last executing test programs: 9.849586504s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 7.657853549s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.480265372s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.713729522s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.777932139s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 646.949952ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x1468}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="7dbc9a7841aa3acf397f9f3fdae9728392b3793cb08cd59a0c3aaca96b68e75b3454e8eedd687dd5391a1e811e2ee7889f93738028e51044940b983a55eed3bb6c62276085b7697507aaa195c77879f9227f9c88afe86ad2c7413f70124507c29ce39193ea9d96a2ceb9b06a058fea43381dfe81f67892157ca8e835f5d6c602dbebb89658f75d18104b8372e723288d1eeb9ec42181de4ef01e08cce3930d2fbfcb2800f9618e52862c1cd5ebc1e0085db24adc89b9a9d842995c1b37d4c2529c91776fd93a02f393624a164bb44e757051885eb1edf118757fe1410d5de1b0", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000d721a5e68aa9e5a7950000000000000030875715e13c82162070fc49fb4fdab3"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x202, 0xa2029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES64=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xffffffe0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001ec0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext, 0xaa4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) r6 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x5a, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x28, 0x0, &(0x7f0000000000)="b9ff060000000000000014f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x27) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000100000000000000e9ff000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r7}, 0x10) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1a02"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x7}, 0x8312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xbfffffffffffffff, r2, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) 630.212294ms ago: executing program 4: bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c00), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0xe101, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 600.893839ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x66, 0x7f, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), 0x0}, 0xb01220) 587.315461ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000340)='ext4_remove_blocks\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) unlink(0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x541b, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001410) ioctl$TUNSETOFFLOAD(r2, 0x80047441, 0xffefff1f) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 580.023592ms ago: executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) r3 = getpid() sendmsg$unix(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000280)="826d87688c04", 0x6}], 0x1, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, 0xee01}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r7}, 0x10) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='O'], 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r8, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r10}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) 533.656529ms ago: executing program 4: perf_event_open(&(0x7f0000000800)={0x2, 0x63, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe1b) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 488.070876ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x21000000}, 0x48) 447.219762ms ago: executing program 1: write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0x15e400}], 0x1}, 0x3) 442.732213ms ago: executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1}, 0x6d) 436.127514ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xce) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)=ANY=[]) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='jbd2_checkpoint_stats\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57beaffffff000000"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff96, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1a, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000000700000000000000b70000000000000295"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f3, &(0x7f0000000080)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000cc0)={{}, &(0x7f0000000300), &(0x7f0000000c80)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 430.796485ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000001bc0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000500)=ANY=[@ANYBLOB="1806000000800400000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b707000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 401.675959ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r3}, &(0x7f0000000400), &(0x7f00000004c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_devices(r5, &(0x7f0000000040)={'b', ' *:* ', 'w\x00'}, 0x8) write$cgroup_pid(r2, &(0x7f0000000340), 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='ext4_mballoc_alloc\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mballoc_alloc\x00', r8}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) 398.11494ms ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 380.077862ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001001800000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc59168bcb9a25164a1826a81cf45e576ef4dd94e292cbbf69d0787fa4b596ce132d7e976b136871cebb77ad2e34ffcf52557e6a0403769815ed13ca7b6c9f2fd7d11461997a57b35715cee9809008af9df0690f5d42d2e0f2d967aa4bc96a7d4b343411ef4d962699ffc5c434cf53339430fe9d668405875e14bea5c4aea70b9de7b9fb36561bdc896a0cc666f0d9b49832984ed9effda637edfb97def"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x90) 336.772599ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305828, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={@map=r1, r2, 0x12, 0x1, 0xffffffffffffffff, @link_id}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='ext4_sync_file_exit\x00', r5}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 314.644032ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='ext4_mark_inode_dirty\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) unlink(&(0x7f00000007c0)='./cgroup\x00') 268.13204ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 235.926805ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="18000600100000000000000000000000850000009e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000001200)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x200000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='ext4_writepages\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x5}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00'}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001300)={0x1, 0x80, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x101f18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000012c0)={r0, 0x58, &(0x7f0000001240)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="00000000000000000800000000000000588af8ff000000ddbea200000000000007020000f8ffffffb703000008000000b704e005de7b385024b774e46536000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x12, '\x00', 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) socketpair(0x3a, 0x0, 0x2, &(0x7f0000000000)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r5}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x80000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 183.964372ms ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x6}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x28b, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000a80), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 139.436079ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 122.154122ms ago: executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x14, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x804}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x0, 0xc, 0x0, 0x1, 0xfffffffffffffff4, 0x10}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdb}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000140)='GPL\x00', 0x36, 0xa4, &(0x7f0000000180)=""/164, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x9, 0x8001, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1400000}, 0x90) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x8}, 0x18) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000400)=@raw=[@tail_call, @ldst={0x2, 0x0, 0x3, 0xb, 0xa, 0x100}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f}, @map_fd={0x18, 0x5}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}], &(0x7f0000000480)='GPL\x00', 0x1f, 0x2, &(0x7f00000004c0)=""/2, 0x41100, 0x68, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0xd, 0x8, 0x5}, 0x10, 0x29695, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000580)=[{0x2, 0x5, 0xb, 0x2}, {0x1, 0x3, 0x3, 0x7}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@map=0xffffffffffffffff, 0x26, 0x1, 0x7, &(0x7f0000000680)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000007c0)={@map=r0, r1, 0x31, 0x1, r2, @prog_fd=r3, r5}, 0x20) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000840)='blkio.bfq.sectors\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r7, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000900)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0], 0x0, 0xe, &(0x7f00000009c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c00), 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ldst={0x3, 0x2, 0x6, 0x0, 0xb, 0xc, 0x8}, @alu={0x7, 0x1, 0x3, 0x1, 0x6, 0x2, 0x4}, @alu={0x7, 0x0, 0x3, 0x6, 0xa, 0xffffffffffffffe0, 0x1}]}, &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', r8, 0x32, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x4, 0xc, 0x8}, 0x10, 0xffffffffffffffff, r7, 0x4, &(0x7f0000000c80)=[r7], &(0x7f0000000cc0)=[{0x0, 0x3, 0xc, 0x5}, {0x1, 0x2, 0x4, 0xc}, {0x1, 0x2, 0x7, 0x8}, {0x1, 0x2, 0x6, 0x6}], 0x10, 0x3ffc00}, 0x90) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000dc0)={0x1b, 0x0, 0x0, 0x4, 0x0, r7, 0x61, '\x00', r8, r7, 0x2, 0x4, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={r4, 0x58, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_ext={0x1c, 0x32, &(0x7f0000000e40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x62a, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffff8000}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @exit, @map_idx={0x18, 0x3, 0x5, 0x0, 0x5}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001000)='syzkaller\x00', 0x4, 0x4e, &(0x7f0000001040)=""/78, 0x41000, 0x1, '\x00', r14, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001180)={0x5, 0x2, 0x3ff, 0xfff}, 0x10, 0x9faf, 0xffffffffffffffff, 0x2, &(0x7f00000011c0)=[r4, r4], &(0x7f0000001200)=[{0x0, 0x3, 0x10}, {0x5, 0x3, 0x8, 0x2}], 0x10, 0x6}, 0x90) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={r13, 0x400}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001340)={0x3, 0x4, 0x4, 0xa, 0x0, r15, 0x7fff, '\x00', r8, r7, 0x3, 0x0, 0x5}, 0x48) write$cgroup_type(r7, &(0x7f00000013c0), 0x9) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x1f) socketpair(0x28, 0xa, 0x2, &(0x7f0000001400)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000001440)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000001480)={0x5, 0x80, 0x8, 0x3, 0x2, 0x6, 0x0, 0x2, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8000}, 0x200, 0xffffffffffffffff, 0x7ff, 0x8, 0x7, 0xbb, 0x4, 0x0, 0x81, 0x0, 0x8}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r4, &(0x7f0000001500)="f6544e619404246aea12830dee1ee4ff2f51d3bb0cef23dc8f46dc0147f54f6cd4f4ff3f195c57ce23f76c472e3a7bd1577b52b7576f06f0cdf2d73699d87afb40a90c82f58d1390131aa6610c94d4b420b80ed8d44718ceaa53", &(0x7f0000001580)=""/113}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001680)={&(0x7f0000001640)='snd_soc_dapm_path\x00', r11}, 0x10) r16 = openat$cgroup_ro(r7, &(0x7f00000016c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r9, 0x4) r17 = getpid() r18 = openat$cgroup_ro(r6, &(0x7f00000017c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001740)={0x4, 0x80, 0x6, 0x1, 0x80, 0xff, 0x0, 0x6, 0x410, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x2}, 0x5000, 0x7, 0x697, 0x0, 0xfffffffffffffff7, 0xff, 0x2f, 0x0, 0x9, 0x0, 0x8000000000000001}, r17, 0x8, r18, 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001880)={r16, 0x58, &(0x7f0000001800)}, 0x10) 112.491223ms ago: executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xe, 0x8, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff07020000f8ffffffb703000008000009000000000000000085000000030000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r3}, &(0x7f00000004c0), &(0x7f00000007c0)='%pS \x00'}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'nr0\x00', @multicast}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYRES8=r4], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r2}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) close(r10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) 59.254512ms ago: executing program 3: socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 56.536132ms ago: executing program 0: bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='ext4_remove_blocks\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095056e860a0bb147ec100bb3e9abbd08b7f137550b843d24e6af3e63c5ba3b9be6f0e8c8b65c848cee1dd519e5f2e249cac943b47078b442bcbce2a04bd2ddd76d0e58420ba6a67d3240a1eb002b708a746b73d82338252f9a542ed2e9ebf8702ace3d94ce2d66959ff96c2f95a737c4887b2db98d862795c02d8426d0e5700d1140967677ef3b7dd313c7c27bb61641dc4c785123b34212ae474588f5d2dce1a391d9713a37f1bc3981e76930f84d720a357d85661f7bfde3be63f21fa27da70ae7a614bb870f692ff839121adde911e6ea6f64658e"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xfffffffffffffde8, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='svcrdma_encode_wseg\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 0s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xd, 0xf, &(0x7f00000004c0)=@ringbuf={{}, {{}, {}, {0x7, 0x0, 0xb, 0x3, 0x3}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): NF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.798444][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.806519][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.814961][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.821848][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.829026][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.845430][ T316] device veth0_vlan entered promiscuous mode [ 22.859477][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.867747][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.875737][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.882598][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.889782][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.898713][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.906797][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.914594][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.922463][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.930568][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.938338][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.945554][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.952961][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.961158][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.969402][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.976235][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.983711][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.991103][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.004262][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.012511][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.020640][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.027474][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.046059][ T310] device veth0_vlan entered promiscuous mode [ 23.055326][ T316] device veth1_macvtap entered promiscuous mode [ 23.062185][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.070741][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.078668][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.085873][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.093202][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.101256][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.109146][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.117191][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.125278][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.137746][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.145725][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.153670][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.162334][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.181063][ T308] device veth1_macvtap entered promiscuous mode [ 23.192168][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.200376][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.208846][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.216780][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.224339][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.232508][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.240756][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.248925][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.257040][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.265228][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.282903][ T309] device veth0_vlan entered promiscuous mode [ 23.290146][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.297954][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.305831][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.313618][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.323515][ T310] device veth1_macvtap entered promiscuous mode [ 23.332875][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.341115][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.349337][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.357657][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.379310][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.402932][ T313] device veth0_vlan entered promiscuous mode [ 23.421510][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.432299][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.442986][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.452648][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.461020][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.469272][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.477306][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.490444][ T309] device veth1_macvtap entered promiscuous mode [ 23.501741][ T313] device veth1_macvtap entered promiscuous mode [ 23.531503][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.542970][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.567336][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.581318][ T342] syz-executor.0 (342) used greatest stack depth: 19992 bytes left [ 23.586532][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.600528][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.615685][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.628358][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.637074][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.640779][ T348] Driver unsupported XDP return value 0 on prog (id 10) dev N/A, expect packet loss! [ 23.675430][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.698459][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.733077][ C1] hrtimer: interrupt took 16268 ns [ 24.057237][ T397] syz-executor.0[397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.057317][ T397] syz-executor.0[397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.107309][ T397] syz-executor.0[397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.191525][ T397] syz-executor.0[397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.204884][ T382] device syzkaller0 entered promiscuous mode [ 24.734782][ T462] syz-executor.3[462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.734856][ T462] syz-executor.3[462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.100509][ T484] FAULT_INJECTION: forcing a failure. [ 25.100509][ T484] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 25.136703][ T488] syz-executor.2[488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.136779][ T488] syz-executor.2[488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.151278][ T484] CPU: 0 PID: 484 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 25.172468][ T484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 25.182382][ T484] Call Trace: [ 25.185487][ T484] [ 25.188277][ T484] dump_stack_lvl+0x151/0x1b7 [ 25.192779][ T484] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 25.198076][ T484] ? __alloc_pages+0x780/0x780 [ 25.202672][ T484] dump_stack+0x15/0x1b [ 25.206664][ T484] should_fail_ex+0x3d0/0x520 [ 25.211180][ T484] should_fail_alloc_page+0x68/0x90 [ 25.216212][ T484] __alloc_pages+0x1f4/0x780 [ 25.220639][ T484] ? prep_new_page+0x110/0x110 [ 25.225240][ T484] ? _raw_spin_trylock_bh+0x190/0x190 [ 25.230455][ T484] ? memset_erms+0x9/0x10 [ 25.234610][ T484] __get_free_pages+0xe/0x30 [ 25.239039][ T484] kasan_populate_vmalloc_pte+0x39/0x130 [ 25.244503][ T484] ? __apply_to_page_range+0x8ca/0xbe0 [ 25.249797][ T484] __apply_to_page_range+0x8dd/0xbe0 [ 25.254922][ T484] ? kasan_populate_vmalloc+0x70/0x70 [ 25.260130][ T484] ? kasan_populate_vmalloc+0x70/0x70 [ 25.265334][ T484] apply_to_page_range+0x3b/0x50 [ 25.270112][ T484] kasan_populate_vmalloc+0x65/0x70 [ 25.275141][ T484] alloc_vmap_area+0x1961/0x1aa0 [ 25.279920][ T484] ? vm_map_ram+0x940/0x940 [ 25.284263][ T484] ? __kasan_kmalloc+0x9c/0xb0 [ 25.288856][ T484] ? kmalloc_node_trace+0x3d/0xb0 [ 25.293719][ T484] __get_vm_area_node+0x171/0x370 [ 25.298578][ T484] __vmalloc_node_range+0x36e/0x1540 [ 25.303700][ T484] ? htab_map_alloc+0xc31/0x17b0 [ 25.308469][ T484] ? __kasan_check_write+0x14/0x20 [ 25.313418][ T484] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 25.319933][ T484] ? debug_smp_processor_id+0x17/0x20 [ 25.325137][ T484] ? vmap+0x2b0/0x2b0 [ 25.328957][ T484] ? __alloc_percpu_gfp+0x27/0x30 [ 25.333816][ T484] bpf_map_area_alloc+0xdc/0xf0 [ 25.338503][ T484] ? htab_map_alloc+0xc31/0x17b0 [ 25.343275][ T484] htab_map_alloc+0xc31/0x17b0 [ 25.347879][ T484] map_create+0x44a/0xcf0 [ 25.352050][ T484] __sys_bpf+0x2e6/0x7f0 [ 25.356131][ T484] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 25.361336][ T484] ? debug_smp_processor_id+0x17/0x20 [ 25.366548][ T484] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 25.372436][ T484] __x64_sys_bpf+0x7c/0x90 [ 25.376689][ T484] do_syscall_64+0x3d/0xb0 [ 25.380939][ T484] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 25.386588][ T484] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 25.392324][ T484] RIP: 0033:0x7f1dfb47d0a9 [ 25.396563][ T484] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 25.416211][ T484] RSP: 002b:00007f1dfa7f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 25.424446][ T484] RAX: ffffffffffffffda RBX: 00007f1dfb5b3f80 RCX: 00007f1dfb47d0a9 [ 25.432258][ T484] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 25.440071][ T484] RBP: 00007f1dfa7f7120 R08: 0000000000000000 R09: 0000000000000000 [ 25.447883][ T484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 25.455694][ T484] R13: 000000000000000b R14: 00007f1dfb5b3f80 R15: 00007ffc85093348 [ 25.463510][ T484] [ 25.578711][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 25.578730][ T28] audit: type=1400 audit(1719201695.966:109): avc: denied { create } for pid=494 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 26.499466][ T28] audit: type=1400 audit(1719201696.896:110): avc: denied { create } for pid=549 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 26.843218][ T574] device syzkaller0 entered promiscuous mode [ 26.873502][ T28] audit: type=1400 audit(1719201697.266:111): avc: denied { relabelfrom } for pid=573 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.919597][ T28] audit: type=1400 audit(1719201697.266:112): avc: denied { relabelto } for pid=573 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.530657][ T28] audit: type=1400 audit(1719201697.916:113): avc: denied { create } for pid=635 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 28.074998][ T666] Â: renamed from pim6reg1 [ 28.633425][ T699] Â: renamed from pim6reg1 [ 28.694222][ T705] device veth1_macvtap left promiscuous mode [ 29.010253][ T714] device syzkaller0 entered promiscuous mode [ 29.349360][ T749] syz-executor.2[749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.349435][ T749] syz-executor.2[749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.397091][ T735] device syzkaller0 entered promiscuous mode [ 29.454025][ T28] audit: type=1400 audit(1719201699.846:114): avc: denied { read } for pid=753 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 29.591836][ T769] syz-executor.4[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.593449][ T769] syz-executor.4[769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.613604][ T28] audit: type=1400 audit(1719201700.006:115): avc: denied { create } for pid=771 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.001541][ T786] device syzkaller0 entered promiscuous mode [ 30.159532][ T790] device sit0 entered promiscuous mode [ 31.525024][ T28] audit: type=1400 audit(1719201701.916:116): avc: denied { create } for pid=864 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 31.573640][ T866] device pim6reg1 entered promiscuous mode [ 31.861913][ T887] FAULT_INJECTION: forcing a failure. [ 31.861913][ T887] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 31.880995][ T872] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.897726][ T872] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.922066][ T872] device bridge_slave_0 entered promiscuous mode [ 31.946178][ T872] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.957086][ T887] CPU: 0 PID: 887 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 31.966918][ T887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 31.976809][ T887] Call Trace: [ 31.979931][ T887] [ 31.982712][ T887] dump_stack_lvl+0x151/0x1b7 [ 31.987225][ T887] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 31.992517][ T887] ? dump_stack+0x9/0x1b [ 31.996607][ T887] dump_stack+0x15/0x1b [ 32.000586][ T887] should_fail_ex+0x3d0/0x520 [ 32.005113][ T887] should_fail+0xb/0x10 [ 32.009105][ T887] should_fail_usercopy+0x1a/0x20 [ 32.013954][ T887] _copy_from_user+0x1e/0xc0 [ 32.018387][ T887] generic_map_update_batch+0x54c/0x8c0 [ 32.023767][ T887] ? generic_map_delete_batch+0x5c0/0x5c0 [ 32.029319][ T887] ? generic_map_delete_batch+0x5c0/0x5c0 [ 32.034873][ T887] bpf_map_do_batch+0x4cc/0x630 [ 32.039561][ T887] __sys_bpf+0x66b/0x7f0 [ 32.043643][ T887] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 32.048855][ T887] ? debug_smp_processor_id+0x17/0x20 [ 32.054056][ T887] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 32.059960][ T887] __x64_sys_bpf+0x7c/0x90 [ 32.064211][ T887] do_syscall_64+0x3d/0xb0 [ 32.068462][ T887] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 32.074105][ T887] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 32.079830][ T887] RIP: 0033:0x7f1dfb47d0a9 [ 32.084084][ T887] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 32.103527][ T887] RSP: 002b:00007f1dfa7f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.111773][ T887] RAX: ffffffffffffffda RBX: 00007f1dfb5b3f80 RCX: 00007f1dfb47d0a9 [ 32.119583][ T887] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 32.127392][ T887] RBP: 00007f1dfa7f7120 R08: 0000000000000000 R09: 0000000000000000 [ 32.135203][ T887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 32.143014][ T887] R13: 000000000000000b R14: 00007f1dfb5b3f80 R15: 00007ffc85093348 [ 32.150837][ T887] [ 32.177102][ T872] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.204433][ T872] device bridge_slave_1 entered promiscuous mode [ 32.418067][ T10] device bridge_slave_1 left promiscuous mode [ 32.424150][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.432485][ T10] device bridge_slave_0 left promiscuous mode [ 32.438624][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.447030][ T10] device veth0_vlan left promiscuous mode [ 32.651063][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 32.660404][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 32.688294][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 32.721468][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 32.738232][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.745206][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.753256][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 32.761520][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 32.769843][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.776693][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.784236][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 32.792247][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 32.800650][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 32.810226][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 32.827977][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 32.838432][ T942] device pim6reg1 entered promiscuous mode [ 32.867667][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.878361][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.888938][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.904064][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.917888][ T872] device veth0_vlan entered promiscuous mode [ 32.928371][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 32.936040][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 32.951076][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.989625][ T872] device veth1_macvtap entered promiscuous mode [ 33.009721][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.023433][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.034403][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.042879][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.511351][ T28] audit: type=1400 audit(1719201704.906:117): avc: denied { create } for pid=1051 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 35.466054][ T28] audit: type=1400 audit(1719201705.856:118): avc: denied { create } for pid=1095 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 35.559905][ T28] audit: type=1400 audit(1719201705.956:119): avc: denied { create } for pid=1099 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 35.873999][ T1137] bond_slave_1: mtu less than device minimum [ 36.249540][ T1168] device veth1_macvtap left promiscuous mode [ 36.633294][ T1188] syz-executor.2[1188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.633376][ T1188] syz-executor.2[1188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.649261][ T1192] syz-executor.4[1192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.707049][ T1192] syz-executor.4[1192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.147853][ T1232] syz-executor.1[1232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.168085][ T1232] syz-executor.1[1232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.252907][ T1302] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 38.914706][ T1334] device syzkaller0 entered promiscuous mode [ 38.997773][ T28] audit: type=1400 audit(1719201709.396:120): avc: denied { write } for pid=1355 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 39.037353][ T1362] syz-executor.0[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.037432][ T1362] syz-executor.0[1362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.268835][ T1394] Â: renamed from pim6reg1 [ 39.573696][ T1440] Â: renamed from pim6reg1 [ 39.762807][ T1460] syz-executor.1[1460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.762887][ T1460] syz-executor.1[1460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.302618][ T1551] device pim6reg1 entered promiscuous mode [ 43.027578][ C0] sched: RT throttling activated [ 45.255780][ T1642] Â: renamed from pim6reg1 [ 45.292025][ T1644] bpf_get_probe_write_proto: 3 callbacks suppressed [ 45.292074][ T1644] syz-executor.0[1644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.300945][ T1644] syz-executor.0[1644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.397009][ T1650] syz-executor.4[1650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.458557][ T1650] syz-executor.4[1650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.812338][ T28] audit: type=1400 audit(1719201717.206:121): avc: denied { ioctl } for pid=1772 comm="syz-executor.4" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.050602][ T1788] syz-executor.0[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.051592][ T1788] syz-executor.0[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.713743][ T1823] device syzkaller0 entered promiscuous mode [ 47.973297][ T1861] syz-executor.3[1861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 47.973370][ T1861] syz-executor.3[1861] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.072265][ T1868] FAULT_INJECTION: forcing a failure. [ 48.072265][ T1868] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 48.128257][ T1868] CPU: 0 PID: 1868 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 48.138174][ T1868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 48.148151][ T1868] Call Trace: [ 48.151273][ T1868] [ 48.154053][ T1868] dump_stack_lvl+0x151/0x1b7 [ 48.158569][ T1868] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 48.163865][ T1868] ? __check_object_size+0x47b/0x650 [ 48.168982][ T1868] dump_stack+0x15/0x1b [ 48.173060][ T1868] should_fail_ex+0x3d0/0x520 [ 48.177576][ T1868] should_fail+0xb/0x10 [ 48.181567][ T1868] should_fail_usercopy+0x1a/0x20 [ 48.186517][ T1868] _copy_from_user+0x1e/0xc0 [ 48.191029][ T1868] generic_map_update_batch+0x4d9/0x8c0 [ 48.196413][ T1868] ? generic_map_delete_batch+0x5c0/0x5c0 [ 48.201965][ T1868] ? generic_map_delete_batch+0x5c0/0x5c0 [ 48.207521][ T1868] bpf_map_do_batch+0x4cc/0x630 [ 48.212206][ T1868] __sys_bpf+0x66b/0x7f0 [ 48.216282][ T1868] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 48.221494][ T1868] ? debug_smp_processor_id+0x17/0x20 [ 48.226695][ T1868] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 48.232601][ T1868] __x64_sys_bpf+0x7c/0x90 [ 48.236855][ T1868] do_syscall_64+0x3d/0xb0 [ 48.241107][ T1868] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 48.246836][ T1868] RIP: 0033:0x7fb4f9a7d0a9 [ 48.251086][ T1868] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 48.270532][ T1868] RSP: 002b:00007fb4fa70d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.278772][ T1868] RAX: ffffffffffffffda RBX: 00007fb4f9bb3f80 RCX: 00007fb4f9a7d0a9 [ 48.286586][ T1868] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 48.294396][ T1868] RBP: 00007fb4fa70d120 R08: 0000000000000000 R09: 0000000000000000 [ 48.302209][ T1868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.310018][ T1868] R13: 000000000000000b R14: 00007fb4f9bb3f80 R15: 00007ffcdf1273d8 [ 48.317839][ T1868] [ 48.509219][ T1891] device syzkaller0 entered promiscuous mode [ 48.570015][ T1909] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 48.982196][ T28] audit: type=1400 audit(1719201719.376:122): avc: denied { create } for pid=1958 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 49.012738][ T28] audit: type=1400 audit(1719201719.396:123): avc: denied { create } for pid=1958 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 49.044687][ T28] audit: type=1400 audit(1719201719.436:124): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 49.444314][ T28] audit: type=1400 audit(1719201719.836:125): avc: denied { create } for pid=2008 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 49.695090][ T28] audit: type=1400 audit(1719201720.066:126): avc: denied { create } for pid=2031 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 49.815796][ T2051] GPL: port 1(veth0) entered blocking state [ 49.827089][ T2051] GPL: port 1(veth0) entered disabled state [ 49.852051][ T2051] device veth0 entered promiscuous mode [ 50.563004][ T2065] FAULT_INJECTION: forcing a failure. [ 50.563004][ T2065] name failslab, interval 1, probability 0, space 0, times 1 [ 50.576577][ T2065] CPU: 0 PID: 2065 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 50.586490][ T2065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 50.596385][ T2065] Call Trace: [ 50.599501][ T2065] [ 50.602280][ T2065] dump_stack_lvl+0x151/0x1b7 [ 50.606791][ T2065] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 50.612086][ T2065] ? selinux_kernfs_init_security+0x14a/0x720 [ 50.617985][ T2065] ? idr_alloc_cyclic+0x369/0x5d0 [ 50.622846][ T2065] dump_stack+0x15/0x1b [ 50.626847][ T2065] should_fail_ex+0x3d0/0x520 [ 50.631358][ T2065] ? __kernfs_new_node+0xdb/0x700 [ 50.636213][ T2065] __should_failslab+0xaf/0xf0 [ 50.640816][ T2065] should_failslab+0x9/0x20 [ 50.645154][ T2065] kmem_cache_alloc+0x3b/0x2c0 [ 50.649890][ T2065] __kernfs_new_node+0xdb/0x700 [ 50.654773][ T2065] ? kernfs_new_node+0x230/0x230 [ 50.659556][ T2065] ? rwsem_write_trylock+0x15b/0x290 [ 50.664756][ T2065] ? up_write+0x79/0x1f0 [ 50.668843][ T2065] ? kernfs_activate+0x1e6/0x200 [ 50.673596][ T2065] kernfs_new_node+0x130/0x230 [ 50.678200][ T2065] __kernfs_create_file+0x4a/0x270 [ 50.683143][ T2065] sysfs_add_file_mode_ns+0x1c8/0x270 [ 50.688358][ T2065] internal_create_group+0x545/0xed0 [ 50.693484][ T2065] ? sysfs_create_group+0x30/0x30 [ 50.698334][ T2065] ? up_write+0x79/0x1f0 [ 50.702413][ T2065] ? kernfs_activate+0x1e6/0x200 [ 50.707184][ T2065] sysfs_create_groups+0x5b/0x130 [ 50.712046][ T2065] device_add_attrs+0xe1/0x5f0 [ 50.716649][ T2065] ? kernfs_put+0x4e5/0x520 [ 50.720987][ T2065] ? get_device_parent+0x410/0x410 [ 50.725933][ T2065] ? sysfs_do_create_link_sd+0xe2/0x110 [ 50.731315][ T2065] device_add+0x5f7/0xf10 [ 50.735482][ T2065] netdev_register_kobject+0x177/0x320 [ 50.740771][ T2065] ? raw_notifier_call_chain+0xdf/0xf0 [ 50.746078][ T2065] register_netdevice+0xe43/0x1490 [ 50.751025][ T2065] ? netif_stacked_transfer_operstate+0x240/0x240 [ 50.757263][ T2065] ? tun_net_initialize+0x15c/0x460 [ 50.762298][ T2065] ? tun_setup+0x2b0/0x2b0 [ 50.766550][ T2065] ? alloc_netdev_mqs+0xbf2/0xf90 [ 50.771424][ T2065] tun_set_iff+0x836/0xee0 [ 50.775676][ T2065] __tun_chr_ioctl+0x80e/0x22d0 [ 50.780356][ T2065] ? tun_flow_create+0x320/0x320 [ 50.785128][ T2065] ? __fget_files+0x2cb/0x330 [ 50.789642][ T2065] tun_chr_ioctl+0x2a/0x40 [ 50.793984][ T2065] ? tun_chr_poll+0x670/0x670 [ 50.798501][ T2065] __se_sys_ioctl+0x114/0x190 [ 50.803012][ T2065] __x64_sys_ioctl+0x7b/0x90 [ 50.807447][ T2065] do_syscall_64+0x3d/0xb0 [ 50.811979][ T2065] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 50.817710][ T2065] RIP: 0033:0x7fe947e7d0a9 [ 50.821978][ T2065] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 50.841766][ T2065] RSP: 002b:00007fe948c130c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 50.850008][ T2065] RAX: ffffffffffffffda RBX: 00007fe947fb3f80 RCX: 00007fe947e7d0a9 [ 50.858366][ T2065] RDX: 0000000020000200 RSI: 00000000400454ca RDI: 0000000000000006 [ 50.866177][ T2065] RBP: 00007fe948c13120 R08: 0000000000000000 R09: 0000000000000000 [ 50.873989][ T2065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 50.881800][ T2065] R13: 000000000000000b R14: 00007fe947fb3f80 R15: 00007ffea847af98 [ 50.889862][ T2065] [ 52.104313][ T2172] device pim6reg1 entered promiscuous mode [ 52.224538][ T2179] device syzkaller0 entered promiscuous mode [ 52.232340][ T2190] syz-executor.4[2190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.232430][ T2190] syz-executor.4[2190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.293848][ T28] audit: type=1400 audit(1719201722.686:127): avc: denied { create } for pid=2202 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 52.527845][ T2225] device syzkaller0 entered promiscuous mode [ 52.666175][ T2237] device syzkaller0 entered promiscuous mode [ 56.019401][ T2248] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 56.720585][ T2299] device syzkaller0 entered promiscuous mode [ 57.102230][ T2329] device wg2 entered promiscuous mode [ 57.988286][ T2377] bond_slave_1: mtu less than device minimum [ 58.197087][ T28] audit: type=1400 audit(1719201728.586:128): avc: denied { create } for pid=2397 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 58.612672][ T2427] syz-executor.1[2427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.612751][ T2427] syz-executor.1[2427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.755526][ T2428] device syzkaller0 entered promiscuous mode [ 59.076970][ T2453] device pim6reg1 entered promiscuous mode [ 59.274865][ T2462] device sit0 entered promiscuous mode [ 60.132750][ T2536] Â: renamed from pim6reg1 [ 60.681260][ T2599] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 60.816560][ T2605] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 61.504770][ T28] audit: type=1400 audit(1719201731.896:129): avc: denied { create } for pid=2633 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 61.719701][ T2652] device sit0 left promiscuous mode [ 61.799191][ T2654] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 61.825533][ T2652] device sit0 entered promiscuous mode [ 62.187269][ T28] audit: type=1400 audit(1719201732.576:130): avc: denied { create } for pid=2673 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 62.227521][ T2679] syz-executor.3[2679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.227669][ T2679] syz-executor.3[2679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.264045][ T2681] syz-executor.1[2681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.278692][ T2681] syz-executor.1[2681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.308795][ T2686] Â: renamed from pim6reg1 [ 62.517141][ T2713] syz-executor.0[2713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.517219][ T2713] syz-executor.0[2713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.108471][ T2761] device syzkaller0 entered promiscuous mode [ 63.131528][ T2763] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.138610][ T2763] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.230127][ T2767] device bridge_slave_1 left promiscuous mode [ 63.265133][ T2767] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.273511][ T2767] device bridge_slave_0 left promiscuous mode [ 63.279679][ T2767] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.771965][ T2829] device syzkaller0 entered promiscuous mode [ 63.943884][ T2840] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 63.997667][ T2823] device syzkaller0 entered promiscuous mode [ 64.496974][ T2851] device syzkaller0 entered promiscuous mode [ 64.706125][ T2874] device syzkaller0 entered promiscuous mode [ 65.591512][ T2928] device syzkaller0 entered promiscuous mode [ 65.664988][ T28] audit: type=1400 audit(1719201736.056:131): avc: denied { create } for pid=2944 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.705257][ T2947] device pim6reg1 entered promiscuous mode [ 66.389767][ T2987] syz-executor.1[2987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.389847][ T2987] syz-executor.1[2987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.438309][ T2987] FAULT_INJECTION: forcing a failure. [ 66.438309][ T2987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.462746][ T2987] CPU: 1 PID: 2987 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 66.472638][ T2987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 66.482534][ T2987] Call Trace: [ 66.485702][ T2987] [ 66.488434][ T2987] dump_stack_lvl+0x151/0x1b7 [ 66.492947][ T2987] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 66.498248][ T2987] ? __kasan_slab_free+0x11/0x20 [ 66.503146][ T2987] dump_stack+0x15/0x1b [ 66.507231][ T2987] should_fail_ex+0x3d0/0x520 [ 66.511747][ T2987] should_fail+0xb/0x10 [ 66.515747][ T2987] should_fail_usercopy+0x1a/0x20 [ 66.520599][ T2987] copy_to_user_nofault+0x7c/0x140 [ 66.525642][ T2987] bpf_probe_write_user+0x96/0xf0 [ 66.530502][ T2987] bpf_prog_42b0bc03b33f5c41+0x3f/0x45 [ 66.535797][ T2987] bpf_trace_run3+0x177/0x2e0 [ 66.540308][ T2987] ? bpf_trace_run2+0x290/0x290 [ 66.544994][ T2987] ? ext4_buffered_write_iter+0x360/0x640 [ 66.550557][ T2987] ? __dquot_alloc_space+0x311/0xc00 [ 66.555679][ T2987] __bpf_trace_ext4_es_insert_delayed_block+0x2b/0x40 [ 66.562268][ T2987] ext4_es_insert_delayed_block+0x8e0/0x940 [ 66.567998][ T2987] ? ext4_is_pending+0x1f0/0x1f0 [ 66.572773][ T2987] ? _raw_spin_unlock+0x4c/0x70 [ 66.577462][ T2987] ext4_da_get_block_prep+0x9b3/0x13e0 [ 66.582751][ T2987] ? folio_add_lru+0x280/0x3f0 [ 66.587461][ T2987] ? ext4_da_release_space+0x480/0x480 [ 66.592749][ T2987] ? _raw_spin_lock+0xa4/0x1b0 [ 66.597353][ T2987] ? _raw_spin_unlock+0x4c/0x70 [ 66.602039][ T2987] ext4_block_write_begin+0x55e/0x1200 [ 66.608570][ T2987] ? ext4_da_release_space+0x480/0x480 [ 66.613846][ T2987] ? ext4_print_free_blocks+0x360/0x360 [ 66.619229][ T2987] ? folio_wait_stable+0x70/0x90 [ 66.624006][ T2987] ext4_da_write_begin+0x51f/0x920 [ 66.628952][ T2987] ? ext4_dirty_folio+0xf0/0xf0 [ 66.633640][ T2987] generic_perform_write+0x2f9/0x5c0 [ 66.638761][ T2987] ? generic_file_direct_write+0x6b0/0x6b0 [ 66.644405][ T2987] ? generic_write_checks_count+0x490/0x490 [ 66.650124][ T2987] ? kstrtouint+0xf6/0x180 [ 66.654380][ T2987] ext4_buffered_write_iter+0x360/0x640 [ 66.659762][ T2987] ext4_file_write_iter+0x194/0x1570 [ 66.664882][ T2987] ? cgroup_rstat_updated+0xe5/0x370 [ 66.670000][ T2987] ? __alloc_pages+0x3a1/0x780 [ 66.674603][ T2987] ? avc_policy_seqno+0x1b/0x70 [ 66.679295][ T2987] ? ext4_file_read_iter+0x470/0x470 [ 66.684412][ T2987] ? fsnotify_perm+0x6a/0x5d0 [ 66.689014][ T2987] vfs_write+0x902/0xeb0 [ 66.693094][ T2987] ? file_end_write+0x1c0/0x1c0 [ 66.697859][ T2987] ? mutex_lock+0xb1/0x1e0 [ 66.702115][ T2987] ? bit_wait_io_timeout+0x120/0x120 [ 66.707239][ T2987] ? __fdget_pos+0x2e2/0x390 [ 66.711663][ T2987] ? ksys_write+0x77/0x2c0 [ 66.715917][ T2987] ksys_write+0x199/0x2c0 [ 66.720082][ T2987] ? __ia32_sys_read+0x90/0x90 [ 66.724684][ T2987] ? debug_smp_processor_id+0x17/0x20 [ 66.729888][ T2987] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 66.735794][ T2987] __x64_sys_write+0x7b/0x90 [ 66.740217][ T2987] do_syscall_64+0x3d/0xb0 [ 66.744471][ T2987] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.750199][ T2987] RIP: 0033:0x7fe947e7d0a9 [ 66.754451][ T2987] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 66.773895][ T2987] RSP: 002b:00007fe948c130c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 66.782137][ T2987] RAX: ffffffffffffffda RBX: 00007fe947fb3f80 RCX: 00007fe947e7d0a9 [ 66.789949][ T2987] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000004 [ 66.797767][ T2987] RBP: 00007fe948c13120 R08: 0000000000000000 R09: 0000000000000000 [ 66.805575][ T2987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.813386][ T2987] R13: 000000000000000b R14: 00007fe947fb3f80 R15: 00007ffea847af98 [ 66.821291][ T2987] [ 66.896871][ T2999] syz-executor.4[2999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.896945][ T2999] syz-executor.4[2999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.953284][ T3011] FAULT_INJECTION: forcing a failure. [ 66.953284][ T3011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 67.151263][ T3011] CPU: 0 PID: 3011 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 67.161188][ T3011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 67.171076][ T3011] Call Trace: [ 67.174288][ T3011] [ 67.177062][ T3011] dump_stack_lvl+0x151/0x1b7 [ 67.181611][ T3011] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 67.187044][ T3011] ? __stack_depot_save+0x36/0x480 [ 67.191994][ T3011] dump_stack+0x15/0x1b [ 67.196087][ T3011] should_fail_ex+0x3d0/0x520 [ 67.200602][ T3011] should_fail_alloc_page+0x68/0x90 [ 67.205636][ T3011] __alloc_pages+0x1f4/0x780 [ 67.210063][ T3011] ? prep_new_page+0x110/0x110 [ 67.214661][ T3011] __get_free_pages+0xe/0x30 [ 67.219266][ T3011] kasan_populate_vmalloc_pte+0x39/0x130 [ 67.224727][ T3011] ? __apply_to_page_range+0x8ca/0xbe0 [ 67.230022][ T3011] __apply_to_page_range+0x8dd/0xbe0 [ 67.235143][ T3011] ? kasan_populate_vmalloc+0x70/0x70 [ 67.240355][ T3011] ? kasan_populate_vmalloc+0x70/0x70 [ 67.245557][ T3011] apply_to_page_range+0x3b/0x50 [ 67.250330][ T3011] kasan_populate_vmalloc+0x65/0x70 [ 67.255363][ T3011] alloc_vmap_area+0x1961/0x1aa0 [ 67.260190][ T3011] ? vm_map_ram+0x940/0x940 [ 67.264477][ T3011] ? __kasan_kmalloc+0x9c/0xb0 [ 67.269077][ T3011] ? kmalloc_node_trace+0x3d/0xb0 [ 67.273938][ T3011] __get_vm_area_node+0x171/0x370 [ 67.278807][ T3011] __vmalloc_node_range+0x36e/0x1540 [ 67.283919][ T3011] ? array_map_alloc+0x278/0x6d0 [ 67.288701][ T3011] ? vmap+0x2b0/0x2b0 [ 67.292511][ T3011] ? cap_capable+0x1d2/0x270 [ 67.296941][ T3011] bpf_map_area_alloc+0xdc/0xf0 [ 67.301628][ T3011] ? array_map_alloc+0x278/0x6d0 [ 67.306398][ T3011] array_map_alloc+0x278/0x6d0 [ 67.311002][ T3011] map_create+0x44a/0xcf0 [ 67.315169][ T3011] __sys_bpf+0x2e6/0x7f0 [ 67.319247][ T3011] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 67.324458][ T3011] ? debug_smp_processor_id+0x17/0x20 [ 67.329667][ T3011] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 67.335566][ T3011] __x64_sys_bpf+0x7c/0x90 [ 67.339815][ T3011] do_syscall_64+0x3d/0xb0 [ 67.344067][ T3011] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.349794][ T3011] RIP: 0033:0x7f1dfb47d0a9 [ 67.354050][ T3011] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 67.373492][ T3011] RSP: 002b:00007f1dfa7f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.381735][ T3011] RAX: ffffffffffffffda RBX: 00007f1dfb5b3f80 RCX: 00007f1dfb47d0a9 [ 67.389549][ T3011] RDX: 0000000000000048 RSI: 0000000020000340 RDI: 0000000000000000 [ 67.397367][ T3011] RBP: 00007f1dfa7f7120 R08: 0000000000000000 R09: 0000000000000000 [ 67.405167][ T3011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.412980][ T3011] R13: 000000000000000b R14: 00007f1dfb5b3f80 R15: 00007ffc85093348 [ 67.420798][ T3011] [ 67.699319][ T3055] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 25 (only 8 groups) [ 67.753370][ T3073] device wg2 left promiscuous mode [ 67.942595][ T3087] device macsec0 entered promiscuous mode [ 67.951373][ T3087] device veth1_macvtap entered promiscuous mode [ 67.961283][ T3090] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 67.968740][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.994304][ T3087] bond_slave_1: mtu greater than device maximum [ 68.249925][ T3129] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 68.785665][ T3205] device syzkaller0 entered promiscuous mode [ 69.385006][ T3284] syz-executor.4[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.385095][ T3284] syz-executor.4[3284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.405321][ T3282] syz-executor.0[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.427116][ T3282] syz-executor.0[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.182135][ T3386] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.210973][ T3386] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.228414][ T3386] device bridge_slave_0 entered promiscuous mode [ 71.248179][ T3386] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.271518][ T3386] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.297403][ T3386] device bridge_slave_1 entered promiscuous mode [ 71.572789][ T3386] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.579698][ T3386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.586798][ T3386] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.593581][ T3386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.653869][ T3432] device syzkaller0 entered promiscuous mode [ 71.692734][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.703232][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.711012][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.730075][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.738373][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.745257][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.752927][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.761139][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.768033][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.775897][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.783814][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.836194][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.851219][ T3386] device veth0_vlan entered promiscuous mode [ 71.865560][ T10] device bridge_slave_1 left promiscuous mode [ 71.871882][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.879981][ T10] device bridge_slave_0 left promiscuous mode [ 71.886050][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.894879][ T10] device veth1_macvtap left promiscuous mode [ 71.901350][ T10] device veth0_vlan left promiscuous mode [ 71.994882][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 72.019351][ T3454] Â: renamed from pim6reg1 [ 72.024955][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 72.032976][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 72.045316][ T3386] device veth1_macvtap entered promiscuous mode [ 72.052522][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 72.060733][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 72.068937][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 72.097469][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 72.106554][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 72.124104][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 72.133508][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.144703][ T28] audit: type=1400 audit(1719201742.536:132): avc: denied { mounton } for pid=3386 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 75.077843][ T3491] syz-executor.2[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.077899][ T3491] syz-executor.2[3491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.640780][ T3534] syz-executor.2[3534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.652511][ T3534] syz-executor.2[3534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.974777][ T3567] tun0: tun_chr_ioctl cmd 1074025677 [ 76.006842][ T3567] tun0: linktype set to 773 [ 76.329137][ T3594] veth1_macvtap: mtu greater than device maximum [ 77.147903][ T3638] device syzkaller0 entered promiscuous mode [ 77.236964][ T3650] bond_slave_1: mtu less than device minimum [ 77.323304][ T28] audit: type=1400 audit(1719201747.716:133): avc: denied { create } for pid=3665 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.501879][ T3684] syz-executor.0[3684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.501962][ T3684] syz-executor.0[3684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.553436][ T28] audit: type=1400 audit(1719201747.946:134): avc: denied { write } for pid=3690 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.602440][ T28] audit: type=1400 audit(1719201747.956:135): avc: denied { read } for pid=3690 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.652984][ T3699] Â: renamed from pim6reg1 [ 77.692586][ T3705] syz-executor.1[3705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.692663][ T3705] syz-executor.1[3705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.023857][ T3815] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 82.208382][ T3838] device veth0_vlan left promiscuous mode [ 82.245666][ T3838] device veth0_vlan entered promiscuous mode [ 82.261795][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.275061][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.285440][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.508464][ T28] audit: type=1400 audit(1719201752.906:136): avc: denied { setopt } for pid=3880 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 83.014906][ T3924] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.021983][ T3924] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.403375][ T28] audit: type=1400 audit(1719201757.796:137): avc: denied { getattr } for pid=4030 comm="syz-executor.1" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 87.452180][ T4033] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 87.530467][ T4046] syz-executor.0[4046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.530544][ T4046] syz-executor.0[4046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.592193][ T4052] syz-executor.0[4052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.628693][ T4057] syz-executor.4[4057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.652528][ T4052] syz-executor.0[4052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.671595][ T4057] syz-executor.4[4057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.036488][ T4173] FAULT_INJECTION: forcing a failure. [ 89.036488][ T4173] name failslab, interval 1, probability 0, space 0, times 0 [ 89.100471][ T4173] CPU: 1 PID: 4173 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 89.110389][ T4173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 89.120280][ T4173] Call Trace: [ 89.123402][ T4173] [ 89.126181][ T4173] dump_stack_lvl+0x151/0x1b7 [ 89.130697][ T4173] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 89.135989][ T4173] ? kvm_sched_clock_read+0x18/0x40 [ 89.141022][ T4173] ? sched_clock+0x9/0x10 [ 89.145189][ T4173] ? sched_clock_cpu+0x71/0x2b0 [ 89.149875][ T4173] ? stack_depot_save+0x13/0x20 [ 89.154562][ T4173] ? save_stack+0x11a/0x1e0 [ 89.158905][ T4173] dump_stack+0x15/0x1b [ 89.162894][ T4173] should_fail_ex+0x3d0/0x520 [ 89.167409][ T4173] ? __get_vm_area_node+0x129/0x370 [ 89.172445][ T4173] __should_failslab+0xaf/0xf0 [ 89.177045][ T4173] should_failslab+0x9/0x20 [ 89.181383][ T4173] __kmem_cache_alloc_node+0x3d/0x250 [ 89.186590][ T4173] ? __get_vm_area_node+0x129/0x370 [ 89.191631][ T4173] kmalloc_node_trace+0x26/0xb0 [ 89.196314][ T4173] __get_vm_area_node+0x129/0x370 [ 89.201173][ T4173] __vmalloc_node_range+0x36e/0x1540 [ 89.206293][ T4173] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.211678][ T4173] ? avc_denied+0x1b0/0x1b0 [ 89.216016][ T4173] ? selinux_capable+0x2f1/0x430 [ 89.220790][ T4173] ? vmap+0x2b0/0x2b0 [ 89.224612][ T4173] ? selinux_capset+0xf0/0xf0 [ 89.229118][ T4173] ? avc_has_perm_noaudit+0x348/0x430 [ 89.234330][ T4173] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.239707][ T4173] __vmalloc+0x7a/0x90 [ 89.243613][ T4173] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.248998][ T4173] bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.254206][ T4173] ? security_capable+0x87/0xb0 [ 89.258890][ T4173] bpf_prog_alloc+0x22/0x1c0 [ 89.263317][ T4173] bpf_prog_load+0x84a/0x1bf0 [ 89.267832][ T4173] ? map_freeze+0x3a0/0x3a0 [ 89.272261][ T4173] ? selinux_bpf+0xcb/0x100 [ 89.276594][ T4173] ? security_bpf+0x82/0xb0 [ 89.280935][ T4173] __sys_bpf+0x52c/0x7f0 [ 89.285017][ T4173] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 89.290229][ T4173] ? debug_smp_processor_id+0x17/0x20 [ 89.295433][ T4173] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 89.301332][ T4173] __x64_sys_bpf+0x7c/0x90 [ 89.305585][ T4173] do_syscall_64+0x3d/0xb0 [ 89.309841][ T4173] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 89.315567][ T4173] RIP: 0033:0x7fc50087d0a9 [ 89.319819][ T4173] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 89.339260][ T4173] RSP: 002b:00007fc5016c90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.347504][ T4173] RAX: ffffffffffffffda RBX: 00007fc5009b3f80 RCX: 00007fc50087d0a9 [ 89.355334][ T4173] RDX: 0000000000000090 RSI: 0000000020000040 RDI: 0000000000000005 [ 89.363128][ T4173] RBP: 00007fc5016c9120 R08: 0000000000000000 R09: 0000000000000000 [ 89.371209][ T4173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.379019][ T4173] R13: 000000000000000b R14: 00007fc5009b3f80 R15: 00007ffe278a71a8 [ 89.386836][ T4173] [ 89.401141][ T4173] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 89.418845][ T4173] CPU: 0 PID: 4173 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 89.428788][ T4173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 89.438644][ T4173] Call Trace: [ 89.441760][ T4173] [ 89.444539][ T4173] dump_stack_lvl+0x151/0x1b7 [ 89.449054][ T4173] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 89.454347][ T4173] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 89.459988][ T4173] dump_stack+0x15/0x1b [ 89.463982][ T4173] warn_alloc+0x21a/0x3a0 [ 89.468146][ T4173] ? should_failslab+0x9/0x20 [ 89.472661][ T4173] ? zone_watermark_ok_safe+0x270/0x270 [ 89.478051][ T4173] ? kmalloc_node_trace+0x3d/0xb0 [ 89.482904][ T4173] ? __get_vm_area_node+0x361/0x370 [ 89.487936][ T4173] __vmalloc_node_range+0x392/0x1540 [ 89.493070][ T4173] ? avc_denied+0x1b0/0x1b0 [ 89.497400][ T4173] ? selinux_capable+0x2f1/0x430 [ 89.502171][ T4173] ? vmap+0x2b0/0x2b0 [ 89.505996][ T4173] ? selinux_capset+0xf0/0xf0 [ 89.510509][ T4173] ? avc_has_perm_noaudit+0x348/0x430 [ 89.515717][ T4173] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.521090][ T4173] __vmalloc+0x7a/0x90 [ 89.525001][ T4173] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.530380][ T4173] bpf_prog_alloc_no_stats+0x3e/0x400 [ 89.535923][ T4173] ? security_capable+0x87/0xb0 [ 89.540592][ T4173] bpf_prog_alloc+0x22/0x1c0 [ 89.545014][ T4173] bpf_prog_load+0x84a/0x1bf0 [ 89.549535][ T4173] ? map_freeze+0x3a0/0x3a0 [ 89.553867][ T4173] ? selinux_bpf+0xcb/0x100 [ 89.558204][ T4173] ? security_bpf+0x82/0xb0 [ 89.562545][ T4173] __sys_bpf+0x52c/0x7f0 [ 89.566623][ T4173] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 89.571834][ T4173] ? debug_smp_processor_id+0x17/0x20 [ 89.577039][ T4173] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 89.582940][ T4173] __x64_sys_bpf+0x7c/0x90 [ 89.587192][ T4173] do_syscall_64+0x3d/0xb0 [ 89.591446][ T4173] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 89.597194][ T4173] RIP: 0033:0x7fc50087d0a9 [ 89.601688][ T4173] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 89.621112][ T4173] RSP: 002b:00007fc5016c90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.629359][ T4173] RAX: ffffffffffffffda RBX: 00007fc5009b3f80 RCX: 00007fc50087d0a9 [ 89.637170][ T4173] RDX: 0000000000000090 RSI: 0000000020000040 RDI: 0000000000000005 [ 89.644987][ T4173] RBP: 00007fc5016c9120 R08: 0000000000000000 R09: 0000000000000000 [ 89.652790][ T4173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.660605][ T4173] R13: 000000000000000b R14: 00007fc5009b3f80 R15: 00007ffe278a71a8 [ 89.668421][ T4173] [ 89.674673][ T4173] Mem-Info: [ 89.682746][ T28] audit: type=1400 audit(1719201760.076:138): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 89.708149][ T4173] active_anon:19968 inactive_anon:0 isolated_anon:0 [ 89.708149][ T4173] active_file:3501 inactive_file:10194 isolated_file:0 [ 89.708149][ T4173] unevictable:0 dirty:86 writeback:0 [ 89.708149][ T4173] slab_reclaimable:9129 slab_unreclaimable:70423 [ 89.708149][ T4173] mapped:18206 shmem:334 pagetables:459 [ 89.708149][ T4173] sec_pagetables:0 bounce:0 [ 89.708149][ T4173] kernel_misc_reclaimable:0 [ 89.708149][ T4173] free:1531056 free_pcp:20911 free_cma:0 [ 89.753406][ T28] audit: type=1400 audit(1719201760.076:139): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 89.775735][ T4180] Â: renamed from pim6reg1 [ 89.776453][ T4173] Node 0 active_anon:79972kB inactive_anon:0kB active_file:14004kB inactive_file:40776kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:72824kB dirty:344kB writeback:0kB shmem:1336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4716kB pagetables:1836kB sec_pagetables:0kB all_unreclaimable? no [ 89.812269][ T4173] DMA32 free:2970580kB boost:0kB min:62596kB low:78244kB high:93892kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2976116kB mlocked:0kB bounce:0kB free_pcp:5536kB local_pcp:1916kB free_cma:0kB [ 89.841228][ T4173] lowmem_reserve[]: 0 3932 3932 3932 [ 89.846563][ T4173] Normal free:3153644kB boost:0kB min:84856kB low:106068kB high:127280kB reserved_highatomic:0KB active_anon:80072kB inactive_anon:0kB active_file:14004kB inactive_file:40976kB unevictable:0kB writepending:344kB present:5242880kB managed:4026920kB mlocked:0kB bounce:0kB free_pcp:77328kB local_pcp:36276kB free_cma:0kB [ 89.878459][ T4173] lowmem_reserve[]: 0 0 0 0 [ 89.883204][ T4173] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 722*4096kB (M) = 2970580kB [ 89.899801][ T4173] Normal: 3*4kB (UME) 170*8kB (ME) 343*16kB (M) 203*32kB (ME) 145*64kB (UM) 245*128kB (UM) 72*256kB (UM) 54*512kB (UM) 24*1024kB (UME) 3*2048kB (UME) 738*4096kB (UM) = 3153644kB [ 89.927741][ T4173] 14035 total pagecache pages [ 89.952129][ T4173] 0 pages in swap cache [ 89.956134][ T4173] Free swap = 124996kB [ 89.987769][ T4173] Total swap = 124996kB [ 89.995698][ T4173] 2097051 pages RAM [ 90.018877][ T4173] 0 pages HighMem/MovableOnly [ 90.052577][ T4173] 346292 pages reserved [ 90.056579][ T4173] 0 pages cma reserved [ 90.200799][ T4232] syz-executor.3[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.200874][ T4232] syz-executor.3[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.265712][ T4232] FAULT_INJECTION: forcing a failure. [ 90.265712][ T4232] name failslab, interval 1, probability 0, space 0, times 0 [ 90.289632][ T4232] CPU: 0 PID: 4232 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 90.299492][ T4232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 90.309567][ T4232] Call Trace: [ 90.312687][ T4232] [ 90.315464][ T4232] dump_stack_lvl+0x151/0x1b7 [ 90.319976][ T4232] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 90.325268][ T4232] ? memset+0x35/0x40 [ 90.329192][ T4232] ? __es_remove_extent+0xe4b/0x1f60 [ 90.334488][ T4232] dump_stack+0x15/0x1b [ 90.338498][ T4232] should_fail_ex+0x3d0/0x520 [ 90.343024][ T4232] ? __es_insert_extent+0x72a/0x17c0 [ 90.348117][ T4232] __should_failslab+0xaf/0xf0 [ 90.352716][ T4232] should_failslab+0x9/0x20 [ 90.357172][ T4232] kmem_cache_alloc+0x3b/0x2c0 [ 90.361773][ T4232] __es_insert_extent+0x72a/0x17c0 [ 90.366729][ T4232] ? _raw_write_lock+0xa4/0x170 [ 90.371409][ T4232] ext4_es_insert_delayed_block+0x349/0x940 [ 90.377139][ T4232] ? ext4_is_pending+0x1f0/0x1f0 [ 90.381906][ T4232] ? _raw_spin_unlock+0x4c/0x70 [ 90.386595][ T4232] ext4_da_get_block_prep+0x9b3/0x13e0 [ 90.391886][ T4232] ? folio_add_lru+0x280/0x3f0 [ 90.396491][ T4232] ? ext4_da_release_space+0x480/0x480 [ 90.401778][ T4232] ? _raw_spin_lock+0xa4/0x1b0 [ 90.406382][ T4232] ? _raw_spin_unlock+0x4c/0x70 [ 90.411156][ T4232] ext4_block_write_begin+0x55e/0x1200 [ 90.416456][ T4232] ? ext4_da_release_space+0x480/0x480 [ 90.421744][ T4232] ? ext4_print_free_blocks+0x360/0x360 [ 90.427129][ T4232] ? folio_wait_stable+0x70/0x90 [ 90.431916][ T4232] ext4_da_write_begin+0x51f/0x920 [ 90.436934][ T4232] ? ext4_dirty_folio+0xf0/0xf0 [ 90.441708][ T4232] generic_perform_write+0x2f9/0x5c0 [ 90.446832][ T4232] ? generic_file_direct_write+0x6b0/0x6b0 [ 90.452469][ T4232] ? generic_write_checks_count+0x490/0x490 [ 90.458194][ T4232] ? kstrtouint+0xf6/0x180 [ 90.462452][ T4232] ext4_buffered_write_iter+0x360/0x640 [ 90.467834][ T4232] ext4_file_write_iter+0x194/0x1570 [ 90.472956][ T4232] ? cgroup_rstat_updated+0xe5/0x370 [ 90.478071][ T4232] ? __alloc_pages+0x3a1/0x780 [ 90.482674][ T4232] ? avc_policy_seqno+0x1b/0x70 [ 90.487361][ T4232] ? ext4_file_read_iter+0x470/0x470 [ 90.492484][ T4232] ? fsnotify_perm+0x6a/0x5d0 [ 90.497009][ T4232] vfs_write+0x902/0xeb0 [ 90.501080][ T4232] ? file_end_write+0x1c0/0x1c0 [ 90.505760][ T4232] ? mutex_lock+0xb1/0x1e0 [ 90.510016][ T4232] ? bit_wait_io_timeout+0x120/0x120 [ 90.515137][ T4232] ? __fdget_pos+0x2e2/0x390 [ 90.519563][ T4232] ? ksys_write+0x77/0x2c0 [ 90.523814][ T4232] ksys_write+0x199/0x2c0 [ 90.528087][ T4232] ? __ia32_sys_read+0x90/0x90 [ 90.532682][ T4232] ? debug_smp_processor_id+0x17/0x20 [ 90.537883][ T4232] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 90.543786][ T4232] __x64_sys_write+0x7b/0x90 [ 90.548215][ T4232] do_syscall_64+0x3d/0xb0 [ 90.552468][ T4232] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 90.558195][ T4232] RIP: 0033:0x7f1a14e7d0a9 [ 90.562449][ T4232] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 90.581893][ T4232] RSP: 002b:00007f1a141f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 90.590132][ T4232] RAX: ffffffffffffffda RBX: 00007f1a14fb3f80 RCX: 00007f1a14e7d0a9 [ 90.597947][ T4232] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000004 [ 90.605758][ T4232] RBP: 00007f1a141f7120 R08: 0000000000000000 R09: 0000000000000000 [ 90.613572][ T4232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.621379][ T4232] R13: 000000000000000b R14: 00007f1a14fb3f80 R15: 00007ffeb69b4858 [ 90.629208][ T4232] [ 90.745742][ T4257] device syzkaller0 entered promiscuous mode [ 90.920581][ T4282] device syzkaller0 entered promiscuous mode [ 90.936608][ T4282] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 90.980732][ T4295] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 91.320464][ T4328] device syzkaller0 entered promiscuous mode [ 92.037091][ T4412] syz-executor.1[4412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.037253][ T4412] syz-executor.1[4412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.838966][ T4500] syz-executor.0[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.871658][ T4500] syz-executor.0[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.903405][ T4500] syz-executor.0[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.915173][ T4500] syz-executor.0[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.026097][ T4517] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 9 (only 8 groups) [ 93.444586][ T4543] syz-executor.1[4543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.444665][ T4543] syz-executor.1[4543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.630511][ T4572] syz-executor.4[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.650940][ T4574] syz-executor.1[4574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.678258][ T4574] syz-executor.1[4574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.700192][ T4572] syz-executor.4[4572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.122282][ T4618] device pim6reg1 entered promiscuous mode [ 94.292012][ T4645] FAULT_INJECTION: forcing a failure. [ 94.292012][ T4645] name failslab, interval 1, probability 0, space 0, times 0 [ 94.307212][ T4645] CPU: 1 PID: 4645 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 94.317171][ T4645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 94.327105][ T4645] Call Trace: [ 94.330235][ T4645] [ 94.333003][ T4645] dump_stack_lvl+0x151/0x1b7 [ 94.337519][ T4645] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 94.342810][ T4645] ? selinux_kernfs_init_security+0x14a/0x720 [ 94.348804][ T4645] ? idr_alloc_cyclic+0x369/0x5d0 [ 94.353676][ T4645] dump_stack+0x15/0x1b [ 94.357657][ T4645] should_fail_ex+0x3d0/0x520 [ 94.362166][ T4645] ? __kernfs_new_node+0xdb/0x700 [ 94.367027][ T4645] __should_failslab+0xaf/0xf0 [ 94.371628][ T4645] should_failslab+0x9/0x20 [ 94.376050][ T4645] kmem_cache_alloc+0x3b/0x2c0 [ 94.380655][ T4645] __kernfs_new_node+0xdb/0x700 [ 94.385344][ T4645] ? kernfs_new_node+0x230/0x230 [ 94.390111][ T4645] ? rwsem_write_trylock+0x15b/0x290 [ 94.395238][ T4645] ? up_write+0x79/0x1f0 [ 94.399312][ T4645] ? kernfs_activate+0x1e6/0x200 [ 94.404084][ T4645] kernfs_new_node+0x130/0x230 [ 94.408774][ T4645] __kernfs_create_file+0x4a/0x270 [ 94.413720][ T4645] sysfs_add_file_mode_ns+0x1c8/0x270 [ 94.418933][ T4645] internal_create_group+0x545/0xed0 [ 94.424051][ T4645] ? sysfs_create_group+0x30/0x30 [ 94.428909][ T4645] ? up_write+0x79/0x1f0 [ 94.433073][ T4645] ? kernfs_activate+0x1e6/0x200 [ 94.437852][ T4645] sysfs_create_groups+0x5b/0x130 [ 94.442708][ T4645] device_add_attrs+0xe1/0x5f0 [ 94.447307][ T4645] ? kernfs_put+0x4e5/0x520 [ 94.451648][ T4645] ? get_device_parent+0x410/0x410 [ 94.456602][ T4645] ? sysfs_do_create_link_sd+0xe2/0x110 [ 94.461980][ T4645] device_add+0x5f7/0xf10 [ 94.466145][ T4645] netdev_register_kobject+0x177/0x320 [ 94.471435][ T4645] ? raw_notifier_call_chain+0xdf/0xf0 [ 94.476730][ T4645] register_netdevice+0xe43/0x1490 [ 94.481682][ T4645] ? netif_stacked_transfer_operstate+0x240/0x240 [ 94.487929][ T4645] ? tun_net_initialize+0x15c/0x460 [ 94.492962][ T4645] ? tun_setup+0x2b0/0x2b0 [ 94.497213][ T4645] ? alloc_netdev_mqs+0xbf2/0xf90 [ 94.502078][ T4645] tun_set_iff+0x836/0xee0 [ 94.506329][ T4645] __tun_chr_ioctl+0x80e/0x22d0 [ 94.511017][ T4645] ? tun_flow_create+0x320/0x320 [ 94.515790][ T4645] ? __fget_files+0x2cb/0x330 [ 94.520302][ T4645] tun_chr_ioctl+0x2a/0x40 [ 94.524550][ T4645] ? tun_chr_poll+0x670/0x670 [ 94.529076][ T4645] __se_sys_ioctl+0x114/0x190 [ 94.533579][ T4645] __x64_sys_ioctl+0x7b/0x90 [ 94.538007][ T4645] do_syscall_64+0x3d/0xb0 [ 94.542258][ T4645] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 94.547992][ T4645] RIP: 0033:0x7fe947e7d0a9 [ 94.552239][ T4645] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 94.571680][ T4645] RSP: 002b:00007fe948c130c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 94.579928][ T4645] RAX: ffffffffffffffda RBX: 00007fe947fb3f80 RCX: 00007fe947e7d0a9 [ 94.587736][ T4645] RDX: 0000000020000200 RSI: 00000000400454ca RDI: 0000000000000006 [ 94.595662][ T4645] RBP: 00007fe948c13120 R08: 0000000000000000 R09: 0000000000000000 [ 94.603468][ T4645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 94.611274][ T4645] R13: 000000000000000b R14: 00007fe947fb3f80 R15: 00007ffea847af98 [ 94.619093][ T4645] [ 94.769182][ T28] audit: type=1400 audit(1719201765.166:140): avc: denied { create } for pid=4657 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.644256][ T4799] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.671182][ T4799] O3ãc¤±: renamed from bridge_slave_0 [ 98.429858][ T4916] device pim6reg1 entered promiscuous mode [ 98.616289][ T4922] device syzkaller0 entered promiscuous mode [ 98.734311][ T4937] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 98.900002][ T4951] device sit0 entered promiscuous mode [ 99.501175][ T4997] sock: sock_set_timeout: `syz-executor.2' (pid 4997) tries to set negative timeout [ 99.599248][ T5003] device sit0 entered promiscuous mode [ 100.543879][ T28] audit: type=1400 audit(1719201770.936:141): avc: denied { create } for pid=5075 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 101.789974][ T5162] bpf_get_probe_write_proto: 4 callbacks suppressed [ 101.789990][ T5162] syz-executor.4[5162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.800255][ T5162] syz-executor.4[5162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.813221][ T5162] syz-executor.4[5162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.842291][ T5162] syz-executor.4[5162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.149928][ T5171] device syzkaller0 entered promiscuous mode [ 102.209050][ T5197] geneve1: tun_chr_ioctl cmd 1074025692 [ 102.416014][ T5236] syz-executor.4[5236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.416086][ T5236] syz-executor.4[5236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.126364][ T5321] device pim6reg1 entered promiscuous mode [ 103.172172][ T5325] Â: renamed from pim6reg1 [ 103.711156][ T5385] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 105.733434][ T28] audit: type=1400 audit(1719201776.126:142): avc: denied { create } for pid=5468 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 106.638065][ T5507] Â: renamed from pim6reg1 [ 106.880246][ T5528] syz-executor.2[5528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.880322][ T5528] syz-executor.2[5528] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.931704][ T5535] syz-executor.2[5535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.977678][ T5535] syz-executor.2[5535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.991513][ T5538] bridge0: port 3(dummy0) entered blocking state [ 107.028590][ T5538] bridge0: port 3(dummy0) entered disabled state [ 107.052530][ T5538] device dummy0 entered promiscuous mode [ 107.076575][ T5538] bridge0: port 3(dummy0) entered blocking state [ 107.082913][ T5538] bridge0: port 3(dummy0) entered forwarding state [ 107.497751][ T28] audit: type=1400 audit(1719201777.886:143): avc: denied { create } for pid=5585 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 107.647476][ T5596] device pim6reg1 entered promiscuous mode [ 107.657306][ T5598] syz-executor.2[5598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.657408][ T5598] syz-executor.2[5598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.694261][ T5598] syz-executor.2[5598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.738081][ T5598] syz-executor.2[5598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.644386][ T5651] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 108.879894][ T5661] device veth0_vlan left promiscuous mode [ 108.906591][ T5661] device veth0_vlan entered promiscuous mode [ 108.928473][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.938684][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.953355][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.780636][ T5726] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.514997][ T5815] syz-executor.4[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.515080][ T5815] syz-executor.4[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.069832][ T5837] bpf_get_probe_write_proto: 6 callbacks suppressed [ 112.069867][ T5837] syz-executor.0[5837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.243341][ T5849] Â: renamed from pim6reg1 [ 112.510873][ T5864] device syzkaller0 entered promiscuous mode [ 112.648690][ T5873] device syzkaller0 entered promiscuous mode [ 113.711249][ T28] audit: type=1400 audit(1719201784.106:144): avc: denied { create } for pid=5920 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 114.487017][ T5959] syz-executor.1[5959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.487173][ T5959] syz-executor.1[5959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.587257][ T5978] syz-executor.1[5978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.625596][ T5978] syz-executor.1[5978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.964231][ T5989] device syzkaller0 entered promiscuous mode [ 115.713983][ T6041] syz-executor.4[6041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.714058][ T6041] syz-executor.4[6041] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.731940][ T6022] device syzkaller0 entered promiscuous mode [ 116.566436][ T6074] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.048769][ T6101] syz-executor.2[6101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.048847][ T6101] syz-executor.2[6101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.233399][ T6099] device syzkaller0 entered promiscuous mode [ 117.572613][ T6133] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 118.498257][ T6169] syz-executor.1[6169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.498334][ T6169] syz-executor.1[6169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.636991][ T6179] FAULT_INJECTION: forcing a failure. [ 118.636991][ T6179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.709674][ T6179] CPU: 1 PID: 6179 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 118.719597][ T6179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 118.729488][ T6179] Call Trace: [ 118.732609][ T6179] [ 118.735385][ T6179] dump_stack_lvl+0x151/0x1b7 [ 118.739905][ T6179] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 118.745197][ T6179] ? migrate_enable+0x1cb/0x2b0 [ 118.749887][ T6179] dump_stack+0x15/0x1b [ 118.753878][ T6179] should_fail_ex+0x3d0/0x520 [ 118.758389][ T6179] should_fail+0xb/0x10 [ 118.762384][ T6179] should_fail_usercopy+0x1a/0x20 [ 118.767240][ T6179] _copy_from_user+0x1e/0xc0 [ 118.771672][ T6179] generic_map_update_batch+0x54c/0x8c0 [ 118.777054][ T6179] ? generic_map_delete_batch+0x5c0/0x5c0 [ 118.782619][ T6179] ? generic_map_delete_batch+0x5c0/0x5c0 [ 118.788162][ T6179] bpf_map_do_batch+0x4cc/0x630 [ 118.792847][ T6179] __sys_bpf+0x66b/0x7f0 [ 118.796925][ T6179] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 118.802141][ T6179] ? debug_smp_processor_id+0x17/0x20 [ 118.807349][ T6179] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 118.813244][ T6179] __x64_sys_bpf+0x7c/0x90 [ 118.817495][ T6179] do_syscall_64+0x3d/0xb0 [ 118.821749][ T6179] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 118.827392][ T6179] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.833203][ T6179] RIP: 0033:0x7f1dfb47d0a9 [ 118.837460][ T6179] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 118.856910][ T6179] RSP: 002b:00007f1dfa7f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.865145][ T6179] RAX: ffffffffffffffda RBX: 00007f1dfb5b3f80 RCX: 00007f1dfb47d0a9 [ 118.872955][ T6179] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 118.880769][ T6179] RBP: 00007f1dfa7f7120 R08: 0000000000000000 R09: 0000000000000000 [ 118.888578][ T6179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 118.896394][ T6179] R13: 000000000000000b R14: 00007f1dfb5b3f80 R15: 00007ffc85093348 [ 118.904210][ T6179] [ 119.230882][ T6215] veth1_macvtap: mtu greater than device maximum [ 119.455428][ T6231] syz-executor.3[6231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.455508][ T6231] syz-executor.3[6231] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.707867][ T6248] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.729594][ T6248] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.845540][ T28] audit: type=1400 audit(1719201790.236:145): avc: denied { create } for pid=6247 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 119.867813][ T6248] device bridge_slave_1 left promiscuous mode [ 119.868905][ T28] audit: type=1400 audit(1719201790.256:146): avc: denied { create } for pid=6247 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 119.894080][ T6248] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.926559][ T6248] device bridge_slave_0 left promiscuous mode [ 119.949277][ T6248] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.666567][ T6338] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.697586][ T6338] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.809488][ T6338] device bridge_slave_0 entered promiscuous mode [ 120.872669][ T6338] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.879674][ T6338] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.887000][ T6338] device bridge_slave_1 entered promiscuous mode [ 121.134950][ T6386] syz-executor.4[6386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.135026][ T6386] syz-executor.4[6386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.254043][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.276632][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.323107][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.353789][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.372335][ T2642] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.379313][ T2642] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.406913][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.415245][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.423537][ T2642] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.430422][ T2642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.437716][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.707747][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 121.719491][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.762681][ T6414] device pim6reg1 entered promiscuous mode [ 121.807845][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.816282][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.835955][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.853680][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.863908][ T6338] device veth0_vlan entered promiscuous mode [ 121.886857][ T6338] device veth1_macvtap entered promiscuous mode [ 121.894422][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.926025][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.951981][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 122.289661][ T6443] device syzkaller0 entered promiscuous mode [ 122.500219][ T6448] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.515611][ T6448] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.523232][ T6448] device bridge_slave_0 entered promiscuous mode [ 122.531472][ T6456] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.574529][ T6448] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.583792][ T6448] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.591434][ T6448] device bridge_slave_1 entered promiscuous mode [ 122.603496][ T6462] device bridge_slave_1 left promiscuous mode [ 122.616234][ T6462] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.638626][ T6462] device bridge_slave_0 left promiscuous mode [ 122.647678][ T6462] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.895359][ T6448] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.902263][ T6448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.909371][ T6448] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.916124][ T6448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.938213][ T596] device bridge_slave_1 left promiscuous mode [ 122.957509][ T596] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.999323][ T596] device bridge_slave_0 left promiscuous mode [ 123.005455][ T596] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.065283][ T596] device veth1_macvtap left promiscuous mode [ 123.097645][ T596] device veth0_vlan left promiscuous mode [ 123.353035][ T28] audit: type=1400 audit(1719201793.746:147): avc: denied { create } for pid=6504 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 123.383220][ T2638] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.391671][ T2638] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.439673][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.451480][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.481986][ T6509] syz-executor.4[6509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.482064][ T6509] syz-executor.4[6509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.496729][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.518112][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.546775][ T2638] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.553833][ T2638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.582338][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.599499][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.617417][ T2638] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.624346][ T2638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.647440][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.670588][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.678642][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.686804][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.705431][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.713945][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.726232][ T6448] device veth0_vlan entered promiscuous mode [ 123.770135][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.785451][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.844508][ T6448] device veth1_macvtap entered promiscuous mode [ 123.869884][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.877283][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.925118][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 123.956960][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.982846][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 124.054046][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 124.088112][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.146967][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 124.188161][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.808059][ T596] device bridge_slave_1 left promiscuous mode [ 124.814017][ T596] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.871240][ T596] device bridge_slave_0 left promiscuous mode [ 124.897489][ T596] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.934939][ T596] device veth1_macvtap left promiscuous mode [ 124.952953][ T596] device veth0_vlan left promiscuous mode [ 125.221550][ T6582] device veth0_vlan left promiscuous mode [ 125.228348][ T6582] device veth0_vlan entered promiscuous mode [ 125.271966][ T6568] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.294201][ T6568] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.305568][ T6568] device bridge_slave_0 entered promiscuous mode [ 125.314090][ T6568] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.337626][ T6568] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.365246][ T6568] device bridge_slave_1 entered promiscuous mode [ 125.532871][ T6624] device pim6reg1 entered promiscuous mode [ 126.025370][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.033576][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.049948][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.059909][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.069506][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.076453][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.084020][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.092251][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.105812][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.112709][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.129277][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.137063][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.144965][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.161720][ T6568] device veth0_vlan entered promiscuous mode [ 126.244092][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.252814][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.274972][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.283658][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.336309][ T6645] device syzkaller0 entered promiscuous mode [ 126.373700][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.383126][ T6568] device veth1_macvtap entered promiscuous mode [ 126.464949][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.473697][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.158558][ T596] device bridge_slave_1 left promiscuous mode [ 127.164552][ T596] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.193176][ T596] device bridge_slave_0 left promiscuous mode [ 127.220398][ T596] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.252684][ T596] device veth1_macvtap left promiscuous mode [ 127.288514][ T596] device veth0_vlan left promiscuous mode [ 127.663701][ T6722] device pim6reg1 entered promiscuous mode [ 127.796381][ T6739] geneve1: tun_chr_ioctl cmd 1074025692 [ 127.803059][ T6717] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.822709][ T6717] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.840300][ T6717] device bridge_slave_0 entered promiscuous mode [ 127.856979][ T6717] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.871575][ T6717] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.886614][ T6717] device bridge_slave_1 entered promiscuous mode [ 128.148868][ T6717] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.155749][ T6717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.162879][ T6717] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.169765][ T6717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.197357][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.205379][ T2685] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.220351][ T2685] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.241254][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.253924][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.260833][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.282204][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.317410][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.324334][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.420720][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.457386][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.523882][ T6717] device veth0_vlan entered promiscuous mode [ 128.543284][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.553875][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.568960][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.578621][ T2642] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 128.596072][ T6717] device veth1_macvtap entered promiscuous mode [ 128.675992][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.709616][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.730842][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.788000][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.822886][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 129.229865][ T28] audit: type=1400 audit(1719201799.626:148): avc: denied { append } for pid=6823 comm="syz-executor.4" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 129.339398][ T28] audit: type=1400 audit(1719201799.676:149): avc: denied { create } for pid=6830 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 129.395272][ T6838] bond_slave_1: mtu less than device minimum [ 129.545847][ T6834] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.590000][ T6834] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.639893][ T6834] device bridge_slave_0 entered promiscuous mode [ 129.683675][ T43] device bridge_slave_1 left promiscuous mode [ 129.692205][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.723791][ T43] device bridge_slave_0 left promiscuous mode [ 129.743289][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.771844][ T43] device veth1_macvtap left promiscuous mode [ 129.789876][ T43] device veth0_vlan left promiscuous mode [ 129.953515][ T6834] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.960493][ T6834] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.964566][ T6883] FAULT_INJECTION: forcing a failure. [ 129.964566][ T6883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 129.967949][ T6834] device bridge_slave_1 entered promiscuous mode [ 129.980583][ T6883] CPU: 0 PID: 6883 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 129.996435][ T6883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 130.006334][ T6883] Call Trace: [ 130.009453][ T6883] [ 130.012232][ T6883] dump_stack_lvl+0x151/0x1b7 [ 130.016746][ T6883] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 130.022039][ T6883] ? __alloc_pages+0x780/0x780 [ 130.026639][ T6883] dump_stack+0x15/0x1b [ 130.030634][ T6883] should_fail_ex+0x3d0/0x520 [ 130.035145][ T6883] should_fail_alloc_page+0x68/0x90 [ 130.040179][ T6883] __alloc_pages+0x1f4/0x780 [ 130.044605][ T6883] ? prep_new_page+0x110/0x110 [ 130.049206][ T6883] ? _raw_spin_trylock_bh+0x190/0x190 [ 130.054411][ T6883] ? kasan_check_range+0x17a/0x2a0 [ 130.059364][ T6883] __get_free_pages+0xe/0x30 [ 130.063788][ T6883] kasan_populate_vmalloc_pte+0x39/0x130 [ 130.069255][ T6883] ? __apply_to_page_range+0x8ca/0xbe0 [ 130.074556][ T6883] __apply_to_page_range+0x8dd/0xbe0 [ 130.079670][ T6883] ? kasan_populate_vmalloc+0x70/0x70 [ 130.084880][ T6883] ? kasan_populate_vmalloc+0x70/0x70 [ 130.090082][ T6883] apply_to_page_range+0x3b/0x50 [ 130.094859][ T6883] kasan_populate_vmalloc+0x65/0x70 [ 130.099892][ T6883] alloc_vmap_area+0x1961/0x1aa0 [ 130.104672][ T6883] ? vm_map_ram+0x940/0x940 [ 130.109008][ T6883] ? __kasan_kmalloc+0x9c/0xb0 [ 130.113605][ T6883] ? kmalloc_node_trace+0x3d/0xb0 [ 130.118474][ T6883] __get_vm_area_node+0x171/0x370 [ 130.123328][ T6883] __vmalloc_node_range+0x36e/0x1540 [ 130.128471][ T6883] ? htab_map_alloc+0xc31/0x17b0 [ 130.133219][ T6883] ? __kasan_check_write+0x14/0x20 [ 130.138168][ T6883] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 130.144680][ T6883] ? debug_smp_processor_id+0x17/0x20 [ 130.149886][ T6883] ? vmap+0x2b0/0x2b0 [ 130.153706][ T6883] ? irqentry_exit+0x30/0x40 [ 130.158134][ T6883] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 130.163776][ T6883] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 130.169761][ T6883] bpf_map_area_alloc+0xdc/0xf0 [ 130.174445][ T6883] ? htab_map_alloc+0xc31/0x17b0 [ 130.179220][ T6883] htab_map_alloc+0xc31/0x17b0 [ 130.183826][ T6883] map_create+0x44a/0xcf0 [ 130.187988][ T6883] __sys_bpf+0x2e6/0x7f0 [ 130.192068][ T6883] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 130.197288][ T6883] __x64_sys_bpf+0x7c/0x90 [ 130.201530][ T6883] do_syscall_64+0x3d/0xb0 [ 130.205781][ T6883] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 130.211423][ T6883] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 130.217149][ T6883] RIP: 0033:0x7fe947e7d0a9 [ 130.221403][ T6883] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 130.240844][ T6883] RSP: 002b:00007fe948c130c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 130.249091][ T6883] RAX: ffffffffffffffda RBX: 00007fe947fb3f80 RCX: 00007fe947e7d0a9 [ 130.257090][ T6883] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 130.264898][ T6883] RBP: 00007fe948c13120 R08: 0000000000000000 R09: 0000000000000000 [ 130.272712][ T6883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 130.280525][ T6883] R13: 000000000000000b R14: 00007fe947fb3f80 R15: 00007ffea847af98 [ 130.288343][ T6883] [ 130.539934][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.547308][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.559175][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.567411][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.575655][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.582542][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.589743][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.601975][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.611051][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.617956][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.645682][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.653734][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.665236][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.683564][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.692216][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.700750][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.708196][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.715662][ T6834] device veth0_vlan entered promiscuous mode [ 130.734687][ T6922] bond_slave_1: mtu less than device minimum [ 130.773369][ T6926] device syzkaller0 entered promiscuous mode [ 130.787900][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.839092][ T6834] device veth1_macvtap entered promiscuous mode [ 130.887004][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.904843][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.555281][ T6997] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.562450][ T6997] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.569856][ T6997] device bridge_slave_0 entered promiscuous mode [ 131.576873][ T6997] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.599745][ T6997] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.608619][ T6997] device bridge_slave_1 entered promiscuous mode [ 131.666945][ T345] device bridge_slave_1 left promiscuous mode [ 131.673165][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.692354][ T345] device bridge_slave_0 left promiscuous mode [ 131.699489][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.724124][ T345] device veth1_macvtap left promiscuous mode [ 131.730490][ T345] device veth0_vlan left promiscuous mode [ 131.979415][ T6997] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.986296][ T6997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.993382][ T6997] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.000167][ T6997] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.022490][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.029879][ T2638] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.037064][ T2638] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.046152][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.085771][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.092680][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.118482][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.126533][ T2639] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.133383][ T2639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.140964][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.149233][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.177081][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.192187][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.203028][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.242297][ T2638] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.258102][ T6997] device veth0_vlan entered promiscuous mode [ 132.309446][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.321180][ T6997] device veth1_macvtap entered promiscuous mode [ 132.355889][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.365650][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.395330][ T7075] syz-executor.1[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.395407][ T7075] syz-executor.1[7075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.419584][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.454512][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.476097][ T7075] device pim6reg1 entered promiscuous mode [ 132.539625][ T7080] device syzkaller0 entered promiscuous mode [ 132.827085][ T28] audit: type=1400 audit(1719201803.216:150): avc: denied { create } for pid=7085 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 133.106466][ T7104] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.134675][ T7104] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.142141][ T7104] device bridge_slave_0 entered promiscuous mode [ 133.153930][ T7104] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.160899][ T7104] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.168276][ T7104] device bridge_slave_1 entered promiscuous mode [ 133.258109][ T364] device bridge_slave_1 left promiscuous mode [ 133.264092][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.306447][ T364] device bridge_slave_0 left promiscuous mode [ 133.312980][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.361952][ T364] device veth1_macvtap left promiscuous mode [ 133.368931][ T364] device veth0_vlan left promiscuous mode [ 133.830288][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.840033][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.896373][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.915496][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.935668][ T2685] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.942558][ T2685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.980180][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.010726][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.030508][ T2685] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.037394][ T2685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.085162][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.105632][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.139235][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.161951][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.177494][ T7104] device veth0_vlan entered promiscuous mode [ 134.191564][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.200934][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.208463][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.248152][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.279825][ T7167] device sit0 left promiscuous mode [ 134.348755][ T7104] device veth1_macvtap entered promiscuous mode [ 134.376683][ T7175] device sit0 entered promiscuous mode [ 134.581040][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.599664][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.618638][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.626847][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.950164][ T7222] device pim6reg1 entered promiscuous mode [ 135.228879][ T7240] syz-executor.4[7240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.228957][ T7240] syz-executor.4[7240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.349832][ T10] device bridge_slave_1 left promiscuous mode [ 135.387779][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.395478][ T10] device bridge_slave_0 left promiscuous mode [ 135.401615][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.412234][ T10] device veth1_macvtap left promiscuous mode [ 135.418883][ T10] device veth0_vlan left promiscuous mode [ 135.643498][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.663588][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.691922][ T7237] device bridge_slave_0 entered promiscuous mode [ 135.718333][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.741989][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.763213][ T7237] device bridge_slave_1 entered promiscuous mode [ 135.931823][ T7271] syz-executor.0[7271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.931896][ T7271] syz-executor.0[7271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.984133][ T7271] syz-executor.0[7271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.025723][ T7271] syz-executor.0[7271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.137851][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.167207][ T2685] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.240595][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.260087][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.300152][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.307052][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.372472][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.410607][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.437845][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.444755][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.453347][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.461745][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.470580][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.530074][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.565691][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.599204][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.632371][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.670388][ T7237] device veth0_vlan entered promiscuous mode [ 136.699909][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.719249][ T7237] device veth1_macvtap entered promiscuous mode [ 136.768260][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.795793][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.379876][ T7329] ªªªªª»: renamed from veth0_vlan [ 137.506375][ T345] device bridge_slave_1 left promiscuous mode [ 137.513185][ T345] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.532961][ T345] device bridge_slave_0 left promiscuous mode [ 137.549133][ T345] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.563440][ T345] device veth1_macvtap left promiscuous mode [ 137.570571][ T345] device veth0_vlan left promiscuous mode [ 137.759671][ T7335] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.766634][ T7335] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.778632][ T7335] device bridge_slave_0 entered promiscuous mode [ 137.785740][ T7335] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.792846][ T7335] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.801788][ T7335] device bridge_slave_1 entered promiscuous mode [ 138.082453][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.090539][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.131258][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.170171][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.194282][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.201289][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.220199][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.231971][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.240343][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.247232][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.313533][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.333495][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.341412][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.357002][ T7335] device veth0_vlan entered promiscuous mode [ 138.377849][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.421227][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.451705][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.459156][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.473896][ T7335] device veth1_macvtap entered promiscuous mode [ 138.491278][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.522619][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.555303][ T6828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.961737][ T7463] FAULT_INJECTION: forcing a failure. [ 138.961737][ T7463] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 138.994635][ T7463] CPU: 1 PID: 7463 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 139.004556][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 139.014452][ T7463] Call Trace: [ 139.017567][ T7463] [ 139.020434][ T7463] dump_stack_lvl+0x151/0x1b7 [ 139.024950][ T7463] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 139.030245][ T7463] ? __alloc_pages+0x780/0x780 [ 139.034847][ T7463] dump_stack+0x15/0x1b [ 139.038834][ T7463] should_fail_ex+0x3d0/0x520 [ 139.043353][ T7463] should_fail_alloc_page+0x68/0x90 [ 139.048385][ T7463] __alloc_pages+0x1f4/0x780 [ 139.052814][ T7463] ? prep_new_page+0x110/0x110 [ 139.057411][ T7463] ? _raw_spin_trylock_bh+0x190/0x190 [ 139.062619][ T7463] __get_free_pages+0xe/0x30 [ 139.067044][ T7463] kasan_populate_vmalloc_pte+0x39/0x130 [ 139.072510][ T7463] ? __apply_to_page_range+0x8ca/0xbe0 [ 139.077805][ T7463] __apply_to_page_range+0x8dd/0xbe0 [ 139.082926][ T7463] ? kasan_populate_vmalloc+0x70/0x70 [ 139.088130][ T7463] ? kasan_populate_vmalloc+0x70/0x70 [ 139.093333][ T7463] apply_to_page_range+0x3b/0x50 [ 139.098110][ T7463] kasan_populate_vmalloc+0x65/0x70 [ 139.103146][ T7463] alloc_vmap_area+0x1961/0x1aa0 [ 139.107927][ T7463] ? vm_map_ram+0x940/0x940 [ 139.112257][ T7463] ? __kasan_kmalloc+0x9c/0xb0 [ 139.116859][ T7463] ? kmalloc_node_trace+0x3d/0xb0 [ 139.121720][ T7463] __get_vm_area_node+0x171/0x370 [ 139.126582][ T7463] __vmalloc_node_range+0x36e/0x1540 [ 139.131701][ T7463] ? array_map_alloc+0x278/0x6d0 [ 139.136481][ T7463] ? vmap+0x2b0/0x2b0 [ 139.140293][ T7463] ? cap_capable+0x1d2/0x270 [ 139.144725][ T7463] bpf_map_area_alloc+0xdc/0xf0 [ 139.149408][ T7463] ? array_map_alloc+0x278/0x6d0 [ 139.154182][ T7463] array_map_alloc+0x278/0x6d0 [ 139.158782][ T7463] map_create+0x44a/0xcf0 [ 139.162949][ T7463] __sys_bpf+0x2e6/0x7f0 [ 139.167028][ T7463] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 139.172239][ T7463] ? debug_smp_processor_id+0x17/0x20 [ 139.177438][ T7463] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 139.183345][ T7463] __x64_sys_bpf+0x7c/0x90 [ 139.187596][ T7463] do_syscall_64+0x3d/0xb0 [ 139.191846][ T7463] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 139.197581][ T7463] RIP: 0033:0x7ff0b3a7d0a9 [ 139.201831][ T7463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 139.221270][ T7463] RSP: 002b:00007ff0b48b10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 139.229515][ T7463] RAX: ffffffffffffffda RBX: 00007ff0b3bb3f80 RCX: 00007ff0b3a7d0a9 [ 139.237325][ T7463] RDX: 0000000000000048 RSI: 0000000020000340 RDI: 0000000000000000 [ 139.245138][ T7463] RBP: 00007ff0b48b1120 R08: 0000000000000000 R09: 0000000000000000 [ 139.252949][ T7463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.260761][ T7463] R13: 000000000000000b R14: 00007ff0b3bb3f80 R15: 00007ffc0d79d638 [ 139.268578][ T7463] [ 139.292761][ T7472] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.300496][ T7472] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.310138][ T7472] device bridge_slave_0 entered promiscuous mode [ 139.331045][ T7472] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.338034][ T7472] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.345393][ T7472] device bridge_slave_1 entered promiscuous mode [ 139.550825][ T10] device bridge_slave_1 left promiscuous mode [ 139.559099][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.591946][ T10] device bridge_slave_0 left promiscuous mode [ 139.617091][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.649155][ T10] device veth1_macvtap left promiscuous mode [ 139.670742][ T10] device veth0_vlan left promiscuous mode [ 139.848919][ T7501] FAULT_INJECTION: forcing a failure. [ 139.848919][ T7501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.901547][ T7501] CPU: 0 PID: 7501 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 139.911457][ T7501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 139.921348][ T7501] Call Trace: [ 139.924471][ T7501] [ 139.927248][ T7501] dump_stack_lvl+0x151/0x1b7 [ 139.931765][ T7501] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 139.937061][ T7501] ? migrate_enable+0x1cb/0x2b0 [ 139.941747][ T7501] dump_stack+0x15/0x1b [ 139.945737][ T7501] should_fail_ex+0x3d0/0x520 [ 139.950252][ T7501] should_fail+0xb/0x10 [ 139.954241][ T7501] should_fail_usercopy+0x1a/0x20 [ 139.959106][ T7501] _copy_from_user+0x1e/0xc0 [ 139.963531][ T7501] generic_map_update_batch+0x4d9/0x8c0 [ 139.968917][ T7501] ? generic_map_delete_batch+0x5c0/0x5c0 [ 139.974468][ T7501] ? generic_map_delete_batch+0x5c0/0x5c0 [ 139.980024][ T7501] bpf_map_do_batch+0x4cc/0x630 [ 139.984710][ T7501] __sys_bpf+0x66b/0x7f0 [ 139.988786][ T7501] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 139.994000][ T7501] ? debug_smp_processor_id+0x17/0x20 [ 139.999200][ T7501] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.005106][ T7501] __x64_sys_bpf+0x7c/0x90 [ 140.009360][ T7501] do_syscall_64+0x3d/0xb0 [ 140.013611][ T7501] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 140.019250][ T7501] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.024977][ T7501] RIP: 0033:0x7f1a14e7d0a9 [ 140.029234][ T7501] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.048678][ T7501] RSP: 002b:00007f1a141f70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.056920][ T7501] RAX: ffffffffffffffda RBX: 00007f1a14fb3f80 RCX: 00007f1a14e7d0a9 [ 140.064731][ T7501] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 140.072543][ T7501] RBP: 00007f1a141f7120 R08: 0000000000000000 R09: 0000000000000000 [ 140.080354][ T7501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.088169][ T7501] R13: 000000000000000b R14: 00007f1a14fb3f80 R15: 00007ffeb69b4858 [ 140.095985][ T7501] [ 140.259775][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 140.268237][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.298009][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.306176][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.314260][ T2639] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.321103][ T2639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.328304][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.336430][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.344426][ T2639] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.351277][ T2639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.359909][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 140.369308][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.377061][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 140.384924][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.392923][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.407949][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.422398][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.432078][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.452143][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.459745][ T7472] device veth0_vlan entered promiscuous mode [ 140.471962][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.481639][ T7472] device veth1_macvtap entered promiscuous mode [ 140.495191][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.504116][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.521844][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.548608][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.602762][ T7561] syz-executor.0[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.602851][ T7561] syz-executor.0[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.850741][ T7590] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 141.112759][ T7611] syz-executor.3[7611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.112837][ T7611] syz-executor.3[7611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.133085][ T7613] syz-executor.0[7613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.147097][ T10] device bridge_slave_1 left promiscuous mode [ 141.189457][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.205340][ T7613] syz-executor.0[7613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.206178][ T28] audit: type=1400 audit(1719201811.596:151): avc: denied { ioctl } for pid=7615 comm="syz-executor.4" path="socket:[39431]" dev="sockfs" ino=39431 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 141.243769][ T10] device bridge_slave_0 left promiscuous mode [ 141.261783][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.281142][ T10] device veth1_macvtap left promiscuous mode [ 141.293564][ T10] device veth0_vlan left promiscuous mode [ 141.605891][ T7605] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.613328][ T7605] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.622722][ T7605] device bridge_slave_0 entered promiscuous mode [ 141.630037][ T7605] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.638612][ T7605] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.646175][ T7605] device bridge_slave_1 entered promiscuous mode [ 141.846637][ T7605] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.853698][ T7605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.860813][ T7605] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.867691][ T7605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.893797][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.901281][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.908732][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.936364][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.947911][ T2639] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.954782][ T2639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.986972][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.996772][ T331] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.003677][ T331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.013853][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.022625][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.072827][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.105207][ T7605] device veth0_vlan entered promiscuous mode [ 142.132799][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.141301][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.169333][ T2639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.183587][ T7605] device veth1_macvtap entered promiscuous mode [ 142.193121][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.218993][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.229985][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.260469][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.273879][ T331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 04:03:32 SYZFATAL: executor 2 failed 11 times: executor 2: failed to write control pipe: write |1: broken pipe SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67