x30, 0x30, 0x2e, 0x5f, 0x5f]}}, &(0x7f0000000680)=""/161, 0xdd, 0xa1, 0x1, 0x3f}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x51, '\x00', 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r11, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) close(r1) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r13}, 0x10) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcb, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff850000002d000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000004fb5"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x9, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r1, @ANYRES64=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) syz_clone(0x2a22800, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x2000003, 0xe0, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r9, 0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000001850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r11, &(0x7f0000000200), 0x43400) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x9, 0x1, 0x1, 0x1043, 0xffffffffffffffff, 0x2, '\x00', 0x0, r11, 0x5, 0xffffffff, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xbcb, 0x401, 0x8c000000, 0x30c0, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000368a53c1c53d428e86e32a395235c2b7b0052cd16d5240ce34e3be9511956f88070ab10ee41f3fc0b39c2c00c808840f1124f7c73652d9939664", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='dlm_unlock_start\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xb, 0x8001, 0x200, 0x3, 0x200, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x2e, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xb92, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2b, 'perf_event'}, {0x2d, 'net'}]}, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x3, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, &(0x7f00000001c0)=""/50, &(0x7f0000000380), &(0x7f0000000400), 0x2, r4}, 0x38) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x69000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="85dcc1bbc32f64d3200000"], &(0x7f0000001600)='GPL\x00', 0x5, 0xc0, &(0x7f0000001640)=""/192}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x5, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r6, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x77, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xda, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x20, 0x16, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x400}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5e}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000007c0)='syzkaller\x00', 0x7, 0x9c, &(0x7f0000000800)=""/156, 0xc3200, 0x55, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r6, 0x7, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000940)=[{0x2, 0x5, 0xb, 0xb}, {0x1, 0x2, 0x9, 0x6}, {0x0, 0x2, 0x0, 0xc}, {0x0, 0x4, 0xd, 0x7}, {0x0, 0x1, 0x6, 0x5}, {0x0, 0x5, 0x2, 0xb}, {0x0, 0x1, 0x0, 0x1}], 0x10, 0x10000}, 0x90) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c40)={@map=0x1, 0x8, 0x0, 0x2, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000a80)=[0x0], &(0x7f0000000bc0)=[0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000c80)={@ifindex=r7, r8, 0x6, 0x8, r6, @prog_fd=r9, r10}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x7, 0x91f, 0x7, 0x4, r0, 0x554, '\x00', r7, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x200030}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0x1, 0x1, 0xf97, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x96000007, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000020000000000000085"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000f1d00000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_int(r2, &(0x7f0000000200), 0x42400) executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008007900b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 98.953355][ T5933] syz-executor.1[5933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002200b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000001c59f2e46e1e61cc0100f6566b45e50e45"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000007f180100002200000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bf03000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_free_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x2e, &(0x7f0000000000)=r5, 0x4) recvmsg$unix(r5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x17, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000071120100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, &(0x7f0000000a40)=ANY=[], 0x9) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 98.953414][ T5933] syz-executor.1[5933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.332112][ T5934] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.350453][ T5934] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.357773][ T5934] device bridge_slave_0 entered promiscuous mode [ 99.372088][ T5934] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.379090][ T5934] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.386210][ T5934] device bridge_slave_1 entered promiscuous mode [ 99.398145][ T5937] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.405037][ T5937] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.412410][ T5937] device bridge_slave_0 entered promiscuous mode [ 99.427531][ T5937] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.434426][ T5937] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.441658][ T5937] device bridge_slave_1 entered promiscuous mode [ 99.453986][ T5936] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.461089][ T5936] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.468287][ T5936] device bridge_slave_0 entered promiscuous mode [ 99.484050][ T5936] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.490909][ T5936] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.498146][ T5936] device bridge_slave_1 entered promiscuous mode [ 99.509951][ T5935] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.516823][ T5935] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.523969][ T5935] device bridge_slave_0 entered promiscuous mode [ 99.542795][ T5935] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.549691][ T5935] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.556890][ T5935] device bridge_slave_1 entered promiscuous mode [ 99.702702][ T5935] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.709575][ T5935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.716670][ T5935] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.723441][ T5935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.747237][ T5934] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.754061][ T5934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.761148][ T5934] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.767971][ T5934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.778533][ T5937] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.785396][ T5937] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.792457][ T5937] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.799260][ T5937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.823651][ T5936] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.830500][ T5936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.837577][ T5936] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.844365][ T5936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.866382][ T601] bridge0: port 1(bridge_slave_0) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 99.876086][ T601] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.888633][ T601] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.895812][ T601] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.903007][ T601] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.910061][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.917639][ T601] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000002343118fa700e44c000000000000000000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x1f, 0x6, 0x6, 0x35, 0x0, 0x9, 0x2002, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x4, 0x4}, 0x2848, 0x3, 0x2, 0x2, 0x3, 0x0, 0x3, 0x0, 0xff7ffff7, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x101) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x10002, 0x53aa, 0x4, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000f7ff9bb03ba360ffffffffffff000000000018110000", @ANYRES32=r3, @ANYRESOCT=r2], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES16=r1, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004662b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x800000, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000009fff514a000000003a810000850000000700000085000000d000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='contention_end\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f00000002c0)=0x84005) unlink(&(0x7f0000000140)='./cgroup\x00') [ 99.924689][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.932948][ T601] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.955481][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x20}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x144000, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, &(0x7f0000000180), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f0000000180), 0x0}, 0x20) r5 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x3f, 0x7a, 0xb4, 0x40, 0x0, 0xfffffffffffffff7, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x2, 0x5}, 0x100000, 0x10001, 0x9, 0x8, 0x95a, 0x4, 0xe07, 0x0, 0x80000000, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x1ff) [ 99.978171][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.986240][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.994359][ T601] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.001223][ T601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.010189][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.018265][ T601] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.025089][ T601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.032320][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.040494][ T601] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.047332][ T601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.075839][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.083836][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.090672][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.098019][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.105966][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.112797][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.119986][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.127845][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.135654][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.143881][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000680)={'veth1_to_team\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000740), &(0x7f0000000380), 0x8, 0xce, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7fffffff, '\x00', r2, r3, 0x0, 0x3, 0x3}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r6) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x121100, 0x0) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000700)=0x320a) [ 100.175762][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.183938][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.192479][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.199867][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.207105][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.214786][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.236953][ T5937] device veth0_vlan entered promiscuous mode [ 100.242934][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.251365][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.259552][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.268284][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.276420][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.284497][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.292401][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.299581][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.306734][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.314756][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.322777][ T601] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.329614][ T601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.337056][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.344452][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.351796][ T5934] device veth0_vlan entered promiscuous mode [ 100.369470][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.377688][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.385585][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.392327][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.399502][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.407684][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.422640][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.430727][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.439007][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.447243][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.459267][ T5935] device veth0_vlan entered promiscuous mode [ 100.466723][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.474362][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="1850000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000186000000000000000000000fdfffd4c"], 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0506617, &(0x7f0000000040)=0x2) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{0x1, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000280)='%ps \x00'}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0x8}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r1, &(0x7f0000000340)="8a83aba69c4a8a1befbdebac0df79cb6b95dca304e120395e1f3a66fe3eda4b68f52610ba4d57fd9a6d7cc06d0345a0f4dffe3521b9f5d35c081864640f646196f84795d5b2c67f986659e63fd2286ff466b5a774d215a33af09dfa81e7a66b6e154ca3004c631784593f71a547819cb0b2aefcb23da11fd2a71e388fce4dd47e6a9df9ea8b49fc77751f477e897e95d", &(0x7f0000000a40)=""/4096}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) recvmsg$unix(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r5, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x84) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) [ 100.497897][ T5937] device veth1_macvtap entered promiscuous mode [ 100.507876][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.515476][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.522930][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.551220][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.559680][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.567716][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.575640][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.584354][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.592388][ T40] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x2e, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002200b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000001c59f2e46e1e61cc0100f6566b45e50e45"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000007f180100002200000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bf03000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_free_inode\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x2e, &(0x7f0000000000)=r5, 0x4) (async) setsockopt$sock_attach_bpf(r5, 0x1, 0x2e, &(0x7f0000000000)=r5, 0x4) recvmsg$unix(r5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd63}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0xc, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x17, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000071120100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r7, &(0x7f0000000a40)=ANY=[], 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20, 0xc, &(0x7f0000000080)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) [ 100.611539][ T5935] device veth1_macvtap entered promiscuous mode [ 100.619620][ T5936] device veth0_vlan entered promiscuous mode [ 100.630296][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.644297][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.653379][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)='%-010d \x00'}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000380)='mm_page_free_batched\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000001000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000f8ffffffb702000000000000b70300000000000085e6ff0004000052a2"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='hrtimer_init\x00', r4}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r3, 0x13, 0x1, 0x3ff, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0]}, 0x40) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000016c0)={'pimreg0\x00', 0x41}) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0xfffffffe, 0x800}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000018a306d05cfd392bd628c65fe6aab94fab293def510bd59d9bbc64172ef7147c82d442db9db82235550bd4865ba36a3552551bd5f483030fa80f321348ce83a7ad4d57155dc991d7d6bbc2a2b2cdee67b971043f274ddf94510fde6ec9677839bc948031195cc34fee563eb810d01d3970024cb4a385ae8a957293c30a8168bd11e76733009b57fa3d8553dbc"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='dlm_recv\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000200)='ext4_free_blocks\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000740)='br_fdb_update\x00'}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000400)={r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000008638000000000000000007009f27432f20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700010009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r8}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, 0x0, 0xda00) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 100.662472][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.670569][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.678645][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.685866][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.716621][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.724657][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.735410][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.744113][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.755696][ T5934] device veth1_macvtap entered promiscuous mode [ 100.766045][ T5936] device veth1_macvtap entered promiscuous mode [ 100.773147][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.780553][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.788641][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.796571][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.803915][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000faf9a7e2f15a9658ef6e002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x1, 0x4, 0x5}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000008000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r4, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x9, 0x9, 0x285feb0b, 0x2404, r4, 0x0, '\x00', r6, r7, 0x4, 0x2, 0x5, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000016c0)={&(0x7f0000000040)='ext4_allocate_inode\x00', r2}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001700)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0x5, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x1, 0x3, 0x0, 0x1}]}, &(0x7f0000000680)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x46, '\x00', r6, 0x32, r9, 0x8, &(0x7f00000006c0)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5, 0x3, &(0x7f0000000700)=[r3], &(0x7f0000000740)=[{0x3, 0x4, 0x7, 0x1}, {0x0, 0x3, 0x9, 0x1}, {0x4, 0x5, 0x6}], 0x10, 0x9}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f00000008c0)={r10, r8}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r0}, 0x10) openat$cgroup_type(r9, &(0x7f0000000340), 0x2, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r12}, 0x10) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) [ 100.812186][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x3, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcb, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffffff850000002d000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000004fb5"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x9, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r1, @ANYRES64=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) syz_clone(0x2a22800, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x2000003, 0xe0, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r9, 0x0, 0x0}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES16=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000001850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r11, &(0x7f0000000200), 0x43400) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='ext4_ext_handle_unwritten_extents\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x9, 0x1, 0x1, 0x1043, 0xffffffffffffffff, 0x2, '\x00', 0x0, r11, 0x5, 0xffffffff, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008048000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 100.847776][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.856071][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.867515][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.875819][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000018c0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x8, 0x8, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000180), &(0x7f0000000100)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, &(0x7f0000000300), 0x0}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c0d02, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x7902}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x420500, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x4004662b, 0x20001412) write$cgroup_subtree(r3, &(0x7f0000001ac0)=ANY=[], 0x240) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYRESDEC=r6], 0x0, 0x28, 0x0, 0x0, 0x4}, 0x20) close(0x4) r8 = perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0x80, 0x7, 0xe4, 0x9e, 0x2, 0x0, 0x7f, 0x88, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x1, 0xbe9}, 0x100000, 0xa30, 0x7fffffff, 0x5, 0x100000001, 0x0, 0xd2, 0x0, 0x401, 0x0, 0x100}, r0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x80, 0xff, 0x3f, 0x9, 0x5, 0x0, 0x9, 0x200, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f00000003c0)}, 0x100000, 0x4, 0x80, 0x2, 0x7fff, 0x0, 0x0, 0x0, 0x100, 0x0, 0xc000000000000000}, r2, 0x4, r8, 0xe) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000000500000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffff3}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xbcb, 0x401, 0x8c000000, 0x30c0, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000368a53c1c53d428e86e32a395235c2b7b0052cd16d5240ce34e3be9511956f88070ab10ee41f3fc0b39c2c00c808840f1124f7c73652d9939664", @ANYRES32=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='dlm_unlock_start\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xb, 0x8001, 0x200, 0x3, 0x200, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x2a, 0xa7, &(0x7f0000000000)="595347cfa78250b49fe15a25a4d3ef6a1864eeb3d1f50b4c80394c2b872dd9b0ed35e7a8d29d57ca1743", &(0x7f0000000040)=""/167, 0x1, 0x0, 0x5f, 0xa9, &(0x7f0000000100)="8b1986d1e980c31af7a63237d4db140c43e02c8fbc70ad569d0711da38351f46b25414efafbaa0c939f548447fec43413ab74a6824817e38eb0370152101c36e1e2c5769b38607d8aea2207f5887b445a4776c7939d402372cd73c04dc4bfd", &(0x7f0000000180)="dbeaee47af3c8634cd14888b29ffa79fdec58308ffc3e13e41b5525a5fba4c97540caea0aa291ce26fda034c9e03021ff2b0a664cd83bab43a23ec5b950d279b721f128961e6b13f32d58b6a8864e8e91c842be005a88fd51b9ca2c5d9361993b221e9705adcbae1a68b6bf652bf323080185e1e25dd97c186d087b93fa8cb20d00df304973815f66de8170813c22a9b35bd1f8f6ad027a07777bf5de6d61b8c27a170ec8672fc2f19", 0x0, 0x0, 0xffff}, 0x50) r0 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x1, 0x8, 0xe1, 0xe7, 0x0, 0x7, 0xc000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x100200, 0x100000000, 0x3, 0x1, 0x100, 0x6, 0xffff, 0x0, 0xff, 0x0, 0x1ff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x5) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002500)=@generic={&(0x7f00000024c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000002540)={&(0x7f0000000380)="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", &(0x7f0000001380)=""/126, &(0x7f0000001400)="c6a8e97aa0138f664b900f2dbddc29101387a96293542749013e436d25760e89223d1fcfe73b711a89a7f959a20c76e6b03aa27cc4e0afa588cec7d958a7ac98b79bdedba03669ca07d13792318118d9f4639b9e5b82fd75d67835eadfc3ec5304fb393139d127b6c113e8460c93059e4c54179f69e58ca8ab7273cfb014ad4fa9b509f78a2d2ac3466c8bd57dacfaa15bf3", &(0x7f00000014c0)="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", 0xf7, r1, 0x4}, 0x38) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000002580), 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002800)={0x11, 0x8, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@generic={0xdd, 0x0, 0x5, 0x6, 0x7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000002640)='GPL\x00', 0x6, 0x44, &(0x7f0000002680)=""/68, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000002740)={0x2, 0xc, 0xfffffffe, 0x7}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002780)=[r1, r1], &(0x7f00000027c0)=[{0x3, 0x4, 0xc, 0xc}, {0x5, 0x2, 0xa, 0x4}], 0x10, 0x8}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000028c0)={&(0x7f00000025c0)='svcrdma_decode_rqst\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002900)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000002d80)={&(0x7f0000002940), 0x6e, &(0x7f0000002d40)=[{&(0x7f00000029c0)=""/186, 0xba}, {&(0x7f0000002a80)=""/222, 0xde}, {&(0x7f0000002b80)=""/231, 0xe7}, {&(0x7f0000002c80)=""/161, 0xa1}], 0x4}, 0x40010020) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000003f00)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x440, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004000)={0x6, 0x16, &(0x7f0000002dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xdd}, [@btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x15}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf5c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffb02f, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x100}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}]}, &(0x7f0000002e80)='GPL\x00', 0x4, 0x1000, &(0x7f0000002ec0)=""/4096, 0x40f00, 0x3, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003ec0)={0x5, 0x2d3, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000003f80)=[r1, r2, r1, r1, r7, r1, r1, r1, r1, r1], &(0x7f0000003fc0)=[{0x2, 0x5, 0x6, 0x5}, {0x0, 0x3, 0x6, 0x8}, {0x2, 0x1, 0xc}], 0x10, 0xfffffffc}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000041c0)={r7, &(0x7f00000040c0)="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"}, 0x20) r9 = perf_event_open(&(0x7f0000004240)={0x3, 0x80, 0x7e, 0x2, 0x3, 0x9, 0x0, 0x4, 0x12040, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000004200), 0x1}, 0x8000, 0x4, 0x5, 0x3, 0xa38, 0x6, 0x7, 0x0, 0x80, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r0, 0x8) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x600000) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000005400)={&(0x7f00000042c0)="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", &(0x7f00000052c0), &(0x7f0000005300)="a14f046480d98ff4c9d39ccedcb520d91bf5684e46411bc7a2d1dbd256680eac88d148e9fa52083454c554d4e4807e153fc8c436000cf05035c9e072fb5327b87f46cd3f4c6f9fc50d193fa78c9b485ae6b17544fdb19901c7e54c7867e8a0d8d7d6350da1637a378f08aed0d66efdd60684e65d32461a151f", &(0x7f0000005380)="cb50b037b098c757cea9e7cadfba4769601bad2497d7d1247e959ba5becf0db4b839f4db64bf605bab0d6d4a848788036677ba62e962460815b10db0949ad708cb3897e7c43569b0fb13c2f46d361d72f5f930403cb6ede86fb89df8b838eb2f04951feecd71cab4babc8aa707e6b4009749b021b28dbe5ef9ec", 0xd3, r7}, 0x38) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000005500)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000005480)={0x0, 0x80, 0x3, 0x4, 0x8, 0x7, 0x0, 0x1, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000005440), 0xf}, 0x0, 0x80000000, 0x0, 0x1, 0xdd, 0x8001, 0x6, 0x0, 0x7fffffff, 0x0, 0x4}, r10, 0x6, r9, 0x1) r11 = syz_clone(0x1000, &(0x7f0000005540)="cf7651c161f815afa4a63cdc07286d7a20cfb35f74a22f7f4b36ffe3775bf3eb86e7359fc92ae7c60d1eace1d14d6f47e4e61e81e2f2f6a2a005d37ab5376f53488f0edb9181304705f999f4f7bb92b63982267112bb1080e322f7ba5feb5878d8", 0x61, &(0x7f00000055c0), &(0x7f0000005600), &(0x7f0000005640)="594a70edbd686364a38c023783c1ae4928832889bd72cd489ba895429cb7d8b2be1964a11bd17086c3b7ed") ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000005680)={'wlan1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$PROG_BIND_MAP(0x23, &(0x7f00000056c0)={r8, r1}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005a00)={r8, 0xe0, &(0x7f0000005900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000005700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000005740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000005780)=[0x0, 0x0, 0x0], 0x0, 0x64, &(0x7f00000057c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000005840), &(0x7f0000005880), 0x8, 0xde, 0x8, 0x8, &(0x7f00000058c0)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000005b40)={@ifindex=r12, 0x2f, 0x0, 0x9, &(0x7f0000005a40)=[0x0], 0x1, 0x0, &(0x7f0000005a80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000005ac0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000005b00)=[0x0, 0x0]}, 0x40) openat$cgroup_ro(r9, &(0x7f0000005b80)='freezer.self_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r9, 0x2402, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005bc0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000005c80)={r5, 0x58, &(0x7f0000005c00)}, 0x10) perf_event_open(&(0x7f0000005cc0)={0x2, 0x80, 0x3, 0x0, 0xe6, 0xf3, 0x0, 0x3, 0xa40, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xf56, 0x9}, 0x2000, 0x323, 0x2d, 0x2, 0x7f, 0x80fc, 0x7, 0x0, 0x1c5, 0x0, 0x5}, r11, 0x5, 0xffffffffffffffff, 0x8) openat$cgroup_ro(r10, &(0x7f0000005d40)='memory.swap.events\x00', 0x0, 0x0) [ 100.942278][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.953208][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.962404][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.971957][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xc, 0x4, 0xc4f, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000100), 0x6c7, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000440), 0x3, r0}, 0x38) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r10}, 0x10) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xeff, 0x5}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, '\x00', r5, 0xffffffffffffffff, 0x1, 0x5, 0x1}, 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}, {0x0, [0x61, 0x10]}}, 0x0, 0x34}, 0x20) [ 101.013864][ T5993] device syzkaller0 entered promiscuous mode executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r1}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3030000, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x73000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 101.110476][ T6001] device syzkaller0 entered promiscuous mode executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800d000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 101.166305][ T629] device bridge_slave_1 left promiscuous mode [ 101.172337][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.180047][ T629] device bridge_slave_0 left promiscuous mode [ 101.186128][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.195036][ T629] device bridge_slave_1 left promiscuous mode [ 101.201073][ T629] bridge0: port 2(bridge_slave_1) entered disabled state executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x31, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x66}, @initr0, @exit, @alu={0x7, 0x0, 0x4, 0x3}]}, &(0x7f0000000000)='GPL\x00'}, 0x90) executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000000000000178, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000001000000002300000000000063011400000000009500000000000000eccc2285bddc58d1ee0475e2c5f82c8d95b4daa092a77a7805587dee9c9b0d59241f6f846ec9248b890dc828fc91fcb0758d0761887a5b502b293172c56eed26fbcfa6e0e34239f80d027e83f6f5c5c5abe941d11bbd6c0ed7ccf26a1dd7dbcc9f4ed375382e053aedd612b77461ffe376501dc132652ac916393ae0651525c236a13eb0afcc2a35b5183863e0ec60c18a20816e4a54db9f8d5798389c1bef700b14efacfb3ea78fb8e4ef35696534ca815334fd82049a58de98ff"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x4, 0x0}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x108, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0xffffffff, 0x2d, &(0x7f0000000240)=""/45, 0x41100, 0x18, '\x00', r1, 0x2e, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x4, 0xd, 0x8, 0x2}, 0x10, r4, r0, 0x2, &(0x7f0000000700)=[r5], &(0x7f0000000740)=[{0x3, 0x3, 0x2, 0x4}, {0x2, 0x1, 0x8, 0x7}], 0x10, 0x7ff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000800)=@framed, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='ext4_journal_start\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_journal_start\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) executing program 0: perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xfc, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000), 0x400000) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000200)={0x1, 0x4, [@random="a29d01feb1fc", @broadcast, @random="bb9704240fa1", @multicast]}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) close(r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000003000000000000000010000018110000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000003f9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) [ 101.212950][ T629] device bridge_slave_0 left promiscuous mode [ 101.219423][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.231326][ T629] device bridge_slave_1 left promiscuous mode [ 101.240775][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.249767][ T629] device bridge_slave_0 left promiscuous mode executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f0000000a40)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x89c, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000ddb60400000002000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5}, &(0x7f0000000180), &(0x7f0000000200)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='hugepage_set_pmd\x00', r6}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x15, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000090000000000000040000000816a01001000000018560000060000000000000000000000186900000d00000000000000000000004d2b1800ffffffff7524010000040400180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7001834000001000000000000000000000087490200f0ffffff9500"/168], &(0x7f0000000080)='GPL\x00', 0x5, 0x7c, &(0x7f0000000340)=""/124, 0x41000, 0x4, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000740)={0x4, 0xd, 0xfffffff9, 0x1}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, r10, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x4, 0x4, 0x3, 0x6}, {0x5, 0x2, 0xc, 0x8}, {0x5, 0x1, 0xf, 0x8}, {0x0, 0x4, 0x3}, {0x1, 0x2, 0xf, 0xa}, {0x4, 0x4, 0x6, 0x5}], 0x10, 0x3}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x26, &(0x7f0000000600)=ANY=[@ANYBLOB="18010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300004000000085000000060000001867000006000000000000000100000018000000ff0f000000000000020000001842000004000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffff9703000008000000b704000002000000850000008200000018460000fdffffff0000000000000000b7080000000000007b8af8ff00000000b70800d7800000007b8af0ff00000000bfa100000000000016010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f00000004c0)='GPL\x00', 0x7fffffff, 0xd3, &(0x7f0000000740)=""/211, 0x41000, 0x50, '\x00', 0x0, 0x25, r8, 0x8, &(0x7f0000000500)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0xa, 0x10001, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1, r2, r1], 0x0, 0x10, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x41009432, &(0x7f00000005c0)) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000007f0000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r11}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r12 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_clone(0x40082280, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000640)="b54cc4eb90622cfca2a755531aceb5edaaf006a08ce5720cb23a3982e9a068225f7d2bfb16940047088e1efa483f5c990bd0a13faea9c3f20c48d451ec19990d2cea8523100b709c3b2e56064c54eaef0fbb425139a5941ed8a0ed5e00204b2bd5625c8c83f75534d93ef3d4b657dc5e6844e3591c30dd7c2b99d78b0ca63ae305b6e350b16a4c17c4b0c7d79a6b44ffba0c69b88151ba7f0a5a3e08ebbf3a090315be7a75e2bfc6f859b6501446786f1ec7c5d0fbeb1a535c94c3b6550ae7e107cef40ea28830ebda553675818a26a4af7b6323732120d4c6", &(0x7f0000001540)=""/154}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000300)='./file0\x00', 0x110) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='ext4_drop_inode\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r4, 0x58, &(0x7f0000000280)}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x79000000, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 101.262783][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.275482][ T629] device bridge_slave_1 left promiscuous mode [ 101.283911][ T629] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.294047][ T629] device bridge_slave_0 left promiscuous mode [ 101.300638][ T629] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.311024][ T629] device veth0_vlan left promiscuous mode executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='tlb_flush\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800f100b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 101.317441][ T629] device veth1_macvtap left promiscuous mode [ 101.324882][ T629] device veth0_vlan left promiscuous mode [ 101.331067][ T629] device veth1_macvtap left promiscuous mode [ 101.337090][ T629] device veth0_vlan left promiscuous mode executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)=0x80000) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000098110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000005000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x87) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='i2c_read\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='timer_start\x00'}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000004000000bb7f1a00c600feff0000000a9500"/40], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(r2, &(0x7f00000001c0), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000000), 0x400000) executing program 1: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={&(0x7f0000000500)="29dc148a032b4727936f613be2a36ea99bd2388104eb4ce656b7c53f691472a077861131e0ac59f63cfe2fa0bc721b81d16b07755c572dd40bc8c0", &(0x7f0000000540)=""/189, &(0x7f0000000600)="cc64d315c6870e3d4fa6bc93d40ed740637c7eb0331a212961b5728342b013c7", &(0x7f0000000640)="a57de23cc21c546eeb050c09b3dfd9a8b42d92cd1e3b3b6acb32e67aceec82eb036ae2e22d7e7884e704abf50f483497cb34a15ce1fbdbd58018e8f51edd51e058e3374a79273d1d598be81bbf4968fbe681033fa4d37f17cf51e349a9e76f1535d708caaea5dd8bbce0fe2c4bd1244ec5cc2a8b4ce1", 0x3ed10032, r3}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r3, &(0x7f0000000300)="b53d0e54ab4f0be4f989759ef5409b112b726c71e149c002423f6f64501a49baf51d319dfab80e40054617a6b04e72b13ab6d9391f44cfb75d882387", &(0x7f0000000340)=""/232}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000001d00fe0018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000400000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001480)={r6, 0x0, 0x0, 0xffffffffffffff64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="1802000000000000000000000000000018130000", @ANYRES32=r0, @ANYBLOB="0000000000000000850000001200"/24], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="9e36d448b388dd965f7a3312779a", 0x0, 0xb94, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) executing program 1: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000c40)=ANY=[@ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x4, &(0x7f0000000340)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x6, &(0x7f0000000140)=ANY=[@ANYBLOB="18060000000000000000000000b93e000000851000000200000040000000000000009500007b00000000950000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x8b, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9ff60100180000000000000024000000240000000a0000000800000000000007000000000d0000000000000700000000040000000000000c04000000002e2e2e5f615f2e2e00"], &(0x7f00000008c0)=""/202, 0x46, 0xca}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000bc0)='f2fs_gc_begin\x00', r1}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0xffffff80, 0xfffff800, 0x2000, 0x1, 0x6, '\x00', r5, r6, 0x0, 0xfffffffc, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000181149008545c55e0c7a9754b588314b95b4bee9beef2ded6596f3847e4272c2d3d4cd28e293f96d63edfe559fb248a0b10f8950444f1859dd2c37b33e6c5e36fe1e2010b7314dc27b0970c5855fa21dbad34b84d28170648fff074fd3395f0df66f9ac7e935bae59db81604abfad492d50b3c190615ba5fc2aa7bb8f8c89be5a0a203e93043c9533045739a2c1da5398b5731f4bb19b9cad1", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x13, 0xc, &(0x7f0000000c80)=ANY=[@ANYRES8=r7], &(0x7f0000000880)='GPL\x00', 0x0, 0x3f, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) bpf$ENABLE_STATS(0x20, &(0x7f0000000780), 0x4) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={&(0x7f0000000b40)="5328203e4a50faa9d0dfc0556b27e44d7fd614437c0a0a57828f32427de3c6742bbce63e74ac29cfa197379912ee57bfb4b6365f7c10f604e84f89866498f0a0fcf0443a79e4954903eab2e8", &(0x7f0000000e40)=""/244, &(0x7f0000000cc0)="9551478c07dc174885cbc2d6572bf829477ee28be02f5efc9969eda4df86b8e373ae3f20512d7c95c1d0ebe488eb141b3fbfb090b140777f12b8f74ddb4dc3404d8eea506d6dfbb344f667f784259844f7d159cb81d7e52058bf45d63c11d8206c00e71053a40af983c2bcb239132ed1b918a91c92862c10888ecde60b7f8d8b9248cbbfcdbb0f180503562aa1449bb1a2f3086a97a246a7e223e8ad27139f4fa2ace0e16ea12e47d4cb239f1ad3abfb3ecc3d180a6aff216988ea3f3152", &(0x7f0000000d80)="92a09ee33a34e0abef93486bc0a542afa107cb15663bdc19ae881bba0bf21f08dd1c7491cd981e051dcecd9f9cb71b69cf8975f6d0539f726794a7fb27ab33d1aeef72b0c5dbc89f1ae7174f6cdb0983b391666b268ee661541cfbb477fe13ea111505fb6086e9f7a4177f398b21e981ff785f31e27e3b42d36704beea0d1feb4add229d8e2ab881cb8b1dcfda17203aa3307adf34e52334297128b7a47cefa1f0b510e494c8716f4a458b9c9a1d53b8c0b56f429f", 0x9, r7}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020a0702500000000002002007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='ext4_writepages\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10}, &(0x7f0000000080), &(0x7f0000000340)}, 0x20) write$cgroup_pid(r12, &(0x7f0000000980), 0x12) executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='ext4_ext_show_extent\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2000000000000004, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) [ 101.477245][ C0] softirq: huh, entered softirq 9 RCU ffffffff8160c090 with preempt_count 00000102, exited with 00000101? [ 101.488403][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.488403][ T304] last function: bpf_prog_free_deferred [ 101.502083][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.511613][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.521512][ T304] Workqueue: events bpf_prog_free_deferred [ 101.527145][ T304] Call Trace: [ 101.530277][ T304] [ 101.533050][ T304] dump_stack_lvl+0x151/0x1b7 [ 101.537563][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.542856][ T304] ? bpf_prog_free_deferred+0x63e/0x750 [ 101.548239][ T304] dump_stack+0x15/0x1b [ 101.552229][ T304] process_one_work+0x94e/0xcb0 [ 101.556920][ T304] worker_thread+0xa60/0x1260 [ 101.561438][ T304] kthread+0x26d/0x300 [ 101.565335][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 101.570195][ T304] ? kthread_blkcg+0xd0/0xd0 [ 101.574620][ T304] ret_from_fork+0x1f/0x30 [ 101.578877][ T304] [ 101.582712][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.582712][ T304] last function: mld_ifc_work [ 101.595540][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.605328][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.615232][ T304] Workqueue: mld mld_ifc_work [ 101.619737][ T304] Call Trace: [ 101.622860][ T304] [ 101.625637][ T304] dump_stack_lvl+0x151/0x1b7 [ 101.630151][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.635448][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 101.640682][ T304] dump_stack+0x15/0x1b [ 101.644646][ T304] process_one_work+0x94e/0xcb0 [ 101.649337][ T304] worker_thread+0xa60/0x1260 [ 101.653855][ T304] kthread+0x26d/0x300 [ 101.657753][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 101.662612][ T304] ? kthread_blkcg+0xd0/0xd0 [ 101.667037][ T304] ret_from_fork+0x1f/0x30 [ 101.671293][ T304] [ 101.674793][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.674793][ T304] last function: srcu_invoke_callbacks [ 101.688266][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.697800][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.707694][ T304] Workqueue: rcu_gp srcu_invoke_callbacks [ 101.713249][ T304] Call Trace: [ 101.716371][ T304] [ 101.719151][ T304] dump_stack_lvl+0x151/0x1b7 [ 101.723663][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.728961][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 101.734164][ T304] dump_stack+0x15/0x1b [ 101.738158][ T304] process_one_work+0x94e/0xcb0 [ 101.742849][ T304] worker_thread+0xa60/0x1260 [ 101.747368][ T304] kthread+0x26d/0x300 [ 101.751262][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 101.756123][ T304] ? kthread_blkcg+0xd0/0xd0 [ 101.760550][ T304] ret_from_fork+0x1f/0x30 [ 101.764811][ T304] [ 101.767912][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.767912][ T304] last function: mld_ifc_work [ 101.780590][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.790121][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.800015][ T304] Workqueue: mld mld_ifc_work [ 101.804526][ T304] Call Trace: [ 101.807655][ T304] [ 101.810430][ T304] dump_stack_lvl+0x151/0x1b7 [ 101.814946][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.820239][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 101.825448][ T304] dump_stack+0x15/0x1b [ 101.829440][ T304] process_one_work+0x94e/0xcb0 [ 101.834128][ T304] worker_thread+0xa60/0x1260 [ 101.838714][ T304] kthread+0x26d/0x300 [ 101.842542][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 101.847507][ T304] ? kthread_blkcg+0xd0/0xd0 [ 101.851934][ T304] ret_from_fork+0x1f/0x30 [ 101.856190][ T304] [ 101.859173][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.859173][ T304] last function: wg_packet_decrypt_worker [ 101.872908][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.882419][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.892312][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 101.898646][ T304] Call Trace: [ 101.901771][ T304] [ 101.904547][ T304] dump_stack_lvl+0x151/0x1b7 [ 101.909065][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 101.914354][ T304] ? __kasan_check_read+0x11/0x20 [ 101.919216][ T304] ? read_word_at_a_time+0x12/0x20 [ 101.924165][ T304] ? strscpy+0x9c/0x260 [ 101.928155][ T304] dump_stack+0x15/0x1b [ 101.932148][ T304] process_one_work+0x94e/0xcb0 [ 101.936839][ T304] worker_thread+0xa60/0x1260 [ 101.941353][ T304] kthread+0x26d/0x300 [ 101.945253][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 101.950128][ T304] ? kthread_blkcg+0xd0/0xd0 [ 101.954541][ T304] ret_from_fork+0x1f/0x30 [ 101.958805][ T304] [ 101.961870][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 101.961870][ T304] last function: mld_ifc_work [ 101.974543][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 101.984076][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 101.993974][ T304] Workqueue: mld mld_ifc_work [ 101.998568][ T304] Call Trace: [ 102.001697][ T304] [ 102.004470][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.008986][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.014291][ T304] ? __kasan_check_read+0x11/0x20 [ 102.019173][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 102.024350][ T304] dump_stack+0x15/0x1b [ 102.028340][ T304] process_one_work+0x94e/0xcb0 [ 102.033031][ T304] worker_thread+0xa60/0x1260 [ 102.037548][ T304] kthread+0x26d/0x300 [ 102.041443][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.046306][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.050816][ T304] ret_from_fork+0x1f/0x30 [ 102.054987][ T304] [ 102.057974][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.057974][ T304] last function: wg_packet_encrypt_worker [ 102.071697][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.081230][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.091120][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 102.097453][ T304] Call Trace: [ 102.100578][ T304] [ 102.103359][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.107871][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.113166][ T304] ? __kasan_check_read+0x11/0x20 [ 102.118025][ T304] ? read_word_at_a_time+0x12/0x20 [ 102.122973][ T304] ? strscpy+0x9c/0x260 [ 102.126963][ T304] dump_stack+0x15/0x1b [ 102.131041][ T304] process_one_work+0x94e/0xcb0 [ 102.135732][ T304] worker_thread+0xa60/0x1260 [ 102.140249][ T304] kthread+0x26d/0x300 [ 102.144148][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.149008][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.153447][ T304] ret_from_fork+0x1f/0x30 [ 102.157694][ T304] [ 102.160661][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.160661][ T304] last function: wg_packet_encrypt_worker [ 102.174287][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.183812][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.193712][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 102.200043][ T304] Call Trace: [ 102.203167][ T304] [ 102.205948][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.210458][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.215752][ T304] ? __kasan_check_read+0x11/0x20 [ 102.220612][ T304] ? read_word_at_a_time+0x12/0x20 [ 102.225562][ T304] ? strscpy+0x9c/0x260 [ 102.229551][ T304] dump_stack+0x15/0x1b [ 102.233544][ T304] process_one_work+0x94e/0xcb0 [ 102.238235][ T304] worker_thread+0xa60/0x1260 [ 102.242755][ T304] kthread+0x26d/0x300 [ 102.246652][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.251510][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.255938][ T304] ret_from_fork+0x1f/0x30 [ 102.260194][ T304] [ 102.263145][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.263145][ T304] last function: vmstat_shepherd [ 102.276010][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.285533][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.295429][ T304] Workqueue: events vmstat_shepherd [ 102.300461][ T304] Call Trace: [ 102.303585][ T304] [ 102.306519][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.311030][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.316322][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 102.321530][ T304] dump_stack+0x15/0x1b [ 102.325524][ T304] process_one_work+0x94e/0xcb0 [ 102.330212][ T304] worker_thread+0xa60/0x1260 [ 102.334729][ T304] kthread+0x26d/0x300 [ 102.338629][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.343486][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.347914][ T304] ret_from_fork+0x1f/0x30 [ 102.352170][ T304] [ 102.355099][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.355099][ T304] last function: vmstat_update [ 102.367802][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.377337][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.387229][ T304] Workqueue: mm_percpu_wq vmstat_update [ 102.392612][ T304] Call Trace: [ 102.395735][ T304] [ 102.398512][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.403032][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.408318][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 102.413530][ T304] dump_stack+0x15/0x1b [ 102.417522][ T304] process_one_work+0x94e/0xcb0 [ 102.422216][ T304] worker_thread+0xa60/0x1260 [ 102.426737][ T304] kthread+0x26d/0x300 [ 102.430626][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.435488][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.439912][ T304] ret_from_fork+0x1f/0x30 [ 102.444171][ T304] [ 102.447197][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.447197][ T304] last function: mld_ifc_work [ 102.459873][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.469410][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.479340][ T304] Workqueue: mld mld_ifc_work [ 102.483817][ T304] Call Trace: [ 102.486944][ T304] [ 102.489718][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.494231][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.499528][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 102.504733][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 102.509941][ T304] dump_stack+0x15/0x1b [ 102.513934][ T304] process_one_work+0x94e/0xcb0 [ 102.518625][ T304] worker_thread+0xa60/0x1260 [ 102.523140][ T304] kthread+0x26d/0x300 [ 102.527038][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.531899][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.536325][ T304] ret_from_fork+0x1f/0x30 [ 102.540584][ T304] [ 102.543542][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.543542][ T304] last function: wg_packet_encrypt_worker [ 102.557173][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.566702][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.576597][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 102.582934][ T304] Call Trace: [ 102.586057][ T304] [ 102.588839][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.593348][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.598643][ T304] ? __kasan_check_read+0x11/0x20 [ 102.603504][ T304] ? read_word_at_a_time+0x12/0x20 [ 102.608452][ T304] ? strscpy+0x9c/0x260 [ 102.612445][ T304] dump_stack+0x15/0x1b [ 102.616437][ T304] process_one_work+0x94e/0xcb0 [ 102.621128][ T304] worker_thread+0xa60/0x1260 [ 102.625643][ T304] kthread+0x26d/0x300 [ 102.629540][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.634402][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.638827][ T304] ret_from_fork+0x1f/0x30 [ 102.643084][ T304] [ 102.646077][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.646077][ T304] last function: mld_ifc_work [ 102.659015][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.668550][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.678442][ T304] Workqueue: mld mld_ifc_work [ 102.682955][ T304] Call Trace: [ 102.686082][ T304] [ 102.688857][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.693371][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.698670][ T304] dump_stack+0x15/0x1b [ 102.702661][ T304] process_one_work+0x94e/0xcb0 [ 102.707348][ T304] worker_thread+0xa60/0x1260 [ 102.711868][ T304] kthread+0x26d/0x300 [ 102.715763][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.720623][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.725053][ T304] ret_from_fork+0x1f/0x30 [ 102.729306][ T304] [ 102.732284][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.732284][ T304] last function: wg_packet_tx_worker [ 102.745602][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.755128][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.765022][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 102.770924][ T304] Call Trace: [ 102.774048][ T304] [ 102.776825][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.781337][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.786635][ T304] dump_stack+0x15/0x1b [ 102.790627][ T304] process_one_work+0x94e/0xcb0 [ 102.795323][ T304] worker_thread+0xa60/0x1260 [ 102.799841][ T304] kthread+0x26d/0x300 [ 102.803740][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.808594][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.813024][ T304] ret_from_fork+0x1f/0x30 [ 102.817275][ T304] [ 102.820197][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.820197][ T304] last function: wg_packet_decrypt_worker [ 102.833879][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.843480][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.853378][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 102.859712][ T304] Call Trace: [ 102.862842][ T304] [ 102.865614][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.870127][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.875420][ T304] ? __kasan_check_read+0x11/0x20 [ 102.880282][ T304] ? read_word_at_a_time+0x12/0x20 [ 102.885229][ T304] ? strscpy+0x9c/0x260 [ 102.889226][ T304] dump_stack+0x15/0x1b [ 102.893214][ T304] process_one_work+0x94e/0xcb0 [ 102.897906][ T304] worker_thread+0xa60/0x1260 [ 102.902421][ T304] kthread+0x26d/0x300 [ 102.906320][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 102.911182][ T304] ? kthread_blkcg+0xd0/0xd0 [ 102.915611][ T304] ret_from_fork+0x1f/0x30 [ 102.919867][ T304] [ 102.922808][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 102.922808][ T304] last function: srcu_invoke_callbacks [ 102.936189][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 102.945726][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 102.955630][ T304] Workqueue: rcu_gp srcu_invoke_callbacks [ 102.961174][ T304] Call Trace: [ 102.964300][ T304] [ 102.967082][ T304] dump_stack_lvl+0x151/0x1b7 [ 102.971588][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.976882][ T304] ? __kasan_check_read+0x11/0x20 [ 102.981743][ T304] ? read_word_at_a_time+0x12/0x20 [ 102.986734][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 102.991898][ T304] dump_stack+0x15/0x1b [ 102.995888][ T304] process_one_work+0x94e/0xcb0 [ 103.000580][ T304] worker_thread+0xa60/0x1260 [ 103.005114][ T304] kthread+0x26d/0x300 [ 103.008994][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.013870][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.018290][ T304] ret_from_fork+0x1f/0x30 [ 103.022543][ T304] [ 103.025510][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.025510][ T304] last function: wg_packet_encrypt_worker [ 103.039129][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.048660][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.058558][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 103.064888][ T304] Call Trace: [ 103.068016][ T304] [ 103.070794][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.075308][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.080599][ T304] ? __kasan_check_read+0x11/0x20 [ 103.085463][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.090425][ T304] ? strscpy+0x9c/0x260 [ 103.094399][ T304] dump_stack+0x15/0x1b [ 103.098391][ T304] process_one_work+0x94e/0xcb0 [ 103.103088][ T304] worker_thread+0xa60/0x1260 [ 103.107599][ T304] kthread+0x26d/0x300 [ 103.111510][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.116357][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.120786][ T304] ret_from_fork+0x1f/0x30 [ 103.125068][ T304] [ 103.128059][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.128059][ T304] last function: mld_ifc_work [ 103.140741][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.150270][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.160171][ T304] Workqueue: mld mld_ifc_work [ 103.164680][ T304] Call Trace: [ 103.167803][ T304] [ 103.170584][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.175094][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.180389][ T304] ? __kasan_check_read+0x11/0x20 [ 103.185251][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 103.190458][ T304] dump_stack+0x15/0x1b [ 103.194450][ T304] process_one_work+0x94e/0xcb0 [ 103.199140][ T304] worker_thread+0xa60/0x1260 [ 103.203663][ T304] kthread+0x26d/0x300 [ 103.207556][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.212416][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.216841][ T304] ret_from_fork+0x1f/0x30 [ 103.221103][ T304] [ 103.224039][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.224039][ T304] last function: wg_packet_decrypt_worker [ 103.237966][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.247486][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.257382][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 103.263718][ T304] Call Trace: [ 103.266854][ T304] [ 103.269621][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.274135][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.279429][ T304] ? __kasan_check_read+0x11/0x20 [ 103.284286][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.289235][ T304] ? strscpy+0x9c/0x260 [ 103.293243][ T304] dump_stack+0x15/0x1b [ 103.297219][ T304] process_one_work+0x94e/0xcb0 [ 103.301915][ T304] worker_thread+0xa60/0x1260 [ 103.306427][ T304] kthread+0x26d/0x300 [ 103.310328][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.315188][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.319617][ T304] ret_from_fork+0x1f/0x30 [ 103.323868][ T304] [ 103.326767][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.326767][ T304] last function: wg_packet_encrypt_worker [ 103.340538][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.350083][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.359977][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 103.366306][ T304] Call Trace: [ 103.369433][ T304] [ 103.372211][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.376723][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.382021][ T304] ? __kasan_check_read+0x11/0x20 [ 103.386877][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.391823][ T304] ? strscpy+0x9c/0x260 [ 103.395833][ T304] dump_stack+0x15/0x1b [ 103.399809][ T304] process_one_work+0x94e/0xcb0 [ 103.404501][ T304] worker_thread+0xa60/0x1260 [ 103.409019][ T304] kthread+0x26d/0x300 [ 103.412919][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.417775][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.422202][ T304] ret_from_fork+0x1f/0x30 [ 103.426460][ T304] [ 103.429365][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.429365][ T304] last function: wg_packet_decrypt_worker [ 103.443044][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.452579][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.462478][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 103.468808][ T304] Call Trace: [ 103.471933][ T304] [ 103.474711][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.479227][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.484522][ T304] ? __kasan_check_read+0x11/0x20 [ 103.489378][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.494325][ T304] ? strscpy+0x9c/0x260 [ 103.498319][ T304] dump_stack+0x15/0x1b [ 103.502312][ T304] process_one_work+0x94e/0xcb0 [ 103.507003][ T304] worker_thread+0xa60/0x1260 [ 103.511517][ T304] kthread+0x26d/0x300 [ 103.515417][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.520276][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.524705][ T304] ret_from_fork+0x1f/0x30 [ 103.528959][ T304] [ 103.531972][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.531972][ T304] last function: mld_ifc_work [ 103.544635][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.554169][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.564067][ T304] Workqueue: mld mld_ifc_work [ 103.568578][ T304] Call Trace: [ 103.571702][ T304] [ 103.574479][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.578992][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.584287][ T304] ? __kasan_check_read+0x11/0x20 [ 103.589148][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 103.594355][ T304] dump_stack+0x15/0x1b [ 103.598346][ T304] process_one_work+0x94e/0xcb0 [ 103.603039][ T304] worker_thread+0xa60/0x1260 [ 103.607554][ T304] kthread+0x26d/0x300 [ 103.611451][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.616314][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.620739][ T304] ret_from_fork+0x1f/0x30 [ 103.625005][ T304] [ 103.627927][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.627927][ T304] last function: wg_packet_decrypt_worker [ 103.641708][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.651222][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.661125][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 103.667452][ T304] Call Trace: [ 103.670578][ T304] [ 103.673360][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.677867][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.683171][ T304] ? __kasan_check_read+0x11/0x20 [ 103.688023][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.692970][ T304] ? strscpy+0x9c/0x260 [ 103.696962][ T304] dump_stack+0x15/0x1b [ 103.700957][ T304] process_one_work+0x94e/0xcb0 [ 103.705649][ T304] worker_thread+0xa60/0x1260 [ 103.710161][ T304] kthread+0x26d/0x300 [ 103.714060][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.718920][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.723348][ T304] ret_from_fork+0x1f/0x30 [ 103.727605][ T304] [ 103.730503][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.730503][ T304] last function: psi_avgs_work [ 103.743248][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.752770][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.762672][ T304] Workqueue: events psi_avgs_work [ 103.767533][ T304] Call Trace: [ 103.770647][ T304] [ 103.773427][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.777940][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.783236][ T304] ? __kasan_check_read+0x11/0x20 [ 103.788094][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.793042][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 103.798282][ T304] dump_stack+0x15/0x1b [ 103.802241][ T304] process_one_work+0x94e/0xcb0 [ 103.807020][ T304] worker_thread+0xa60/0x1260 [ 103.811535][ T304] kthread+0x26d/0x300 [ 103.815433][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.820295][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.824758][ T304] ret_from_fork+0x1f/0x30 [ 103.829091][ T304] [ 103.832343][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.832343][ T304] last function: wg_packet_decrypt_worker [ 103.846248][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.855759][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.865656][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 103.871993][ T304] Call Trace: [ 103.875115][ T304] [ 103.877900][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.882406][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.887705][ T304] ? __kasan_check_read+0x11/0x20 [ 103.892560][ T304] ? read_word_at_a_time+0x12/0x20 [ 103.897508][ T304] ? strscpy+0x9c/0x260 [ 103.901498][ T304] dump_stack+0x15/0x1b [ 103.905492][ T304] process_one_work+0x94e/0xcb0 [ 103.910182][ T304] worker_thread+0xa60/0x1260 [ 103.914705][ T304] kthread+0x26d/0x300 [ 103.918598][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 103.923460][ T304] ? kthread_blkcg+0xd0/0xd0 [ 103.927885][ T304] ret_from_fork+0x1f/0x30 [ 103.932141][ T304] [ 103.935153][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 103.935153][ T304] last function: wg_packet_encrypt_worker [ 103.948862][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 103.958396][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 103.968290][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 103.974632][ T304] Call Trace: [ 103.977749][ T304] [ 103.980529][ T304] dump_stack_lvl+0x151/0x1b7 [ 103.985044][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 103.990335][ T304] ? __kasan_check_read+0x11/0x20 [ 103.995196][ T304] ? read_word_at_a_time+0x12/0x20 [ 104.000145][ T304] ? strscpy+0x9c/0x260 [ 104.004142][ T304] dump_stack+0x15/0x1b [ 104.008128][ T304] process_one_work+0x94e/0xcb0 [ 104.012821][ T304] worker_thread+0xa60/0x1260 [ 104.017332][ T304] kthread+0x26d/0x300 [ 104.021234][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.026099][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.030523][ T304] ret_from_fork+0x1f/0x30 [ 104.034781][ T304] [ 104.037984][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.037984][ T304] last function: mld_ifc_work [ 104.050671][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.060220][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.070101][ T304] Workqueue: mld mld_ifc_work [ 104.074608][ T304] Call Trace: [ 104.077739][ T304] [ 104.080514][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.085032][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.090322][ T304] ? __kasan_check_read+0x11/0x20 [ 104.095181][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 104.100387][ T304] dump_stack+0x15/0x1b [ 104.104382][ T304] process_one_work+0x94e/0xcb0 [ 104.109074][ T304] worker_thread+0xa60/0x1260 [ 104.113597][ T304] kthread+0x26d/0x300 [ 104.117484][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.122351][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.126779][ T304] ret_from_fork+0x1f/0x30 [ 104.131027][ T304] [ 104.134113][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.134113][ T304] last function: vmstat_update [ 104.146865][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.156398][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.166297][ T304] Workqueue: mm_percpu_wq vmstat_update [ 104.171674][ T304] Call Trace: [ 104.174799][ T304] [ 104.177583][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.182090][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.187385][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 104.192598][ T304] dump_stack+0x15/0x1b [ 104.196588][ T304] process_one_work+0x94e/0xcb0 [ 104.201276][ T304] worker_thread+0xa60/0x1260 [ 104.206138][ T304] kthread+0x26d/0x300 [ 104.210036][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.214897][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.219326][ T304] ret_from_fork+0x1f/0x30 [ 104.223582][ T304] [ 104.226599][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.226599][ T304] last function: vmstat_shepherd [ 104.239531][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.249060][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.258953][ T304] Workqueue: events vmstat_shepherd [ 104.263986][ T304] Call Trace: [ 104.267118][ T304] [ 104.269901][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.274402][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.279696][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 104.284907][ T304] dump_stack+0x15/0x1b [ 104.288897][ T304] process_one_work+0x94e/0xcb0 [ 104.293590][ T304] worker_thread+0xa60/0x1260 [ 104.298104][ T304] kthread+0x26d/0x300 [ 104.302005][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.306861][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.311288][ T304] ret_from_fork+0x1f/0x30 [ 104.315545][ T304] [ 104.318430][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.318430][ T304] last function: wg_packet_encrypt_worker [ 104.332132][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.341668][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.351561][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 104.357906][ T304] Call Trace: [ 104.361020][ T304] [ 104.363814][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.368322][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.373604][ T304] ? __kasan_check_read+0x11/0x20 [ 104.378464][ T304] ? read_word_at_a_time+0x12/0x20 [ 104.383412][ T304] ? strscpy+0x9c/0x260 [ 104.387493][ T304] dump_stack+0x15/0x1b [ 104.391485][ T304] process_one_work+0x94e/0xcb0 [ 104.396175][ T304] worker_thread+0xa60/0x1260 [ 104.400695][ T304] kthread+0x26d/0x300 [ 104.404592][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.409450][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.413876][ T304] ret_from_fork+0x1f/0x30 [ 104.418133][ T304] [ 104.421128][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.421128][ T304] last function: wg_packet_encrypt_worker [ 104.434834][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.444365][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.454260][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 104.460598][ T304] Call Trace: [ 104.463720][ T304] [ 104.466505][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.471015][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.476316][ T304] dump_stack+0x15/0x1b [ 104.480297][ T304] process_one_work+0x94e/0xcb0 [ 104.485001][ T304] worker_thread+0xa60/0x1260 [ 104.489514][ T304] kthread+0x26d/0x300 [ 104.493402][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.498267][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.502699][ T304] ret_from_fork+0x1f/0x30 [ 104.507292][ T304] [ 104.510207][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.510207][ T304] last function: wg_packet_decrypt_worker [ 104.523877][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.533420][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.543310][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 104.549648][ T304] Call Trace: [ 104.552771][ T304] [ 104.555547][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.560062][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.565356][ T304] ? __kasan_check_read+0x11/0x20 [ 104.570217][ T304] ? read_word_at_a_time+0x12/0x20 [ 104.575163][ T304] ? strscpy+0x9c/0x260 [ 104.579157][ T304] dump_stack+0x15/0x1b [ 104.583148][ T304] process_one_work+0x94e/0xcb0 [ 104.587841][ T304] worker_thread+0xa60/0x1260 [ 104.592357][ T304] kthread+0x26d/0x300 [ 104.596252][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.601113][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.605548][ T304] ret_from_fork+0x1f/0x30 [ 104.609796][ T304] [ 104.612786][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.612786][ T304] last function: wg_packet_encrypt_worker [ 104.626501][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.636031][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.645930][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 104.652263][ T304] Call Trace: [ 104.655386][ T304] [ 104.658164][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.662682][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.667971][ T304] ? __kasan_check_read+0x11/0x20 [ 104.672937][ T304] ? read_word_at_a_time+0x12/0x20 [ 104.677886][ T304] ? strscpy+0x9c/0x260 [ 104.681883][ T304] dump_stack+0x15/0x1b [ 104.685869][ T304] process_one_work+0x94e/0xcb0 [ 104.690560][ T304] worker_thread+0xa60/0x1260 [ 104.695072][ T304] kthread+0x26d/0x300 [ 104.699060][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.703921][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.708348][ T304] ret_from_fork+0x1f/0x30 [ 104.712603][ T304] [ 104.715740][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.715740][ T304] last function: wg_packet_tx_worker [ 104.729001][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.738536][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.748431][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 104.754339][ T304] Call Trace: [ 104.757458][ T304] [ 104.760240][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.764750][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.770049][ T304] dump_stack+0x15/0x1b [ 104.774034][ T304] process_one_work+0x94e/0xcb0 [ 104.778735][ T304] worker_thread+0xa60/0x1260 [ 104.783253][ T304] kthread+0x26d/0x300 [ 104.787141][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.792004][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.796433][ T304] ret_from_fork+0x1f/0x30 [ 104.800687][ T304] [ 104.803668][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.803668][ T304] last function: mld_ifc_work [ 104.816333][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.825862][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.835753][ T304] Workqueue: mld mld_ifc_work [ 104.840270][ T304] Call Trace: [ 104.843391][ T304] [ 104.846170][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.850683][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.855977][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 104.861183][ T304] dump_stack+0x15/0x1b [ 104.865365][ T304] process_one_work+0x94e/0xcb0 [ 104.870055][ T304] worker_thread+0xa60/0x1260 [ 104.874571][ T304] kthread+0x26d/0x300 [ 104.878469][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.883330][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.887758][ T304] ret_from_fork+0x1f/0x30 [ 104.892016][ T304] [ 104.895073][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.895073][ T304] last function: wg_packet_tx_worker [ 104.908334][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 104.917869][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 104.927772][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 104.933665][ T304] Call Trace: [ 104.936795][ T304] [ 104.939568][ T304] dump_stack_lvl+0x151/0x1b7 [ 104.944081][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.949379][ T304] dump_stack+0x15/0x1b [ 104.953370][ T304] process_one_work+0x94e/0xcb0 [ 104.958060][ T304] worker_thread+0xa60/0x1260 [ 104.962577][ T304] kthread+0x26d/0x300 [ 104.966473][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 104.971332][ T304] ? kthread_blkcg+0xd0/0xd0 [ 104.975761][ T304] ret_from_fork+0x1f/0x30 [ 104.980033][ T304] [ 104.983218][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 104.983218][ T304] last function: wg_packet_tx_worker [ 104.996600][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.006038][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.015933][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 105.021833][ T304] Call Trace: [ 105.024960][ T304] [ 105.027737][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.032253][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.037542][ T304] ? __kasan_check_read+0x11/0x20 [ 105.042408][ T304] dump_stack+0x15/0x1b [ 105.046399][ T304] process_one_work+0x94e/0xcb0 [ 105.051087][ T304] worker_thread+0xa60/0x1260 [ 105.055602][ T304] kthread+0x26d/0x300 [ 105.059503][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.064363][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.068795][ T304] ret_from_fork+0x1f/0x30 [ 105.073047][ T304] [ 105.075944][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.075944][ T304] last function: wg_packet_encrypt_worker [ 105.089631][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.099166][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.109064][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 105.115399][ T304] Call Trace: [ 105.118522][ T304] [ 105.121300][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.125813][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.131106][ T304] ? __kasan_check_read+0x11/0x20 [ 105.135966][ T304] ? read_word_at_a_time+0x12/0x20 [ 105.140914][ T304] ? strscpy+0x9c/0x260 [ 105.144927][ T304] dump_stack+0x15/0x1b [ 105.148898][ T304] process_one_work+0x94e/0xcb0 [ 105.153606][ T304] worker_thread+0xa60/0x1260 [ 105.158107][ T304] kthread+0x26d/0x300 [ 105.162007][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.166866][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.171295][ T304] ret_from_fork+0x1f/0x30 [ 105.175547][ T304] [ 105.178495][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.178495][ T304] last function: wg_packet_tx_worker [ 105.191705][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.201236][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.211131][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 105.217031][ T304] Call Trace: [ 105.220158][ T304] [ 105.222936][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.227446][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.232746][ T304] dump_stack+0x15/0x1b [ 105.236745][ T304] process_one_work+0x94e/0xcb0 [ 105.241426][ T304] worker_thread+0xa60/0x1260 [ 105.245941][ T304] kthread+0x26d/0x300 [ 105.249838][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.254699][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.259125][ T304] ret_from_fork+0x1f/0x30 [ 105.263382][ T304] [ 105.266346][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.266346][ T304] last function: wg_packet_tx_worker [ 105.279534][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.289070][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.298964][ T304] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 105.304866][ T304] Call Trace: [ 105.307989][ T304] [ 105.310769][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.315281][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.320591][ T304] dump_stack+0x15/0x1b [ 105.324571][ T304] process_one_work+0x94e/0xcb0 [ 105.329257][ T304] worker_thread+0xa60/0x1260 [ 105.333774][ T304] kthread+0x26d/0x300 [ 105.337678][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.342535][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.346961][ T304] ret_from_fork+0x1f/0x30 [ 105.351216][ T304] [ 105.354242][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.354242][ T304] last function: wg_packet_tx_worker [ 105.367502][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.377035][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.386930][ T304] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 105.392834][ T304] Call Trace: [ 105.395973][ T304] [ 105.398737][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.403252][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.408597][ T304] dump_stack+0x15/0x1b [ 105.412537][ T304] process_one_work+0x94e/0xcb0 [ 105.417224][ T304] worker_thread+0xa60/0x1260 [ 105.421743][ T304] kthread+0x26d/0x300 [ 105.425645][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.430501][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.434925][ T304] ret_from_fork+0x1f/0x30 [ 105.439182][ T304] [ 105.442145][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.442145][ T304] last function: wg_packet_tx_worker [ 105.455334][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.464869][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.474767][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 105.480666][ T304] Call Trace: [ 105.483999][ T304] [ 105.486775][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.491287][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.496588][ T304] dump_stack+0x15/0x1b [ 105.500575][ T304] process_one_work+0x94e/0xcb0 [ 105.505269][ T304] worker_thread+0xa60/0x1260 [ 105.509781][ T304] kthread+0x26d/0x300 [ 105.513678][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.518542][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.522967][ T304] ret_from_fork+0x1f/0x30 [ 105.527224][ T304] [ 105.530334][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.530334][ T304] last function: wg_packet_decrypt_worker [ 105.544031][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.553567][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.563460][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 105.569809][ T304] Call Trace: [ 105.572921][ T304] [ 105.575698][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.580216][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.585509][ T304] ? __kasan_check_read+0x11/0x20 [ 105.590368][ T304] ? read_word_at_a_time+0x12/0x20 [ 105.595313][ T304] ? strscpy+0x9c/0x260 [ 105.599318][ T304] dump_stack+0x15/0x1b [ 105.603297][ T304] process_one_work+0x94e/0xcb0 [ 105.607988][ T304] worker_thread+0xa60/0x1260 [ 105.612506][ T304] kthread+0x26d/0x300 [ 105.616405][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.621266][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.625692][ T304] ret_from_fork+0x1f/0x30 [ 105.629947][ T304] [ 105.632866][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.632866][ T304] last function: wg_packet_encrypt_worker [ 105.646533][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.656070][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.665965][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 105.672299][ T304] Call Trace: [ 105.675422][ T304] [ 105.678202][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.682719][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.688012][ T304] ? __kasan_check_read+0x11/0x20 [ 105.692871][ T304] ? read_word_at_a_time+0x12/0x20 [ 105.697816][ T304] ? strscpy+0x9c/0x260 [ 105.701811][ T304] dump_stack+0x15/0x1b [ 105.705805][ T304] process_one_work+0x94e/0xcb0 [ 105.710498][ T304] worker_thread+0xa60/0x1260 [ 105.715008][ T304] kthread+0x26d/0x300 [ 105.718906][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.723882][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.728308][ T304] ret_from_fork+0x1f/0x30 [ 105.732566][ T304] [ 105.735517][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.735517][ T304] last function: mld_ifc_work [ 105.748108][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.757644][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.767539][ T304] Workqueue: mld mld_ifc_work [ 105.772077][ T304] Call Trace: [ 105.775174][ T304] [ 105.777953][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.782475][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.787761][ T304] ? __kasan_check_read+0x11/0x20 [ 105.792624][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 105.797832][ T304] dump_stack+0x15/0x1b [ 105.801824][ T304] process_one_work+0x94e/0xcb0 [ 105.806947][ T304] worker_thread+0xa60/0x1260 [ 105.811463][ T304] kthread+0x26d/0x300 [ 105.815361][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.820223][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.824653][ T304] ret_from_fork+0x1f/0x30 [ 105.828910][ T304] [ 105.831854][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.831854][ T304] last function: wg_packet_decrypt_worker [ 105.845496][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.855126][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.865021][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 105.871354][ T304] Call Trace: [ 105.874480][ T304] [ 105.877256][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.881770][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.887065][ T304] ? __kasan_check_read+0x11/0x20 [ 105.891925][ T304] ? read_word_at_a_time+0x12/0x20 [ 105.896873][ T304] ? strscpy+0x9c/0x260 [ 105.900867][ T304] dump_stack+0x15/0x1b [ 105.905264][ T304] process_one_work+0x94e/0xcb0 [ 105.909966][ T304] worker_thread+0xa60/0x1260 [ 105.914479][ T304] kthread+0x26d/0x300 [ 105.918379][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 105.923241][ T304] ? kthread_blkcg+0xd0/0xd0 [ 105.927668][ T304] ret_from_fork+0x1f/0x30 [ 105.931930][ T304] [ 105.934885][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 105.934885][ T304] last function: wg_packet_tx_worker [ 105.948076][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 105.957608][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 105.967510][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 105.973407][ T304] Call Trace: [ 105.976533][ T304] [ 105.979306][ T304] dump_stack_lvl+0x151/0x1b7 [ 105.983827][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 105.989119][ T304] dump_stack+0x15/0x1b [ 105.993108][ T304] process_one_work+0x94e/0xcb0 [ 105.997799][ T304] worker_thread+0xa60/0x1260 [ 106.002315][ T304] kthread+0x26d/0x300 [ 106.006213][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.011077][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.015502][ T304] ret_from_fork+0x1f/0x30 [ 106.019762][ T304] [ 106.022678][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.022678][ T304] last function: wg_packet_encrypt_worker [ 106.036348][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.045880][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.055773][ T304] Workqueue: wg-crypt-wg2 wg_packet_encrypt_worker [ 106.062115][ T304] Call Trace: [ 106.065235][ T304] [ 106.068012][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.072526][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.077819][ T304] ? __kasan_check_read+0x11/0x20 [ 106.082686][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.087626][ T304] ? strscpy+0x9c/0x260 [ 106.091619][ T304] dump_stack+0x15/0x1b [ 106.095610][ T304] process_one_work+0x94e/0xcb0 [ 106.100303][ T304] worker_thread+0xa60/0x1260 [ 106.104817][ T304] kthread+0x26d/0x300 [ 106.108717][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.113582][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.118005][ T304] ret_from_fork+0x1f/0x30 [ 106.122261][ T304] [ 106.125163][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.125163][ T304] last function: wg_packet_decrypt_worker [ 106.138860][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.148381][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.158274][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 106.164610][ T304] Call Trace: [ 106.167733][ T304] [ 106.170514][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.175027][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.180323][ T304] dump_stack+0x15/0x1b [ 106.184314][ T304] process_one_work+0x94e/0xcb0 [ 106.189001][ T304] worker_thread+0xa60/0x1260 [ 106.193518][ T304] kthread+0x26d/0x300 [ 106.197419][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.202278][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.207051][ T304] ret_from_fork+0x1f/0x30 [ 106.211448][ T304] [ 106.214513][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.214513][ T304] last function: wg_packet_tx_worker [ 106.227792][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.237322][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.247221][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 106.253122][ T304] Call Trace: [ 106.256243][ T304] [ 106.259022][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.263534][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.268831][ T304] dump_stack+0x15/0x1b [ 106.272823][ T304] process_one_work+0x94e/0xcb0 [ 106.277511][ T304] worker_thread+0xa60/0x1260 [ 106.282031][ T304] kthread+0x26d/0x300 [ 106.285928][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.290788][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.295217][ T304] ret_from_fork+0x1f/0x30 [ 106.299470][ T304] [ 106.302380][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.302380][ T304] last function: wg_packet_encrypt_worker [ 106.316059][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.325591][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.335487][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 106.341823][ T304] Call Trace: [ 106.344947][ T304] [ 106.347723][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.352241][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.357537][ T304] ? __kasan_check_read+0x11/0x20 [ 106.362392][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.367339][ T304] ? strscpy+0x9c/0x260 [ 106.371333][ T304] dump_stack+0x15/0x1b [ 106.375323][ T304] process_one_work+0x94e/0xcb0 [ 106.380014][ T304] worker_thread+0xa60/0x1260 [ 106.384532][ T304] kthread+0x26d/0x300 [ 106.388431][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.393291][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.397720][ T304] ret_from_fork+0x1f/0x30 [ 106.401972][ T304] [ 106.404941][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.404941][ T304] last function: wg_packet_tx_worker [ 106.418125][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.427661][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.437556][ T304] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 106.443456][ T304] Call Trace: [ 106.446580][ T304] [ 106.449360][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.453875][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.459167][ T304] dump_stack+0x15/0x1b [ 106.463158][ T304] process_one_work+0x94e/0xcb0 [ 106.467848][ T304] worker_thread+0xa60/0x1260 [ 106.472366][ T304] kthread+0x26d/0x300 [ 106.476262][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.481124][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.485552][ T304] ret_from_fork+0x1f/0x30 [ 106.489806][ T304] [ 106.492782][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.492782][ T304] last function: wg_packet_decrypt_worker [ 106.506393][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.515931][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.525825][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 106.532161][ T304] Call Trace: [ 106.535282][ T304] [ 106.538062][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.542574][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.547869][ T304] ? __kasan_check_read+0x11/0x20 [ 106.552732][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.557674][ T304] ? strscpy+0x9c/0x260 [ 106.561678][ T304] dump_stack+0x15/0x1b [ 106.565662][ T304] process_one_work+0x94e/0xcb0 [ 106.570353][ T304] worker_thread+0xa60/0x1260 [ 106.574866][ T304] kthread+0x26d/0x300 [ 106.578766][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.583627][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.588056][ T304] ret_from_fork+0x1f/0x30 [ 106.592313][ T304] [ 106.595222][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.595222][ T304] last function: wg_packet_encrypt_worker [ 106.608894][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.618430][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.628327][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 106.634660][ T304] Call Trace: [ 106.637785][ T304] [ 106.640563][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.645077][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.650373][ T304] ? __kasan_check_read+0x11/0x20 [ 106.655231][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.660186][ T304] ? strscpy+0x9c/0x260 [ 106.664170][ T304] dump_stack+0x15/0x1b [ 106.668166][ T304] process_one_work+0x94e/0xcb0 [ 106.672855][ T304] worker_thread+0xa60/0x1260 [ 106.677369][ T304] kthread+0x26d/0x300 [ 106.681270][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.686218][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.690648][ T304] ret_from_fork+0x1f/0x30 [ 106.694902][ T304] [ 106.697817][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.697817][ T304] last function: wg_packet_encrypt_worker [ 106.711487][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.721109][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.731004][ T304] Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker [ 106.737336][ T304] Call Trace: [ 106.740463][ T304] [ 106.743239][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.747751][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.753047][ T304] ? __kasan_check_read+0x11/0x20 [ 106.757904][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.762854][ T304] ? strscpy+0x9c/0x260 [ 106.766846][ T304] dump_stack+0x15/0x1b [ 106.770837][ T304] process_one_work+0x94e/0xcb0 [ 106.775527][ T304] worker_thread+0xa60/0x1260 [ 106.780043][ T304] kthread+0x26d/0x300 [ 106.783942][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.788895][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.793320][ T304] ret_from_fork+0x1f/0x30 [ 106.797576][ T304] [ 106.800517][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.800517][ T304] last function: wg_packet_tx_worker [ 106.813727][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.823266][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.833157][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 106.839145][ T304] Call Trace: [ 106.842274][ T304] [ 106.845048][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.849568][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.854855][ T304] dump_stack+0x15/0x1b [ 106.858846][ T304] process_one_work+0x94e/0xcb0 [ 106.863538][ T304] worker_thread+0xa60/0x1260 [ 106.868052][ T304] kthread+0x26d/0x300 [ 106.871951][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.876832][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.881240][ T304] ret_from_fork+0x1f/0x30 [ 106.885498][ T304] [ 106.888438][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.888438][ T304] last function: wg_packet_decrypt_worker [ 106.902112][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 106.912062][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 106.921946][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 106.928291][ T304] Call Trace: [ 106.931405][ T304] [ 106.934184][ T304] dump_stack_lvl+0x151/0x1b7 [ 106.938694][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.943987][ T304] ? __kasan_check_read+0x11/0x20 [ 106.948856][ T304] ? read_word_at_a_time+0x12/0x20 [ 106.953813][ T304] ? strscpy+0x9c/0x260 [ 106.957789][ T304] dump_stack+0x15/0x1b [ 106.961782][ T304] process_one_work+0x94e/0xcb0 [ 106.966477][ T304] worker_thread+0xa60/0x1260 [ 106.970989][ T304] kthread+0x26d/0x300 [ 106.974887][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 106.979749][ T304] ? kthread_blkcg+0xd0/0xd0 [ 106.984175][ T304] ret_from_fork+0x1f/0x30 [ 106.988431][ T304] [ 106.991366][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 106.991366][ T304] last function: wg_packet_tx_worker [ 107.004665][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.014220][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.024099][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 107.030002][ T304] Call Trace: [ 107.033125][ T304] [ 107.035902][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.040416][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.045715][ T304] dump_stack+0x15/0x1b [ 107.049702][ T304] process_one_work+0x94e/0xcb0 [ 107.054391][ T304] worker_thread+0xa60/0x1260 [ 107.058908][ T304] kthread+0x26d/0x300 [ 107.062809][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.067668][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.072098][ T304] ret_from_fork+0x1f/0x30 [ 107.076353][ T304] [ 107.079277][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.079277][ T304] last function: wg_packet_tx_worker [ 107.092505][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.102129][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.112457][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 107.118358][ T304] Call Trace: [ 107.121481][ T304] [ 107.124260][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.128773][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.134068][ T304] dump_stack+0x15/0x1b [ 107.138059][ T304] process_one_work+0x94e/0xcb0 [ 107.142750][ T304] worker_thread+0xa60/0x1260 [ 107.147267][ T304] kthread+0x26d/0x300 [ 107.151165][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.156027][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.160452][ T304] ret_from_fork+0x1f/0x30 [ 107.164714][ T304] [ 107.167588][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.167588][ T304] last function: wg_packet_decrypt_worker [ 107.181292][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.190828][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.200724][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 107.207057][ T304] Call Trace: [ 107.210184][ T304] [ 107.212960][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.217475][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.222768][ T304] ? __kasan_check_read+0x11/0x20 [ 107.227628][ T304] ? read_word_at_a_time+0x12/0x20 [ 107.232576][ T304] ? strscpy+0x9c/0x260 [ 107.236573][ T304] dump_stack+0x15/0x1b [ 107.240566][ T304] process_one_work+0x94e/0xcb0 [ 107.245251][ T304] worker_thread+0xa60/0x1260 [ 107.249767][ T304] kthread+0x26d/0x300 [ 107.253668][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.258531][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.262962][ T304] ret_from_fork+0x1f/0x30 [ 107.267211][ T304] [ 107.270097][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.270097][ T304] last function: psi_avgs_work [ 107.282842][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.292376][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.302276][ T304] Workqueue: events psi_avgs_work [ 107.307132][ T304] Call Trace: [ 107.310269][ T304] [ 107.313033][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.317546][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.322840][ T304] ? __kasan_check_read+0x11/0x20 [ 107.327700][ T304] ? read_word_at_a_time+0x12/0x20 [ 107.332735][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 107.337941][ T304] dump_stack+0x15/0x1b [ 107.341933][ T304] process_one_work+0x94e/0xcb0 [ 107.346625][ T304] worker_thread+0xa60/0x1260 [ 107.351142][ T304] kthread+0x26d/0x300 [ 107.355040][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.359903][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.364330][ T304] ret_from_fork+0x1f/0x30 [ 107.368586][ T304] [ 107.371563][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.371563][ T304] last function: wg_packet_decrypt_worker [ 107.385170][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.395017][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.405336][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 107.411662][ T304] Call Trace: [ 107.414790][ T304] [ 107.417568][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.422088][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.427374][ T304] ? __kasan_check_read+0x11/0x20 [ 107.432235][ T304] ? read_word_at_a_time+0x12/0x20 [ 107.437181][ T304] ? strscpy+0x9c/0x260 [ 107.441174][ T304] dump_stack+0x15/0x1b [ 107.445167][ T304] process_one_work+0x94e/0xcb0 [ 107.449860][ T304] worker_thread+0xa60/0x1260 [ 107.454376][ T304] kthread+0x26d/0x300 [ 107.458272][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.463135][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.467589][ T304] ret_from_fork+0x1f/0x30 [ 107.471817][ T304] [ 107.474753][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.474753][ T304] last function: wg_packet_encrypt_worker [ 107.488696][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.498216][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.508111][ T304] Workqueue: wg-crypt-wg2 wg_packet_encrypt_worker [ 107.514455][ T304] Call Trace: [ 107.517572][ T304] [ 107.520350][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.524864][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.530169][ T304] ? __kasan_check_read+0x11/0x20 [ 107.535016][ T304] ? read_word_at_a_time+0x12/0x20 [ 107.539965][ T304] ? strscpy+0x9c/0x260 [ 107.543957][ T304] dump_stack+0x15/0x1b [ 107.547949][ T304] process_one_work+0x94e/0xcb0 [ 107.552640][ T304] worker_thread+0xa60/0x1260 [ 107.557154][ T304] kthread+0x26d/0x300 [ 107.561053][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.565914][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.570346][ T304] ret_from_fork+0x1f/0x30 [ 107.574597][ T304] [ 107.577565][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.577565][ T304] last function: wg_packet_encrypt_worker [ 107.591269][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.600899][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.610788][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 107.617123][ T304] Call Trace: [ 107.620254][ T304] [ 107.623026][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.627540][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.632834][ T304] ? __kasan_check_read+0x11/0x20 [ 107.637694][ T304] ? read_word_at_a_time+0x12/0x20 [ 107.642643][ T304] ? strscpy+0x9c/0x260 [ 107.646632][ T304] dump_stack+0x15/0x1b [ 107.650625][ T304] process_one_work+0x94e/0xcb0 [ 107.655317][ T304] worker_thread+0xa60/0x1260 [ 107.659831][ T304] kthread+0x26d/0x300 [ 107.663729][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.668591][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.673019][ T304] ret_from_fork+0x1f/0x30 [ 107.677274][ T304] [ 107.680204][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.680204][ T304] last function: mld_ifc_work [ 107.692819][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.702357][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.712685][ T304] Workqueue: mld mld_ifc_work [ 107.717196][ T304] Call Trace: [ 107.720319][ T304] [ 107.723097][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.727613][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.732905][ T304] ? __kasan_check_read+0x11/0x20 [ 107.737765][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 107.742973][ T304] dump_stack+0x15/0x1b [ 107.746965][ T304] process_one_work+0x94e/0xcb0 [ 107.751656][ T304] worker_thread+0xa60/0x1260 [ 107.756171][ T304] kthread+0x26d/0x300 [ 107.760070][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.764932][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.769359][ T304] ret_from_fork+0x1f/0x30 [ 107.773613][ T304] [ 107.776505][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.776505][ T304] last function: vmstat_shepherd [ 107.789416][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.798955][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.808848][ T304] Workqueue: events vmstat_shepherd [ 107.813880][ T304] Call Trace: [ 107.817007][ T304] [ 107.819785][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.824297][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.829592][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 107.834802][ T304] dump_stack+0x15/0x1b [ 107.838795][ T304] process_one_work+0x94e/0xcb0 [ 107.843482][ T304] worker_thread+0xa60/0x1260 [ 107.847997][ T304] kthread+0x26d/0x300 [ 107.851897][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.856755][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.861184][ T304] ret_from_fork+0x1f/0x30 [ 107.865528][ T304] [ 107.868407][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.868407][ T304] last function: vmstat_update [ 107.881164][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.890694][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.900592][ T304] Workqueue: mm_percpu_wq vmstat_update [ 107.905967][ T304] Call Trace: [ 107.909096][ T304] [ 107.911872][ T304] dump_stack_lvl+0x151/0x1b7 [ 107.916386][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 107.921678][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 107.926888][ T304] dump_stack+0x15/0x1b [ 107.930878][ T304] process_one_work+0x94e/0xcb0 [ 107.935567][ T304] worker_thread+0xa60/0x1260 [ 107.940084][ T304] kthread+0x26d/0x300 [ 107.943982][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 107.948847][ T304] ? kthread_blkcg+0xd0/0xd0 [ 107.953284][ T304] ret_from_fork+0x1f/0x30 [ 107.957529][ T304] [ 107.960502][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 107.960502][ T304] last function: wg_packet_tx_worker [ 107.973790][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 107.983327][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 107.993230][ T304] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 107.999121][ T304] Call Trace: [ 108.002250][ T304] [ 108.005023][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.009535][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.016667][ T304] dump_stack+0x15/0x1b [ 108.020656][ T304] process_one_work+0x94e/0xcb0 [ 108.025358][ T304] worker_thread+0xa60/0x1260 [ 108.029997][ T304] kthread+0x26d/0x300 [ 108.033891][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.038840][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.043265][ T304] ret_from_fork+0x1f/0x30 [ 108.047526][ T304] [ 108.050477][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.050477][ T304] last function: wg_packet_tx_worker [ 108.063674][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.073210][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.083105][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 108.089006][ T304] Call Trace: [ 108.092132][ T304] [ 108.094909][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.099421][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.104734][ T304] dump_stack+0x15/0x1b [ 108.108708][ T304] process_one_work+0x94e/0xcb0 [ 108.113398][ T304] worker_thread+0xa60/0x1260 [ 108.117920][ T304] kthread+0x26d/0x300 [ 108.121816][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.126679][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.131112][ T304] ret_from_fork+0x1f/0x30 [ 108.135445][ T304] [ 108.138463][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.138463][ T304] last function: wg_packet_encrypt_worker [ 108.152175][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.161707][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.171714][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 108.178150][ T304] Call Trace: [ 108.181277][ T304] [ 108.184052][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.188568][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.193866][ T304] ? __kasan_check_read+0x11/0x20 [ 108.198724][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.203682][ T304] ? strscpy+0x9c/0x260 [ 108.207664][ T304] dump_stack+0x15/0x1b [ 108.211650][ T304] process_one_work+0x94e/0xcb0 [ 108.216361][ T304] worker_thread+0xa60/0x1260 [ 108.220866][ T304] kthread+0x26d/0x300 [ 108.224759][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.229616][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.234046][ T304] ret_from_fork+0x1f/0x30 [ 108.238386][ T304] [ 108.241343][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.241343][ T304] last function: wg_packet_encrypt_worker [ 108.254970][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.264620][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.274501][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 108.280834][ T304] Call Trace: [ 108.283960][ T304] [ 108.286738][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.291249][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.296544][ T304] ? __kasan_check_read+0x11/0x20 [ 108.301403][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.306795][ T304] ? strscpy+0x9c/0x260 [ 108.310788][ T304] dump_stack+0x15/0x1b [ 108.314776][ T304] process_one_work+0x94e/0xcb0 [ 108.319471][ T304] worker_thread+0xa60/0x1260 [ 108.324131][ T304] kthread+0x26d/0x300 [ 108.328015][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.332876][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.337304][ T304] ret_from_fork+0x1f/0x30 [ 108.341557][ T304] [ 108.344441][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.344441][ T304] last function: kfree_rcu_monitor [ 108.357533][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.367073][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.376966][ T304] Workqueue: events kfree_rcu_monitor [ 108.382176][ T304] Call Trace: [ 108.385298][ T304] [ 108.388075][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.392591][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.397882][ T304] ? kfree_rcu_monitor+0x796/0x800 [ 108.402834][ T304] dump_stack+0x15/0x1b [ 108.406822][ T304] process_one_work+0x94e/0xcb0 [ 108.411512][ T304] worker_thread+0xa60/0x1260 [ 108.416028][ T304] kthread+0x26d/0x300 [ 108.419927][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.424791][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.429225][ T304] ret_from_fork+0x1f/0x30 [ 108.433470][ T304] [ 108.436421][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.436421][ T304] last function: wg_packet_tx_worker [ 108.449622][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.459158][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.469055][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 108.474953][ T304] Call Trace: [ 108.478078][ T304] [ 108.480859][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.485370][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.490664][ T304] dump_stack+0x15/0x1b [ 108.494656][ T304] process_one_work+0x94e/0xcb0 [ 108.499347][ T304] worker_thread+0xa60/0x1260 [ 108.503861][ T304] kthread+0x26d/0x300 [ 108.507760][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.512622][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.517049][ T304] ret_from_fork+0x1f/0x30 [ 108.521305][ T304] [ 108.524219][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.524219][ T304] last function: wg_packet_decrypt_worker [ 108.537887][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.547512][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.557409][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 108.563742][ T304] Call Trace: [ 108.566867][ T304] [ 108.569643][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.574159][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.579457][ T304] ? __kasan_check_read+0x11/0x20 [ 108.584316][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.589265][ T304] ? strscpy+0x9c/0x260 [ 108.593270][ T304] dump_stack+0x15/0x1b [ 108.597248][ T304] process_one_work+0x94e/0xcb0 [ 108.601934][ T304] worker_thread+0xa60/0x1260 [ 108.606454][ T304] kthread+0x26d/0x300 [ 108.610351][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.615209][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.619639][ T304] ret_from_fork+0x1f/0x30 [ 108.623893][ T304] [ 108.626772][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.626772][ T304] last function: wg_packet_decrypt_worker [ 108.640482][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.650014][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.659911][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 108.666362][ T304] Call Trace: [ 108.669485][ T304] [ 108.672262][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.676775][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.682070][ T304] ? __kasan_check_read+0x11/0x20 [ 108.686927][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.691876][ T304] ? strscpy+0x9c/0x260 [ 108.695869][ T304] dump_stack+0x15/0x1b [ 108.699864][ T304] process_one_work+0x94e/0xcb0 [ 108.704666][ T304] worker_thread+0xa60/0x1260 [ 108.709179][ T304] kthread+0x26d/0x300 [ 108.713078][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.717937][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.722387][ T304] ret_from_fork+0x1f/0x30 [ 108.726623][ T304] [ 108.729538][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.729538][ T304] last function: wg_packet_decrypt_worker [ 108.743308][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.752833][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.762728][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 108.769064][ T304] Call Trace: [ 108.772190][ T304] [ 108.774963][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.779475][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.784774][ T304] ? __kasan_check_read+0x11/0x20 [ 108.789631][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.794577][ T304] ? strscpy+0x9c/0x260 [ 108.798571][ T304] dump_stack+0x15/0x1b [ 108.802563][ T304] process_one_work+0x94e/0xcb0 [ 108.807254][ T304] worker_thread+0xa60/0x1260 [ 108.811769][ T304] kthread+0x26d/0x300 [ 108.815682][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.820529][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.824955][ T304] ret_from_fork+0x1f/0x30 [ 108.829210][ T304] [ 108.832343][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.832343][ T304] last function: wg_packet_decrypt_worker [ 108.846051][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.855575][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.865475][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 108.871807][ T304] Call Trace: [ 108.874932][ T304] [ 108.877710][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.882223][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.887518][ T304] ? __kasan_check_read+0x11/0x20 [ 108.892377][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.897321][ T304] ? strscpy+0x9c/0x260 [ 108.901316][ T304] dump_stack+0x15/0x1b [ 108.905308][ T304] process_one_work+0x94e/0xcb0 [ 108.909999][ T304] worker_thread+0xa60/0x1260 [ 108.914511][ T304] kthread+0x26d/0x300 [ 108.918415][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 108.923275][ T304] ? kthread_blkcg+0xd0/0xd0 [ 108.927699][ T304] ret_from_fork+0x1f/0x30 [ 108.931956][ T304] [ 108.934855][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 108.934855][ T304] last function: wg_packet_decrypt_worker [ 108.948543][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 108.958078][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 108.967972][ T304] Workqueue: wg-crypt-wg0 wg_packet_decrypt_worker [ 108.974308][ T304] Call Trace: [ 108.977432][ T304] [ 108.980210][ T304] dump_stack_lvl+0x151/0x1b7 [ 108.984743][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 108.990017][ T304] ? __kasan_check_read+0x11/0x20 [ 108.994881][ T304] ? read_word_at_a_time+0x12/0x20 [ 108.999826][ T304] ? strscpy+0x9c/0x260 [ 109.003818][ T304] dump_stack+0x15/0x1b [ 109.007808][ T304] process_one_work+0x94e/0xcb0 [ 109.012502][ T304] worker_thread+0xa60/0x1260 [ 109.017015][ T304] kthread+0x26d/0x300 [ 109.020914][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.025787][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.030210][ T304] ret_from_fork+0x1f/0x30 [ 109.034459][ T304] [ 109.037405][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.037405][ T304] last function: wg_packet_tx_worker [ 109.050606][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.060145][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.070040][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 109.075950][ T304] Call Trace: [ 109.079069][ T304] [ 109.081846][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.086358][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.091740][ T304] ? __kasan_check_read+0x11/0x20 [ 109.096602][ T304] dump_stack+0x15/0x1b [ 109.100592][ T304] process_one_work+0x94e/0xcb0 [ 109.105287][ T304] worker_thread+0xa60/0x1260 [ 109.109800][ T304] kthread+0x26d/0x300 [ 109.113698][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.118560][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.122985][ T304] ret_from_fork+0x1f/0x30 [ 109.127250][ T304] [ 109.130183][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.130183][ T304] last function: wg_packet_tx_worker [ 109.143395][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.152930][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.162827][ T304] Workqueue: wg-crypt-wg2 wg_packet_tx_worker [ 109.168727][ T304] Call Trace: [ 109.171851][ T304] [ 109.174629][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.179145][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.184437][ T304] dump_stack+0x15/0x1b [ 109.188429][ T304] process_one_work+0x94e/0xcb0 [ 109.193117][ T304] worker_thread+0xa60/0x1260 [ 109.197635][ T304] kthread+0x26d/0x300 [ 109.201532][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.206393][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.210820][ T304] ret_from_fork+0x1f/0x30 [ 109.215076][ T304] [ 109.217969][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.217969][ T304] last function: wg_packet_decrypt_worker [ 109.231672][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.241202][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.251185][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 109.257521][ T304] Call Trace: [ 109.260645][ T304] [ 109.263423][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.267935][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.273229][ T304] ? __kasan_check_read+0x11/0x20 [ 109.278088][ T304] ? read_word_at_a_time+0x12/0x20 [ 109.283043][ T304] ? strscpy+0x9c/0x260 [ 109.287040][ T304] dump_stack+0x15/0x1b [ 109.291020][ T304] process_one_work+0x94e/0xcb0 [ 109.295712][ T304] worker_thread+0xa60/0x1260 [ 109.300232][ T304] kthread+0x26d/0x300 [ 109.304215][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.309073][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.313499][ T304] ret_from_fork+0x1f/0x30 [ 109.317757][ T304] [ 109.320725][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.320725][ T304] last function: mld_ifc_work [ 109.333301][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.342840][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.352835][ T304] Workqueue: mld mld_ifc_work [ 109.357341][ T304] Call Trace: [ 109.360468][ T304] [ 109.363258][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.367757][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.373058][ T304] ? __kasan_check_read+0x11/0x20 [ 109.377915][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 109.383122][ T304] dump_stack+0x15/0x1b [ 109.387114][ T304] process_one_work+0x94e/0xcb0 [ 109.391803][ T304] worker_thread+0xa60/0x1260 [ 109.396318][ T304] kthread+0x26d/0x300 [ 109.400220][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.405086][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.409507][ T304] ret_from_fork+0x1f/0x30 [ 109.413760][ T304] [ 109.416902][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.416902][ T304] last function: wg_packet_tx_worker [ 109.430182][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.439711][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.449605][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 109.455505][ T304] Call Trace: [ 109.458629][ T304] [ 109.461409][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.465956][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.471222][ T304] dump_stack+0x15/0x1b [ 109.475208][ T304] process_one_work+0x94e/0xcb0 [ 109.479900][ T304] worker_thread+0xa60/0x1260 [ 109.484418][ T304] kthread+0x26d/0x300 [ 109.488325][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.493175][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.497602][ T304] ret_from_fork+0x1f/0x30 [ 109.501858][ T304] [ 109.504764][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.504764][ T304] last function: wg_packet_encrypt_worker [ 109.518443][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.527996][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.537961][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 109.544295][ T304] Call Trace: [ 109.547421][ T304] [ 109.550199][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.554711][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.560004][ T304] ? __kasan_check_read+0x11/0x20 [ 109.564865][ T304] ? read_word_at_a_time+0x12/0x20 [ 109.569811][ T304] ? strscpy+0x9c/0x260 [ 109.573805][ T304] dump_stack+0x15/0x1b [ 109.577797][ T304] process_one_work+0x94e/0xcb0 [ 109.582677][ T304] worker_thread+0xa60/0x1260 [ 109.587191][ T304] kthread+0x26d/0x300 [ 109.591088][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.595949][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.600377][ T304] ret_from_fork+0x1f/0x30 [ 109.604632][ T304] [ 109.607510][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.607510][ T304] last function: wg_packet_decrypt_worker [ 109.621214][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.630838][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.640740][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 109.647069][ T304] Call Trace: [ 109.650194][ T304] [ 109.652974][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.657485][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.662780][ T304] ? __kasan_check_read+0x11/0x20 [ 109.667642][ T304] ? read_word_at_a_time+0x12/0x20 [ 109.672588][ T304] ? strscpy+0x9c/0x260 [ 109.676578][ T304] dump_stack+0x15/0x1b [ 109.680572][ T304] process_one_work+0x94e/0xcb0 [ 109.685268][ T304] worker_thread+0xa60/0x1260 [ 109.689778][ T304] kthread+0x26d/0x300 [ 109.693676][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.698556][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.702968][ T304] ret_from_fork+0x1f/0x30 [ 109.707568][ T304] [ 109.710502][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.710502][ T304] last function: wg_packet_tx_worker [ 109.723717][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.733256][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.743153][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 109.749050][ T304] Call Trace: [ 109.752178][ T304] [ 109.754952][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.759469][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.764765][ T304] dump_stack+0x15/0x1b [ 109.768754][ T304] process_one_work+0x94e/0xcb0 [ 109.773442][ T304] worker_thread+0xa60/0x1260 [ 109.777957][ T304] kthread+0x26d/0x300 [ 109.781858][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.786718][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.791160][ T304] ret_from_fork+0x1f/0x30 [ 109.795402][ T304] [ 109.798297][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.798297][ T304] last function: wg_packet_encrypt_worker [ 109.811984][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.821524][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.831417][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 109.837754][ T304] Call Trace: [ 109.840964][ T304] [ 109.843740][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.848256][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.853551][ T304] ? __kasan_check_read+0x11/0x20 [ 109.858411][ T304] ? read_word_at_a_time+0x12/0x20 [ 109.863357][ T304] ? strscpy+0x9c/0x260 [ 109.867350][ T304] dump_stack+0x15/0x1b [ 109.871340][ T304] process_one_work+0x94e/0xcb0 [ 109.876031][ T304] worker_thread+0xa60/0x1260 [ 109.880548][ T304] kthread+0x26d/0x300 [ 109.884447][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.889309][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.893735][ T304] ret_from_fork+0x1f/0x30 [ 109.898001][ T304] [ 109.900913][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 109.900913][ T304] last function: wg_packet_encrypt_worker [ 109.914575][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 109.924115][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 109.934013][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 109.940342][ T304] Call Trace: [ 109.943469][ T304] [ 109.946247][ T304] dump_stack_lvl+0x151/0x1b7 [ 109.950761][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 109.956054][ T304] ? __kasan_check_read+0x11/0x20 [ 109.960911][ T304] ? read_word_at_a_time+0x12/0x20 [ 109.965862][ T304] ? strscpy+0x9c/0x260 [ 109.969853][ T304] dump_stack+0x15/0x1b [ 109.973845][ T304] process_one_work+0x94e/0xcb0 [ 109.978625][ T304] worker_thread+0xa60/0x1260 [ 109.983141][ T304] kthread+0x26d/0x300 [ 109.987047][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 109.991901][ T304] ? kthread_blkcg+0xd0/0xd0 [ 109.996324][ T304] ret_from_fork+0x1f/0x30 [ 110.000581][ T304] [ 110.003601][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.003601][ T304] last function: wg_packet_encrypt_worker [ 110.017276][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.026812][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.036713][ T304] Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker [ 110.043048][ T304] Call Trace: [ 110.046172][ T304] [ 110.048949][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.053469][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.058761][ T304] dump_stack+0x15/0x1b [ 110.062749][ T304] process_one_work+0x94e/0xcb0 [ 110.067442][ T304] worker_thread+0xa60/0x1260 [ 110.071958][ T304] kthread+0x26d/0x300 [ 110.075853][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.080714][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.085144][ T304] ret_from_fork+0x1f/0x30 [ 110.089396][ T304] [ 110.092445][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.092445][ T304] last function: vmstat_update [ 110.105692][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.115164][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.125059][ T304] Workqueue: mm_percpu_wq vmstat_update [ 110.130439][ T304] Call Trace: [ 110.133564][ T304] [ 110.136348][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.140855][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.146148][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 110.151359][ T304] dump_stack+0x15/0x1b [ 110.155351][ T304] process_one_work+0x94e/0xcb0 [ 110.160050][ T304] worker_thread+0xa60/0x1260 [ 110.164557][ T304] kthread+0x26d/0x300 [ 110.168455][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.173314][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.177740][ T304] ret_from_fork+0x1f/0x30 [ 110.181997][ T304] [ 110.184908][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.184908][ T304] last function: vmstat_shepherd [ 110.197972][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.207504][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.217401][ T304] Workqueue: events vmstat_shepherd [ 110.222434][ T304] Call Trace: [ 110.225560][ T304] [ 110.228337][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.232851][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.238144][ T304] ? round_jiffies_relative+0xcf/0xf0 [ 110.243366][ T304] dump_stack+0x15/0x1b [ 110.247343][ T304] process_one_work+0x94e/0xcb0 [ 110.252050][ T304] worker_thread+0xa60/0x1260 [ 110.256550][ T304] kthread+0x26d/0x300 [ 110.260452][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.265323][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.269737][ T304] ret_from_fork+0x1f/0x30 [ 110.273991][ T304] [ 110.276870][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.276870][ T304] last function: wg_packet_decrypt_worker [ 110.290577][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.300119][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.310011][ T304] Workqueue: wg-crypt-wg2 wg_packet_decrypt_worker [ 110.316344][ T304] Call Trace: [ 110.319469][ T304] [ 110.322251][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.326760][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.332078][ T304] ? __kasan_check_read+0x11/0x20 [ 110.336913][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.341988][ T304] ? strscpy+0x9c/0x260 [ 110.345976][ T304] dump_stack+0x15/0x1b [ 110.349970][ T304] process_one_work+0x94e/0xcb0 [ 110.354656][ T304] worker_thread+0xa60/0x1260 [ 110.359175][ T304] kthread+0x26d/0x300 [ 110.363071][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.367932][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.372360][ T304] ret_from_fork+0x1f/0x30 [ 110.376614][ T304] [ 110.379495][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.379495][ T304] last function: wg_packet_decrypt_worker [ 110.393203][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.402826][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.412728][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 110.419055][ T304] Call Trace: [ 110.422178][ T304] [ 110.424957][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.429469][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.434761][ T304] ? __kasan_check_read+0x11/0x20 [ 110.439623][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.444573][ T304] ? strscpy+0x9c/0x260 [ 110.448563][ T304] dump_stack+0x15/0x1b [ 110.452556][ T304] process_one_work+0x94e/0xcb0 [ 110.457247][ T304] worker_thread+0xa60/0x1260 [ 110.461766][ T304] kthread+0x26d/0x300 [ 110.465748][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.470608][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.475034][ T304] ret_from_fork+0x1f/0x30 [ 110.479292][ T304] [ 110.482181][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.482181][ T304] last function: psi_avgs_work [ 110.494918][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.504475][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.514352][ T304] Workqueue: events psi_avgs_work [ 110.519213][ T304] Call Trace: [ 110.522337][ T304] [ 110.525114][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.529636][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.534921][ T304] ? __kasan_check_read+0x11/0x20 [ 110.539868][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.544818][ T304] ? pwq_dec_nr_in_flight+0x191/0x3d0 [ 110.550022][ T304] dump_stack+0x15/0x1b [ 110.554016][ T304] process_one_work+0x94e/0xcb0 [ 110.558705][ T304] worker_thread+0xa60/0x1260 [ 110.563222][ T304] kthread+0x26d/0x300 [ 110.567121][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.571982][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.576407][ T304] ret_from_fork+0x1f/0x30 [ 110.580754][ T304] [ 110.583687][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.583687][ T304] last function: mld_ifc_work [ 110.596292][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.605831][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.615729][ T304] Workqueue: mld mld_ifc_work [ 110.620247][ T304] Call Trace: [ 110.623366][ T304] [ 110.626140][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.630655][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.635954][ T304] dump_stack+0x15/0x1b [ 110.639950][ T304] process_one_work+0x94e/0xcb0 [ 110.644634][ T304] worker_thread+0xa60/0x1260 [ 110.649153][ T304] kthread+0x26d/0x300 [ 110.653050][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.657907][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.662338][ T304] ret_from_fork+0x1f/0x30 [ 110.666589][ T304] [ 110.669520][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.669520][ T304] last function: wg_packet_decrypt_worker [ 110.683196][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.692713][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.702719][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 110.709044][ T304] Call Trace: [ 110.712158][ T304] [ 110.714932][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.719447][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.724742][ T304] ? __kasan_check_read+0x11/0x20 [ 110.729598][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.734547][ T304] ? strscpy+0x9c/0x260 [ 110.738548][ T304] dump_stack+0x15/0x1b [ 110.742534][ T304] process_one_work+0x94e/0xcb0 [ 110.747222][ T304] worker_thread+0xa60/0x1260 [ 110.751736][ T304] kthread+0x26d/0x300 [ 110.755635][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.760501][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.764933][ T304] ret_from_fork+0x1f/0x30 [ 110.769180][ T304] [ 110.772101][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.772101][ T304] last function: wg_packet_encrypt_worker [ 110.785760][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.795299][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.805196][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 110.811529][ T304] Call Trace: [ 110.814653][ T304] [ 110.817430][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.821947][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.827240][ T304] ? __kasan_check_read+0x11/0x20 [ 110.832122][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.837069][ T304] ? strscpy+0x9c/0x260 [ 110.841042][ T304] dump_stack+0x15/0x1b [ 110.845031][ T304] process_one_work+0x94e/0xcb0 [ 110.849722][ T304] worker_thread+0xa60/0x1260 [ 110.854248][ T304] kthread+0x26d/0x300 [ 110.858136][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.863000][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.867425][ T304] ret_from_fork+0x1f/0x30 [ 110.871679][ T304] [ 110.874605][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.874605][ T304] last function: wg_packet_decrypt_worker [ 110.888264][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.897801][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 110.907696][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 110.914029][ T304] Call Trace: [ 110.917157][ T304] [ 110.919933][ T304] dump_stack_lvl+0x151/0x1b7 [ 110.924451][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.929745][ T304] ? __kasan_check_read+0x11/0x20 [ 110.934601][ T304] ? read_word_at_a_time+0x12/0x20 [ 110.939548][ T304] ? strscpy+0x9c/0x260 [ 110.943540][ T304] dump_stack+0x15/0x1b [ 110.947535][ T304] process_one_work+0x94e/0xcb0 [ 110.952226][ T304] worker_thread+0xa60/0x1260 [ 110.956741][ T304] kthread+0x26d/0x300 [ 110.960638][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 110.965502][ T304] ? kthread_blkcg+0xd0/0xd0 [ 110.969944][ T304] ret_from_fork+0x1f/0x30 [ 110.974197][ T304] [ 110.977121][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 110.977121][ T304] last function: wg_packet_tx_worker [ 110.990426][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 110.999958][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.009938][ T304] Workqueue: wg-crypt-wg1 wg_packet_tx_worker [ 111.015842][ T304] Call Trace: [ 111.018965][ T304] [ 111.021744][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.026254][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.031553][ T304] dump_stack+0x15/0x1b [ 111.035560][ T304] process_one_work+0x94e/0xcb0 [ 111.040339][ T304] worker_thread+0xa60/0x1260 [ 111.044853][ T304] kthread+0x26d/0x300 [ 111.048752][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.053612][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.058038][ T304] ret_from_fork+0x1f/0x30 [ 111.062296][ T304] [ 111.065194][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 111.065194][ T304] last function: wg_packet_encrypt_worker [ 111.078880][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 111.088414][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.098313][ T304] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 111.104646][ T304] Call Trace: [ 111.107771][ T304] [ 111.110549][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.115151][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.120444][ T304] ? __kasan_check_read+0x11/0x20 [ 111.125304][ T304] ? read_word_at_a_time+0x12/0x20 [ 111.130250][ T304] ? strscpy+0x9c/0x260 [ 111.134246][ T304] dump_stack+0x15/0x1b [ 111.138342][ T304] process_one_work+0x94e/0xcb0 [ 111.143034][ T304] worker_thread+0xa60/0x1260 [ 111.147549][ T304] kthread+0x26d/0x300 [ 111.151448][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.156307][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.160732][ T304] ret_from_fork+0x1f/0x30 [ 111.164990][ T304] [ 111.167930][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 111.167930][ T304] last function: wg_packet_tx_worker [ 111.181139][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 111.190674][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.200672][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 111.207139][ T304] Call Trace: [ 111.210262][ T304] [ 111.213042][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.217554][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.222852][ T304] dump_stack+0x15/0x1b [ 111.226842][ T304] process_one_work+0x94e/0xcb0 [ 111.231531][ T304] worker_thread+0xa60/0x1260 [ 111.236046][ T304] kthread+0x26d/0x300 [ 111.239946][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.244807][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.249232][ T304] ret_from_fork+0x1f/0x30 [ 111.253487][ T304] [ 111.256428][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 111.256428][ T304] last function: wg_packet_tx_worker [ 111.269637][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 111.279178][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.289072][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 111.294974][ T304] Call Trace: [ 111.298096][ T304] [ 111.300880][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.305394][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.310684][ T304] dump_stack+0x15/0x1b [ 111.314676][ T304] process_one_work+0x94e/0xcb0 [ 111.319365][ T304] worker_thread+0xa60/0x1260 [ 111.323885][ T304] kthread+0x26d/0x300 [ 111.327781][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.332650][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.337070][ T304] ret_from_fork+0x1f/0x30 [ 111.341325][ T304] [ 111.344514][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 111.344514][ T304] last function: wg_packet_tx_worker [ 111.357806][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 111.367338][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.377229][ T304] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 111.383134][ T304] Call Trace: [ 111.386263][ T304] [ 111.389035][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.393548][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.398842][ T304] dump_stack+0x15/0x1b [ 111.402838][ T304] process_one_work+0x94e/0xcb0 [ 111.407522][ T304] worker_thread+0xa60/0x1260 [ 111.412059][ T304] kthread+0x26d/0x300 [ 111.415938][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.420798][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.425226][ T304] ret_from_fork+0x1f/0x30 [ 111.429480][ T304] [ 111.432418][ T304] BUG: workqueue leaked lock or atomic: kworker/0:2/0x00000001/304 [ 111.432418][ T304] last function: wg_packet_decrypt_worker [ 111.446066][ T304] CPU: 0 PID: 304 Comm: kworker/0:2 Not tainted 6.1.75-syzkaller-00037-gdcb09569bbff #0 [ 111.455601][ T304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 [ 111.465503][ T304] Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker [ 111.471832][ T304] Call Trace: [ 111.474955][ T304] [ 111.477733][ T304] dump_stack_lvl+0x151/0x1b7 [ 111.482251][ T304] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.487545][ T304] dump_stack+0x15/0x1b [ 111.491537][ T304] process_one_work+0x94e/0xcb0 [ 111.496226][ T304] worker_thread+0xa60/0x1260 [ 111.500744][ T304] kthread+0x26d/0x300 [ 111.504641][ T304] ? worker_clr_flags+0x1a0/0x1a0 [ 111.509503][ T304] ? kthread_blkcg+0xd0/0xd0 [ 111.513928][ T304] ret_from_fork+0x1f/0x30 [ 111.518184][ T304]