last executing test programs: 3.295078081s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000013c0)={r1, 0xe0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, &(0x7f0000001140)=[0x0], &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xae, &(0x7f00000011c0)=[{}], 0x8, 0x10, &(0x7f0000001480), &(0x7f0000001240), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000001280)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001400)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9d, '\x00', r2, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x10000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/3493], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="f6ea090003000060009ba538a44c", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r7}, 0x10) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) (async) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f00000014c0)=ANY=[@ANYBLOB="0000000053fb7825ccd00000000830adb123a587c26f24838a9fa9e34c52ea5b3c3fb427b6e3e89f3259ce1d2518fe61a6ce48ecb11b3fe78171123ea99aac49e4382bb7ad5ff64ba5a3376e5d30d8a7980c58a9e01e1a5810ff05"]) 3.195685076s ago: executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xf4240, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000032000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.061864181s ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a6850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r11}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 1.183047777s ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x10, 0xc, &(0x7f00000015c0)=ANY=[@ANYBLOB="5b547b85c4b3aded7d0281af41e9687422dcd3ffcdd57678cb0bb58c0bc77b1126a14d953d180d3636ed7b4c31edb3e987c6b87631860f9155549151991348dce4a779a3cc70a2d31082ec4a0b7e9d8c48c19974310a69e624737d9f6562d9bcfd1c966ad143fc63c686d65d086ec9423d7c7e6625bf01bc7198046a2c5f045bb0423c6b8e84340a527124971d9740f6dc809d435f3f3d2f3076867ccc6abcd65b4eca6d8428709e3d866b9023b5616542c85bb5da392cbcb1f67cfbf32f1f3d344af4310f5b3e3721381215bbf4e82d6e612c63c1613adea78f4293bec7aecc5e124eb97e3715d257b80de93e7ddd02763276", @ANYRES32, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0xfff, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x7, 0x5, 0x809}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@enum={0x4, 0x5, 0x0, 0x6, 0x4, [{0x2, 0x4}, {0x7}, {0x3, 0x5}, {0xf, 0xeb9}, {0x3, 0x9}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000001180)=""/156, 0x51, 0x9c, 0x0, 0x5}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001240)=ANY=[@ANYRES64=r3, @ANYRESDEC=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd73}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.144323933s ago: executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020000000000000000000181900", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r3}, 0x10) (async) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r5 = getpid() r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000000), 0xfffffd26) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000540)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r6) 1.115513157s ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x20}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e02742e8680d85ff9782762f0866", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x1b, &(0x7f0000000180)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{}, 0x0, &(0x7f0000000600)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_evict_inode\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x1, 0x103, 0x501, r0, 0x1}, 0xfffffffffffffe90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r5, 0x40086607, 0x20001419) unlink(&(0x7f0000000000)='./cgroup\x00') r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 764.034922ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_free_percpu\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x0, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 746.263035ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x9ffb, 0x5, 0xfffff800, 0x840, r0, 0xac3d, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="29000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) close(r4) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000a40)=""/192, 0xc0}], 0x1}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0xffffff21, &(0x7f0000000640)}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) 716.153799ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000230000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffda4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x57, 0x10, &(0x7f0000000000), 0xffffffffffffffc9}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000040)=r5, 0x4) sendmsg$inet(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000840)="de931e9aaaf331346015935faafb99ace5cb309b549de40fea98a5cbcc62794425d61945339e2286f80189b11ca0fecb50b188b1eeeec51c79818226ec704d114705db4d42da2ca8662af37a72b54a9c4f29045eac9d94", 0x57}, {&(0x7f00000008c0)="69c5ea7256be592abdf4470fd1b69ebe41033b5ef2df312d1256c6097ed2ce80f428f1926e49c0547981fea938e18f220e7095adc939ec0c8f27325070", 0x3d}], 0x2}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x2009) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40305829, &(0x7f0000000040)) write$cgroup_subtree(r9, &(0x7f00000006c0)=ANY=[], 0x6) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r11, &(0x7f0000000200), 0x43451) 604.843017ms ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r4}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r5}, &(0x7f0000001c00), &(0x7f0000001c40)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065060400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c008cbdd3b4c3b7f28754860c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05ae8a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3cf96f9483ff19a6471bf5abc742d9cbcfb964b11b31034694a6aad86cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df424d1bafe5725c8a404724f8a4f1cda7997b65954f74097579b91da309b887af2485c2d9ab09b506000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb7818000000009dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbef88811dc8c1b27ac7d9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d856177a2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009d81003f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e75fa39643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2df636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978a2df2f2a29a387c6f0576b36038f819286eca99a6a434811cf2a117d775fe986a49fb82cf5f15972d5ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e6735305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a54b49e1ae6c5aa620d27e91aa0aa0ed6fcacfc91fbb4c256409e54daefbb107c381fa729ff5f3907d93430da178d685d7730f5e129438a5214f722096d29863301b0b811f69145d3fbd78a9059e454474f92e65828b018174a9f4738b8c71fbdeac26ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a378ed4c6267965af78b861bd025312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68f78215d65f96eb55db8cbcb060008000d988374f85451a694ffe38a1d03916ff1eec72b31c98d42e1a1bda1290de1a499a5a385b31112a48ba3e6d6849914c1788a7aca37177cc341fff44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553e4ece78d4c1501c70f5d81e0725d5b273755c0000000000000000aa4234ff82182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a11993d54f97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a923655800a2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574e6e6aefb7a68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24a8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa753ba528f7ba77e825051ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8e220bb4d83de1e4dc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a41b315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f0000000086e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e801015642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f845d1cc9ec4eee79c298fb0ba939b13707044e2e9cc0d350438c1c8c6bb9a38c6ac5ca0d9cf1f3d6915f25cb26edfc28b3079b97df32601240e454db103fb0c4a14c16837394d2b3673a3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4054605558ab31f339f6a4caf2ee2fd01f34dca3300000000000000000000000000000000f59f8e6e00000000c44130098d833a24000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c5954d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd603fd7f8898c70b5c65f2e28f22e1a79a6af3a54861b07f124642e98389557affbdede09b5566a4a1ee73b20846810030a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae3a9052be8eec1e95f6ad8d41dd34829503ba4b66e27154cb6e34aa13450522df1723130b6fb9bec59ae347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbde0f188eec7da7bccafbd5bf28a46f0eecc6b550471b0b0770c6a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd25091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a674bd16b8f7e6aed12a305366599f5f029a7b24558c02750500002f1c19d16a6f391906000000cc0bbbfb8c698ecc137d96711100e0108d3bd2afed0b279ebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc784c9f940d9fb0464a6cce635e14b80dc5c1c64e75e6bd5355d84f8df272f18f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de14275bf4a53e95235ae13768ab3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f9f8ad16eeb8342278f311cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706b584d8408c9652b3fe68500747f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2ccb600ae7a4b128cae19df160e7c207b89132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af911dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2befd1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bc5348229fa84ae78af8421a22c4b4c17a3d24a4a0104000000000000d77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2c2b5c976dacf3dda7191c757f208000000000000005f7ed983f65723fbb36b9b51abb0dbcd33570000000000000000251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a58275dbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193ad0438cdef7a98a1671a1918df310dc4bfd61c3db4819ab1c57b348a8ff1ed36364a20fe846f11d045de81f069bac8425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb2514a6ae50dbdd422de0f0f8c670000000000390be79688f80c4c314cb1b14afcaa5d23f9032e0ec51f45f447d6a7c798fcf7e60e2180e289410801e4f03a0e140f388f25b92da1025d8409e171a2336ed71cca86eb4658fe06df286e0e20276b0618eeffd05774f15686cd9d3182ca2fec863875f305fed6baf48a594db12582a38cfdffffffffffffff0cf8d920517835fe7d09cfcb624f6931f1cc6f6b71f58de9ddc38e0c43992f6bc57a718d0cfd197b5324b4e05ef1caa96db3ae1f2f2e5791faba2ebbe1a6faf21f2748fb1fb6743c3ca8af4e6b02518c9b7fdc1b5721eb1c3ed98db25536f74ac7861afc94544e52dcb5c60460a05802e3b437ac977bfa26b887a2443e8d559c58187f004eb82b07937df6e96f77ed551926bec4e0188fae10a35d1c5f1768ac6be829be1827f9df303160df18597efba46f1babc3d74adc31ca71bdab9079e4288881b434484eadde9da6b81802842abd462d546c59d87acc014f81d3414759bda12d2a2c6bc1bfa807bd3101eb227184a61107b6d0618e2a3b842671e084ac3f0ff94dc48b51601247318ab4d1c5106458000000000008000000000000cfee0107e6c2fe8639d926829fdbbd86bf591a8c3c235d8939af9d923f648165881a6c29997234406200b3b1c321cc158dbe17123eace3000000000000000000000000000000000000796de6ae4ae40bdf9a6e8c5dc29562262af9cd54e8e3ecc7e3c8cba0ecc791683496c4e5c1a5729714d9f9031f49b400cd2667b4ea6df54809615a4f973f93e6ccec72f16ff998e29ed99df733680a9d5cea57f99cc139b6ea9014f3000000000000000000000000000000000000feeab45a4046a622b0dceb413e4e39b7317e92cbed46b41ab5115bfb542c933783d750852dfdc6656aaf15e10615a88821f2f1bc53969b52d6852755e7681ad5beda80b38ccd34116b99f50b4fdd967b3f20f260455412b675639a26c76840cce40e323bde9d673fceda0ad6981565c8a183d928903b4f4472dde41b6dcd75314c31e704dfcb222c8359fe88944f852242270c932abfaeece0843d708f5cd25b2a63ae1e79723c1c3c013836b47da0a35d0f34c0705caae54024cf8ade6396ff44482284f415e5769d9ae8688a8d5516690aae9ce1c785262734723519b042a161e6efabf263a46ba92254a51ff6502470f3038cf6d8d991931cfd82ea97e1b596133e7754908d912d1054d174f5a731c019f152a5ca2e48599b6d563bfcd8c0950f4292769217a6e309452b14e64ae64ad58ced33582a1b3d2e0c300059fb1ee78cdddb827293de267d64bf47c3c8c419683c948e46de8cea0b232da00ff39ebef3b73b3d6fbeecd3f9ff06b7e08ed8ce2b9b9cf2e08975f5959fa7028f68c525ab173c0c553d21bd1e9176abdf799e7a08d2f3c14e1ca99d525bc3af0ca0f48f145c65b10dfc67803aab67f6b631d3d7e237fec4bc6eacc364b7cdd925973705d40c5a614e354d9b92357845d15ea41ad3e3a98396131f835e17f0cbfbdc59453991e689f9ce19bd4a3b4121e5a8b5dbb519b5556cb70603ceac0b7ca02cb05a01afa3164ca428add947673cdba49a0e6e8aeeddf52c0f0ef224c69a3c96c2fddf56d74c4ae7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r9, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r11 = openat$cgroup_type(r0, &(0x7f00000003c0), 0x2, 0x0) write$cgroup_type(r11, &(0x7f0000000400), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 599.374998ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500100000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000300fd00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000500)='ext4_da_write_pages_extent\x00', r2}, 0x10) 555.943484ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000022006a308c65cae77d8c5745172fe15cc4e2cff14e72f4a979645b98436f4439f28da5a9669cdec940c84fee8065e4ba0b32e4a970c6dfbf8d94182565bfbec62cecfd87901db5e1922c7ba84a227dfa7d2118cfba3324f50a7256405a0baba93cd547cc86950ab2aeef37851226acb8ed6949bc2d13e8cfa4cbfcbb89cc3c8dd9b8c1bb74cd1213bd54f464646430c15308b1f6073d", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15d4fadeccfa2b14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES64=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffea2}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x3, 0x5, &(0x7f0000000a40)=ANY=[@ANYBLOB="660a00000000000069114e0000080000180000000000000000000000000000009500000000000000752701097f3b063f28fae7291f4393855be353a2de233564c5730b282bfa7a74c0f968e77013f445f0393f34c806f7a574f91b8a929d8807d7174bf724e80c58dfd8859fffa2dfcb9cdbac2174f370351cff1ec6afe2a100f3c1d71e0a6d0dde5136e813b65677a700f421bc4ebdfb07b9c4c09a5ce292646ba94c03610e8ac94845c4077038"], &(0x7f0000000000)='GPL\x00'}, 0x80) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x808, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x811}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg(0xffffffffffffffff, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c7713409ef0cf69b4000000000000", &(0x7f0000000380), 0x5, r6}, 0x38) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7a1b7080000000000007b8af8ff0009000000a200000000000000000000f8ffffffb703000008000000b7040000000000008500000003000000950000000000000018044f9c01f53ea88d0f1d2c536266d01b4f5bf7262fb6b28f54915e6647a3558123ee97bffe4f657ddb72dd"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 519.25406ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xa, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) write$cgroup_type(r0, &(0x7f0000000140), 0x9) 507.287561ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x1, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0xa1f1, 0x10}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r4}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x541b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000040), 0x12) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100)=0x91000000, 0x1001) 477.724196ms ago: executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xf, &(0x7f00000008c0)=ANY=[@ANYBLOB="18030000fffffffb000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000d000000b7020000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000f8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0x1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f00000003c0)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x17, &(0x7f0000000500)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc6}}, @ringbuf_query, @map_idx={0x18, 0x0, 0x5, 0x0, 0xf}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESOCT=r3], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x4a}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000017c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r7, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000001040)='ext4_mballoc_prealloc\x00', r6}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002024207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'ipvlan0\x00', 0x806}) ioctl$TUNATTACHFILTER(r9, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000300)='ext4_fc_commit_start\x00', r10}, 0x10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70200006b5f2ec8b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000480)='ext4_fc_commit_start\x00', r12}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r13, &(0x7f0000000200), 0x43451) 474.002757ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_free_percpu\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x0, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 463.618998ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f00000002c0), &(0x7f0000000300)='%pi6 \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8943, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r2) 445.183671ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x5, 0x9, 0x4, 0x16, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x0, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='mm_page_alloc\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r4, &(0x7f00000000c0)=ANY=[], 0xffdd) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x20}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'macsec0\x00', @remote}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[@ANYBLOB='-'], 0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 423.680645ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x40086602, &(0x7f00000004c0)={'vlan0\x00', 0x400}) 345.507987ms ago: executing program 0: socketpair(0x15, 0x5, 0x40, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000d39bd1e5b28fe6c0c476dc0d921ff6b12e264e08bc22cfc84d163f867d1c77dd0c8fc8b4b48356242736d9450b436a3ed620204ff459cb7ac3fc7a3260086151804863186a0290a3358235f1402e275addbe86af7e75e91b05c8c0208cfdc53a689aa280cc40421e35de82d383a906bf4e1434b17185f9eb0928c29649c1d0b90b41fb4e108d31348a6babc516e47e16086e7467eda2b567"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 316.070311ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000700000000ad70df6d3047ed", @ANYRES8=r0, @ANYBLOB="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"], 0x0, 0x80000003, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = getpid() r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000000)=0x406, 0xfffffd26) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x188}, 0xd5fd26acd210cc0c) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000540)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) 315.102641ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000cc0)={0x7}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000100000061109d00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x2, 0x5a1, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x5}, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xbff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x4004011) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x366, 0x10000, 0x6, 0x0, r1, 0x7ff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0xe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0x0, 0x4, 0x0, 0x20}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0xf, &(0x7f0000000a40)=ANY=[@ANYBLOB="1807000000000000001600000000000018110000b8f26402499bccd8cf1c2317896623af6942f1fb01040000000000006f673c042b7197c87f69b84da8c14dc64947c442c7dae1624f345c8cad0efd59aee1c2bfb2219244600a4aa93fefad9161306a75c579a3a8bf2720a5572af4cb4205c35033f7c5fba40af08efa6ff9ac5941089fb64b00", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000063000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 300.956234ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x1d}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x1, 0x12) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x19000) mkdirat$cgroup(r1, &(0x7f00000000c0)='syz1\x00', 0x1ff) r5 = getpid() syz_open_procfs$namespace(r5, &(0x7f00000002c0)='ns/time\x00') bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6a, 0xa, 0xff00}, [@call={0x55}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 247.715452ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x200000000000000}, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffff254}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) openat$cgroup_ro(r2, &(0x7f0000000340)='freezer.parent_freezing\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x1fffffffffffffef, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x2, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) (async) write$cgroup_int(r6, &(0x7f0000000200), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000f6ffffffb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r10}, 0x10) write$cgroup_pid(r11, &(0x7f0000000980), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) 243.934602ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x92}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x2}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000000012000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={r5, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000003c0)=[0x0], &(0x7f0000000cc0)=[0x0], 0x0, 0xcb, &(0x7f0000000d00), 0x0, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000001180)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@bloom_filter={0x1e, 0x7fffffff, 0x2028, 0x3, 0x20b, 0xffffffffffffffff, 0xf74, '\x00', r6, 0xffffffffffffffff, 0x5, 0x2, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@bloom_filter={0x1e, 0x1, 0x1, 0x3, 0x1090, r2, 0x8, '\x00', r6, r1, 0x5, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r1, &(0x7f0000000240), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18010000000020e6ffffff00000f000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988d0e433454eac5b3bf9aa281383a37e35de94df591b29965d3d2e3a077018eacb73ff67ac4742e179043ccdc728de39e454f8761e58601ed395dc781e49ec1c24df917950f19a9606eb8ec436c15c8c262b7802f6cfbf5e50cf405840675e563541", 0xff8d}], 0x1}, 0x40) recvmsg(r10, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 123.488621ms ago: executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x34, &(0x7f00000003c0)=""/52, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0xa}, 0x8}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)=0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8010661b, &(0x7f0000000540)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 106.701984ms ago: executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x20200, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'team_slave_0\x00', @random="115c00ef5415"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r3, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x114f, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x20001419) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r6}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='ext4_es_insert_delayed_block\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 66.957369ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) close(r1) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000d39bd1e5b28fe6c0c476dc0d921ff6b12e264e08bc22cfc84d163f867d1c77dd0c8fc8b4b48356242736d9450b436a3ed620204ff459cb7ac3fc7a3260086151804863186a0290a3358235f1402e275addbe86af7e75e91b05c8c0208cfdc53a689aa280cc40421e35de82d383a906bf4e1434b17185f9eb0928c29649c1d0b90b41fb4e108d31348a6babc516e47e16086e7467eda2b567"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 17.548257ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_free_percpu\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x0, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 0s ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0xfffffffd, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000c82a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r3}, 0x10) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r5}, 0x10) (async, rerun: 64) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r7}, 0x10) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00', r8}, 0x10) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) (rerun: 32) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) kernel console output (not intermixed with test programs): ilesystem, so online resizing is not allowed [ 559.331656][ T2003] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 559.496864][ T2021] syz-executor.4[2021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.496929][ T2021] syz-executor.4[2021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.877670][ T2040] device syzkaller0 entered promiscuous mode [ 559.987604][ T2051] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 561.674807][ T2126] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 562.769571][ T2170] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 563.168574][ T2187] device syzkaller0 entered promiscuous mode [ 563.200466][ T2195] syz-executor.3[2195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.200531][ T2195] syz-executor.3[2195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.792250][ T2226] syz-executor.4[2226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.803964][ T2226] syz-executor.4[2226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.897316][ T2226] syz-executor.4[2226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 563.965223][ T2226] syz-executor.4[2226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 564.451539][ T2246] device syzkaller0 entered promiscuous mode [ 564.685197][ T2276] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.692306][ T2276] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.760701][ T2281] device bridge_slave_1 left promiscuous mode [ 564.779028][ T2281] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.811368][ T2281] device bridge_slave_0 left promiscuous mode [ 564.834799][ T2281] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.978032][ T2426] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 567.546036][ T2513] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 567.888076][ T2530] device vxcan1 entered promiscuous mode [ 568.071773][ T2538] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 568.191319][ T2548] device syzkaller0 entered promiscuous mode [ 568.227977][ T2552] device syzkaller0 entered promiscuous mode [ 568.513765][ T2601] syz-executor.4[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.513832][ T2601] syz-executor.4[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.528667][ T2601] syz-executor.4[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.549172][ T2601] syz-executor.4[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.848306][ T2633] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 568.916519][ T2642] device wg2 left promiscuous mode [ 569.407267][ T2726] syz-executor.1[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.407342][ T2726] syz-executor.1[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.673390][ T2748] device syzkaller0 entered promiscuous mode [ 569.944117][ T2760] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 569.960084][ T2761] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 570.018347][ T2763] syz-executor.1[2763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 570.018419][ T2763] syz-executor.1[2763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.230284][ T2830] device pim6reg1 entered promiscuous mode [ 571.698569][ T2870] device pim6reg1 entered promiscuous mode [ 571.923270][ T2893] syz-executor.2[2893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.923335][ T2893] syz-executor.2[2893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.962684][ T2887] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 572.016088][ T2900] device vxcan1 entered promiscuous mode [ 572.521431][ T2923] device sit0 entered promiscuous mode [ 574.124878][ T3038] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 574.451482][ T3054] bpf_get_probe_write_proto: 8 callbacks suppressed [ 574.451496][ T3054] syz-executor.3[3054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.473909][ T3054] syz-executor.3[3054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.633096][ T3067] device syzkaller0 entered promiscuous mode [ 574.869503][ T3100] syz-executor.1[3100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 574.869574][ T3100] syz-executor.1[3100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.245509][ T3124] syz-executor.4[3124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.264749][ T3115] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.290034][ T3124] syz-executor.4[3124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.290139][ T3126] syz-executor.4[3126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.302714][ T3115] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.322093][ T3115] device bridge_slave_0 entered promiscuous mode [ 575.325266][ T3126] syz-executor.4[3126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.332541][ T3115] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.351381][ T3115] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.359062][ T3115] device bridge_slave_1 entered promiscuous mode [ 575.470005][ T6611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 575.480461][ T6611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 575.522132][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.536485][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.564884][ T6569] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.571800][ T6569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.582266][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 575.591832][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.601215][ T6569] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.608186][ T6569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.638298][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 575.646989][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 575.668978][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.681533][ T6569] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.706578][T20362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 575.714797][T20362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 575.727017][T20362] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 575.735584][ T3165] syz-executor.4[3165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.735653][ T3165] syz-executor.4[3165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.748835][ T3115] device veth0_vlan entered promiscuous mode [ 575.881364][T20362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 575.900034][ T3115] device veth1_macvtap entered promiscuous mode [ 576.046186][T20369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 576.072447][T20369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 576.357903][T20328] device bridge_slave_1 left promiscuous mode [ 576.369457][T20328] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.470756][T20328] device bridge_slave_0 left promiscuous mode [ 576.480309][T20328] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.552330][T20328] device veth1_macvtap left promiscuous mode [ 577.630383][ T3237] device pim6reg1 entered promiscuous mode [ 578.997126][ T3340] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 579.735384][ T3402] device syzkaller0 entered promiscuous mode [ 581.530178][ T3526] device vxcan1 entered promiscuous mode [ 581.657090][ T3542] device syzkaller0 entered promiscuous mode [ 581.698838][ T3546] device syzkaller0 entered promiscuous mode [ 581.877877][ T3580] bpf_get_probe_write_proto: 8 callbacks suppressed [ 581.877940][ T3580] syz-executor.4[3580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.885410][ T3580] syz-executor.4[3580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.908084][ T3580] syz-executor.4[3580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.928964][ T3581] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 582.974175][ T3637] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 583.207239][ T3662] device vxcan1 entered promiscuous mode [ 583.257540][ T3666] syz-executor.3[3666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.258011][ T3666] syz-executor.3[3666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 583.601939][ T3709] device pim6reg1 entered promiscuous mode [ 583.723683][ T3742] tap0: tun_chr_ioctl cmd 1074025677 [ 583.741406][ T3742] tap0: linktype set to 821 [ 585.232035][ T3834] syz-executor.3[3834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.232111][ T3834] syz-executor.3[3834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.562144][ T3857] syz-executor.3[3857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 585.620668][ T3857] syz-executor.3[3857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.070616][ T3910] syz-executor.1[3910] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 586.096820][ T3904] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.116301][ T3904] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.123913][ T3904] device bridge_slave_0 entered promiscuous mode [ 586.131640][ T3904] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.138689][ T3904] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.147587][ T3904] device bridge_slave_1 entered promiscuous mode [ 586.222297][ T3916] ªªªªªª: renamed from vlan0 [ 586.292272][ T3904] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.299215][ T3904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.306304][ T3904] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.313154][ T3904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.382001][T11855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 586.392639][T11855] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.405638][T11855] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.430710][T20369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 586.441724][T20369] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.448750][T20369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.516569][T20369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 586.541836][T20369] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.549027][T20369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.602670][T11855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 586.614336][T11855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.638582][T20328] device bridge_slave_1 left promiscuous mode [ 586.646862][T20328] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.658348][T20328] device bridge_slave_0 left promiscuous mode [ 586.666044][T20328] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.675001][T20328] device veth0_vlan left promiscuous mode [ 586.821830][T20366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 586.838643][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 586.853735][ T3904] device veth0_vlan entered promiscuous mode [ 586.859939][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 586.868073][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 586.882964][ T3904] device veth1_macvtap entered promiscuous mode [ 586.889907][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 586.898458][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.907635][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.921992][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 586.930997][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 586.964336][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 586.983981][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 587.593841][ T4051] bpf_get_probe_write_proto: 1 callbacks suppressed [ 587.593855][ T4051] syz-executor.1[4051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.636841][ T4047] geneve1: tun_chr_ioctl cmd 1074025692 [ 587.654110][ T4051] syz-executor.1[4051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.852801][ T4074] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 587.898057][ T4077] device pim6reg1 entered promiscuous mode [ 587.930017][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.930107][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.944159][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.956057][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.974392][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.986766][ T4087] syz-executor.2[4087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 588.194511][ T4121] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 588.255255][ T4125] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 588.497766][ T4143] device syzkaller0 entered promiscuous mode [ 589.721602][ T4253] device syzkaller0 entered promiscuous mode [ 589.760373][ T4263] syz-executor.4[4263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.760443][ T4263] syz-executor.4[4263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 589.808507][ T4263] device pim6reg1 entered promiscuous mode [ 591.368052][ T4357] device syzkaller0 entered promiscuous mode [ 591.997907][ T4393] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 592.380584][ T4415] device pim6reg1 entered promiscuous mode [ 592.407900][ T4421] device vxcan1 entered promiscuous mode [ 592.774378][ T4480] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 592.782182][ T4459] device syzkaller0 entered promiscuous mode [ 593.187934][ T4551] device pim6reg1 entered promiscuous mode [ 593.205721][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.205778][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.220352][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.232251][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.245302][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.257257][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.271142][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.285110][ T4549] syz-executor.2[4549] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.421173][ T4567] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 593.474333][ T4576] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 593.641638][ T4605] device vxcan1 entered promiscuous mode [ 593.785199][ T4638] device sit0 left promiscuous mode [ 593.829761][ T4647] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 593.984415][ T4669] syz-executor.1[4669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.984483][ T4669] syz-executor.1[4669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.004642][ T4671] device team_slave_0 entered promiscuous mode [ 594.024133][ T4671] FAULT_INJECTION: forcing a failure. [ 594.024133][ T4671] name failslab, interval 1, probability 0, space 0, times 0 [ 594.036721][ T4671] CPU: 1 PID: 4671 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 594.048164][ T4671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 594.058058][ T4671] Call Trace: [ 594.061199][ T4671] dump_stack_lvl+0x1e2/0x24b [ 594.065706][ T4671] ? bfq_pos_tree_add_move+0x43b/0x43b [ 594.071037][ T4671] ? wake_up_klogd+0xc1/0xf0 [ 594.075434][ T4671] ? vprintk_emit+0x2f3/0x380 [ 594.079956][ T4671] dump_stack+0x15/0x17 [ 594.083929][ T4671] should_fail+0x3c6/0x510 [ 594.088197][ T4671] ? __alloc_skb+0x80/0x510 [ 594.092516][ T4671] __should_failslab+0xa4/0xe0 [ 594.097117][ T4671] should_failslab+0x9/0x20 [ 594.101604][ T4671] kmem_cache_alloc+0x3d/0x2e0 [ 594.106250][ T4671] __alloc_skb+0x80/0x510 [ 594.110511][ T4671] ? if_nlmsg_size+0x59c/0x5f0 [ 594.115023][ T4671] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 594.120139][ T4671] rtmsg_ifinfo+0x78/0x120 [ 594.124393][ T4671] __dev_notify_flags+0xdd/0x610 [ 594.129165][ T4671] ? __dev_change_flags+0x6e0/0x6e0 [ 594.134199][ T4671] ? __dev_change_flags+0x56c/0x6e0 [ 594.139237][ T4671] ? dev_get_flags+0x1e0/0x1e0 [ 594.143841][ T4671] ? selinux_capable+0x2f1/0x430 [ 594.148608][ T4671] ? selinux_capset+0xf0/0xf0 [ 594.153291][ T4671] dev_change_flags+0xf0/0x1a0 [ 594.158109][ T4671] dev_ifsioc+0x115/0xae0 [ 594.162250][ T4671] ? dev_ioctl+0xb40/0xb40 [ 594.166768][ T4671] ? dev_get_by_name_rcu+0xc5/0xf0 [ 594.171720][ T4671] dev_ioctl+0x526/0xb40 [ 594.175790][ T4671] sock_do_ioctl+0x295/0x3a0 [ 594.180227][ T4671] ? sock_show_fdinfo+0xa0/0xa0 [ 594.184917][ T4671] ? kernel_write+0x3d0/0x3d0 [ 594.189417][ T4671] ? selinux_file_ioctl+0x3cc/0x540 [ 594.194452][ T4671] sock_ioctl+0x4a6/0x760 [ 594.198614][ T4671] ? sock_poll+0x340/0x340 [ 594.202877][ T4671] ? security_file_ioctl+0x84/0xb0 [ 594.207816][ T4671] ? sock_poll+0x340/0x340 [ 594.212069][ T4671] __se_sys_ioctl+0x114/0x190 [ 594.216580][ T4671] __x64_sys_ioctl+0x7b/0x90 [ 594.221007][ T4671] do_syscall_64+0x34/0x70 [ 594.225265][ T4671] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 594.230992][ T4671] RIP: 0033:0x7fca47be5ea9 [ 594.235330][ T4671] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 594.254780][ T4671] RSP: 002b:00007fca46f600c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 594.263014][ T4671] RAX: ffffffffffffffda RBX: 00007fca47d1cf80 RCX: 00007fca47be5ea9 [ 594.271027][ T4671] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 [ 594.278913][ T4671] RBP: 00007fca46f60120 R08: 0000000000000000 R09: 0000000000000000 [ 594.287531][ T4671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 594.295612][ T4671] R13: 000000000000000b R14: 00007fca47d1cf80 R15: 00007ffc462f2948 [ 594.318561][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 594.327133][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 594.912737][ T4720] device pim6reg1 entered promiscuous mode [ 595.713270][ T4778] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 597.198242][ T4869] device vxcan1 entered promiscuous mode [ 597.493044][ T4883] device sit0 left promiscuous mode [ 597.576367][ T4888] device sit0 entered promiscuous mode [ 598.344229][ T4940] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 598.505687][ T4955] bpf_get_probe_write_proto: 137 callbacks suppressed [ 598.505791][ T4955] syz-executor.0[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.513980][ T4955] syz-executor.0[4955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 598.724203][ T4979] device pim6reg1 entered promiscuous mode [ 598.947411][ T4988] FAULT_INJECTION: forcing a failure. [ 598.947411][ T4988] name failslab, interval 1, probability 0, space 0, times 0 [ 598.962485][ T4988] CPU: 1 PID: 4988 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 598.973950][ T4988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 598.983837][ T4988] Call Trace: [ 598.986993][ T4988] dump_stack_lvl+0x1e2/0x24b [ 598.991489][ T4988] ? panic+0x80b/0x80b [ 598.995395][ T4988] ? bfq_pos_tree_add_move+0x43b/0x43b [ 598.999746][ T4989] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.000680][ T4988] ? __alloc_pages_nodemask+0x435/0xaf0 [ 599.000704][ T4988] ? workingset_activation+0x250/0x250 [ 599.007803][ T4989] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.013002][ T4988] dump_stack+0x15/0x17 [ 599.013026][ T4988] should_fail+0x3c6/0x510 [ 599.018984][ T4989] device bridge_slave_0 entered promiscuous mode [ 599.025157][ T4988] ? jbd2__journal_start+0x150/0x710 [ 599.025176][ T4988] __should_failslab+0xa4/0xe0 [ 599.025194][ T4988] should_failslab+0x9/0x20 [ 599.025219][ T4988] kmem_cache_alloc+0x3d/0x2e0 [ 599.030181][ T4989] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.033400][ T4988] ? debug_smp_processor_id+0x17/0x20 [ 599.033417][ T4988] jbd2__journal_start+0x150/0x710 [ 599.033440][ T4988] __ext4_journal_start_sb+0x249/0x4a0 [ 599.039637][ T4989] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.044681][ T4988] ext4_da_write_begin+0x708/0xf60 [ 599.044701][ T4988] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 599.044726][ T4988] ? iov_iter_advance+0x258/0xb20 [ 599.049963][ T4989] device bridge_slave_1 entered promiscuous mode [ 599.053629][ T4988] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 599.053653][ T4988] ? uuid_parse+0x470/0x470 [ 599.118451][ T4989] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.118817][ T4988] generic_perform_write+0x2cd/0x570 [ 599.125701][ T4989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 599.130788][ T4988] ? grab_cache_page_write_begin+0xa0/0xa0 [ 599.137933][ T4989] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.143634][ T4988] ? down_write+0xd7/0x150 [ 599.150505][ T4989] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.154730][ T4988] ? down_read_killable+0x220/0x220 [ 599.154756][ T4988] ? generic_write_checks+0x3b9/0x470 [ 599.172027][ T4988] ext4_buffered_write_iter+0x482/0x610 [ 599.177403][ T4988] ext4_file_write_iter+0x193/0x1c80 [ 599.182518][ T4988] ? kstrtol_from_user+0x310/0x310 [ 599.184268][T20362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 599.187458][ T4988] ? memset+0x35/0x40 [ 599.187475][ T4988] ? avc_policy_seqno+0x1b/0x70 [ 599.187490][ T4988] ? selinux_file_permission+0x2bb/0x560 [ 599.187506][ T4988] ? fsnotify_perm+0x67/0x4e0 [ 599.187520][ T4988] ? ext4_file_read_iter+0x4d0/0x4d0 [ 599.187534][ T4988] ? security_file_permission+0x86/0xb0 [ 599.187548][ T4988] ? iov_iter_init+0x3f/0x120 [ 599.187562][ T4988] vfs_write+0xb55/0xe70 [ 599.187578][ T4988] ? kernel_write+0x3d0/0x3d0 [ 599.187595][ T4988] ? mutex_trylock+0xa0/0xa0 [ 599.187612][ T4988] ? __fdget_pos+0x2e7/0x3a0 [ 599.187625][ T4988] ? ksys_write+0x77/0x2c0 [ 599.187639][ T4988] ksys_write+0x199/0x2c0 [ 599.187654][ T4988] ? __ia32_sys_read+0x90/0x90 [ 599.187670][ T4988] ? debug_smp_processor_id+0x17/0x20 [ 599.187688][ T4988] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 599.187703][ T4988] ? debug_smp_processor_id+0x17/0x20 [ 599.187716][ T4988] __x64_sys_write+0x7b/0x90 [ 599.187729][ T4988] do_syscall_64+0x34/0x70 [ 599.187743][ T4988] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 599.187755][ T4988] RIP: 0033:0x7ffb0da4fea9 [ 599.187769][ T4988] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 599.187778][ T4988] RSP: 002b:00007ffb0cdca0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 599.187796][ T4988] RAX: ffffffffffffffda RBX: 00007ffb0db86f80 RCX: 00007ffb0da4fea9 [ 599.187805][ T4988] RDX: 000000000000ffe6 RSI: 0000000020000040 RDI: 0000000000000007 [ 599.187814][ T4988] RBP: 00007ffb0cdca120 R08: 0000000000000000 R09: 0000000000000000 [ 599.187822][ T4988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 599.187832][ T4988] R13: 000000000000000b R14: 00007ffb0db86f80 R15: 00007ffec1ba8288 [ 599.365727][T20362] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.374731][T20362] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.414687][ T3351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.424418][ T3351] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.431316][ T3351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 599.459740][ T3351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 599.469508][ T3351] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.476419][ T3351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 599.487881][ T3351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 599.501153][ T3351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 599.541977][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 599.561443][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 599.602012][ T4989] device veth0_vlan entered promiscuous mode [ 599.608818][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 599.616813][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 599.764777][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 599.772339][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 599.944874][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 599.952937][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 599.999273][ T4989] device veth1_macvtap entered promiscuous mode [ 600.010868][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 600.019142][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 600.029500][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 600.069510][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 600.079724][ T3354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 600.161849][ T5053] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 600.349680][ T5073] syz-executor.4[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.349751][ T5073] syz-executor.4[5073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 600.633891][ T5086] device syzkaller0 entered promiscuous mode [ 600.817560][ T5103] FAULT_INJECTION: forcing a failure. [ 600.817560][ T5103] name failslab, interval 1, probability 0, space 0, times 0 [ 600.836799][ T5103] CPU: 1 PID: 5103 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 600.848267][ T5103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 600.858151][ T5103] Call Trace: [ 600.861294][ T5103] dump_stack_lvl+0x1e2/0x24b [ 600.865802][ T5103] ? bfq_pos_tree_add_move+0x43b/0x43b [ 600.871100][ T5103] ? vfs_write+0x854/0xe70 [ 600.875354][ T5103] dump_stack+0x15/0x17 [ 600.879338][ T5103] should_fail+0x3c6/0x510 [ 600.883598][ T5103] ? getname_flags+0xba/0x520 [ 600.888112][ T5103] __should_failslab+0xa4/0xe0 [ 600.892710][ T5103] should_failslab+0x9/0x20 [ 600.897044][ T5103] kmem_cache_alloc+0x3d/0x2e0 [ 600.901646][ T5103] getname_flags+0xba/0x520 [ 600.905986][ T5103] do_mkdirat+0xbb/0x2c0 [ 600.910068][ T5103] ? debug_smp_processor_id+0x17/0x20 [ 600.915268][ T5103] ? do_mknodat+0x450/0x450 [ 600.919626][ T5103] ? debug_smp_processor_id+0x17/0x20 [ 600.924820][ T5103] __x64_sys_mkdir+0x60/0x70 [ 600.929276][ T5103] do_syscall_64+0x34/0x70 [ 600.933501][ T5103] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 600.939226][ T5103] RIP: 0033:0x7fca47be5ea9 [ 600.943482][ T5103] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 600.962920][ T5103] RSP: 002b:00007fca46f600c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 600.971686][ T5103] RAX: ffffffffffffffda RBX: 00007fca47d1cf80 RCX: 00007fca47be5ea9 [ 600.979490][ T5103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 600.987442][ T5103] RBP: 00007fca46f60120 R08: 0000000000000000 R09: 0000000000000000 [ 600.995212][ T5103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 601.003011][ T5103] R13: 000000000000000b R14: 00007fca47d1cf80 R15: 00007ffc462f2948 [ 601.647217][ T5129] device syzkaller0 entered promiscuous mode [ 602.046424][ T5180] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 602.133078][ T5190] device pim6reg1 entered promiscuous mode [ 602.204799][ T5195] device syzkaller0 entered promiscuous mode [ 602.212759][ T5196] device sit0 entered promiscuous mode [ 602.261389][ T5196] device syzkaller0 entered promiscuous mode [ 602.291157][ T5199] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 602.585166][ T5224] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 602.837716][ T5238] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 603.443447][ T5255] device syzkaller0 entered promiscuous mode [ 603.510830][ T5258] device syzkaller0 entered promiscuous mode [ 604.909704][ T5342] device vxcan1 entered promiscuous mode [ 605.029012][ T5360] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 605.122440][ T5377] syz-executor.4[5377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.122501][ T5377] syz-executor.4[5377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.405703][ T5425] syz-executor.3[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.425689][ T5425] syz-executor.3[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.429888][ T5427] device syzkaller0 entered promiscuous mode [ 605.474458][ T5425] syz-executor.3[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.474528][ T5425] syz-executor.3[5425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.568536][ T5442] ªªªªªª: renamed from vlan0 [ 605.630146][ T5455] device syzkaller0 entered promiscuous mode [ 605.884846][ T5489] device syzkaller0 entered promiscuous mode [ 606.482006][ T5507] device vxcan1 entered promiscuous mode [ 606.511078][ T5518] syz-executor.1[5518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.511165][ T5518] syz-executor.1[5518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.538234][ T5515] device vxcan1 entered promiscuous mode [ 606.589217][ T5518] device syzkaller0 entered promiscuous mode [ 607.014024][ T5547] bridge0: port 3(macsec0) entered blocking state [ 607.036905][ T5547] bridge0: port 3(macsec0) entered disabled state [ 607.494136][ T5588] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 607.808455][ T5599] device wg2 entered promiscuous mode [ 607.818428][ T5603] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 608.042065][ T5649] syz-executor.1[5649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 608.042118][ T5649] syz-executor.1[5649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 608.146832][ T5669] device dummy0 entered promiscuous mode [ 609.516800][ T5727] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 610.435039][ T5794] syz-executor.2[5794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.435096][ T5794] syz-executor.2[5794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.453531][ T5794] device pim6reg1 entered promiscuous mode [ 610.580799][ T5805] device syzkaller0 entered promiscuous mode [ 610.639778][ T5817] syz-executor.1[5817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.639848][ T5817] syz-executor.1[5817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.780565][ T5830] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 611.052449][ T5837] device wg2 entered promiscuous mode [ 611.929362][ T5903] syz-executor.0[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.929427][ T5903] syz-executor.0[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.945439][ T5903] syz-executor.0[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.960034][ T5903] syz-executor.0[5903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.988448][ T5903] device pim6reg1 entered promiscuous mode [ 612.316107][ T5923] device syzkaller0 entered promiscuous mode [ 612.486704][ T5929] device pim6reg1 entered promiscuous mode [ 612.857799][ T5936] device veth1_macvtap left promiscuous mode [ 612.900619][ T5936] device veth1_macvtap entered promiscuous mode [ 612.928079][ T5936] device macsec0 entered promiscuous mode [ 612.961053][ T5938] syz-executor.3[5938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.961122][ T5938] syz-executor.3[5938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.981089][ T5938] device pim6reg1 entered promiscuous mode [ 613.270364][ T5969] device pim6reg1 entered promiscuous mode [ 614.029956][ T6015] device pim6reg1 entered promiscuous mode [ 614.125170][ T6024] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 614.411022][ T6051] device pim6reg1 entered promiscuous mode [ 614.809565][ T6072] FAULT_INJECTION: forcing a failure. [ 614.809565][ T6072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 614.822929][ T6072] CPU: 0 PID: 6072 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 614.834376][ T6072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 614.844260][ T6072] Call Trace: [ 614.847410][ T6072] dump_stack_lvl+0x1e2/0x24b [ 614.851909][ T6072] ? bfq_pos_tree_add_move+0x43b/0x43b [ 614.857196][ T6072] ? 0xffffffffa0016000 [ 614.861199][ T6072] ? is_bpf_text_address+0x172/0x190 [ 614.866319][ T6072] dump_stack+0x15/0x17 [ 614.870315][ T6072] should_fail+0x3c6/0x510 [ 614.874560][ T6072] should_fail_usercopy+0x1a/0x20 [ 614.879420][ T6072] _copy_from_user+0x20/0xd0 [ 614.883847][ T6072] __se_sys_bpf+0x232/0x11cb0 [ 614.888374][ T6072] ? terminate_walk+0x407/0x4f0 [ 614.893137][ T6072] ? __kasan_check_read+0x11/0x20 [ 614.897998][ T6072] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 614.903729][ T6072] ? rotate_reclaimable_page+0x530/0x530 [ 614.909191][ T6072] ? __mod_memcg_lruvec_state+0x131/0x310 [ 614.914754][ T6072] ? __x64_sys_bpf+0x90/0x90 [ 614.919177][ T6072] ? __mod_node_page_state+0xac/0xf0 [ 614.924299][ T6072] ? _kstrtoull+0x3a0/0x4a0 [ 614.928632][ T6072] ? kstrtouint_from_user+0x20a/0x2a0 [ 614.933840][ T6072] ? _raw_spin_unlock+0x4d/0x70 [ 614.938526][ T6072] ? kstrtol_from_user+0x310/0x310 [ 614.943474][ T6072] ? memset+0x35/0x40 [ 614.947371][ T6072] ? __fsnotify_parent+0x4b9/0x6c0 [ 614.952246][ T6072] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 614.958837][ T6072] ? proc_fail_nth_write+0x20b/0x290 [ 614.963957][ T6072] ? proc_fail_nth_read+0x210/0x210 [ 614.968990][ T6072] ? security_file_permission+0x86/0xb0 [ 614.974373][ T6072] ? rw_verify_area+0x1c3/0x360 [ 614.979061][ T6072] ? preempt_count_add+0x92/0x1a0 [ 614.983921][ T6072] ? vfs_write+0x854/0xe70 [ 614.988173][ T6072] ? kernel_write+0x3d0/0x3d0 [ 614.992682][ T6072] ? __kasan_check_write+0x14/0x20 [ 614.997630][ T6072] ? mutex_lock+0xa5/0x110 [ 615.001884][ T6072] ? mutex_trylock+0xa0/0xa0 [ 615.006312][ T6072] ? __kasan_check_write+0x14/0x20 [ 615.011255][ T6072] ? fput_many+0x160/0x1b0 [ 615.015513][ T6072] ? debug_smp_processor_id+0x17/0x20 [ 615.020716][ T6072] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 615.026623][ T6072] ? debug_smp_processor_id+0x17/0x20 [ 615.031832][ T6072] __x64_sys_bpf+0x7b/0x90 [ 615.036087][ T6072] do_syscall_64+0x34/0x70 [ 615.040340][ T6072] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 615.046153][ T6072] RIP: 0033:0x7f3975c1cea9 [ 615.050411][ T6072] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 615.069851][ T6072] RSP: 002b:00007f3974f970c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.078093][ T6072] RAX: ffffffffffffffda RBX: 00007f3975d53f80 RCX: 00007f3975c1cea9 [ 615.085911][ T6072] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 615.093712][ T6072] RBP: 00007f3974f97120 R08: 0000000000000000 R09: 0000000000000000 [ 615.101521][ T6072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 615.109344][ T6072] R13: 000000000000000b R14: 00007f3975d53f80 R15: 00007fffa96cdc78 [ 615.592081][ T6118] device syzkaller0 entered promiscuous mode [ 616.017320][ T6169] bpf_get_probe_write_proto: 14 callbacks suppressed [ 616.017333][ T6169] syz-executor.2[6169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.067283][ T6170] syz-executor.2[6170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.094173][ T6169] syz-executor.2[6169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.305859][ T6187] device syzkaller0 entered promiscuous mode [ 616.377500][ T6197] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 616.798386][ T6218] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 616.874500][ T6229] device veth1_macvtap left promiscuous mode [ 616.901998][ T6229] device veth1_macvtap entered promiscuous mode [ 616.921817][ T6259] syz-executor.3[6259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.921888][ T6259] syz-executor.3[6259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.934857][ T6229] device macsec0 entered promiscuous mode [ 617.261318][ T6236] device syzkaller0 entered promiscuous mode [ 617.540793][ T6315] device pim6reg1 entered promiscuous mode [ 619.050572][ T6371] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 619.068560][ T6380] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 619.199637][ T6405] syz-executor.0[6405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.200064][ T6405] syz-executor.0[6405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.348320][ T6414] syz-executor.0[6414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.447883][ T6414] syz-executor.0[6414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.646192][ T6424] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 619.833290][ T6443] syz-executor.4[6443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.878905][ T6457] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 620.001780][ T6473] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 620.315282][ T6473] device syzkaller0 entered promiscuous mode [ 620.428579][ T6485] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 620.993214][ T6509] device pim6reg1 entered promiscuous mode [ 621.544511][ T6541] bpf_get_probe_write_proto: 3 callbacks suppressed [ 621.544524][ T6541] syz-executor.0[6541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.561001][ T6541] syz-executor.0[6541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.582266][ T6541] device pim6reg1 entered promiscuous mode [ 621.656358][ T6545] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 621.875051][ T6630] syz-executor.0[6630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.875133][ T6630] syz-executor.0[6630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 621.890246][ T6630] device pim6reg1 entered promiscuous mode [ 622.318477][ T6643] device syzkaller0 entered promiscuous mode [ 622.449381][ T6675] syz-executor.0[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.449451][ T6675] syz-executor.0[6675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.488046][ T6660] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.519765][ T6660] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.527260][ T6660] device bridge_slave_0 entered promiscuous mode [ 622.534453][ T6660] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.541390][ T6660] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.548788][ T6660] device bridge_slave_1 entered promiscuous mode [ 622.567933][ T6675] device pim6reg1 entered promiscuous mode [ 622.578490][ T6679] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 622.679260][ T6660] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.686192][ T6660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.693265][ T6660] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.700053][ T6660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.736143][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 622.744290][ T3353] bridge0: port 1(bridge_slave_0) entered disabled state [ 622.753201][ T3353] bridge0: port 2(bridge_slave_1) entered disabled state [ 622.768632][ T6697] syz-executor.0[6697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.768692][ T6697] syz-executor.0[6697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.786546][ T6684] device syzkaller0 entered promiscuous mode [ 622.826151][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 622.834258][ T3689] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.841177][ T3689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.856393][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 622.865768][ T3689] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.872654][ T3689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.911040][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 622.925676][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 622.955896][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 622.964327][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 622.973959][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 622.981771][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.992537][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 623.001169][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.011584][ T6660] device veth0_vlan entered promiscuous mode [ 623.024227][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 623.032646][ T3689] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 623.044112][ T6660] device veth1_macvtap entered promiscuous mode [ 623.076782][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 623.078098][ T6717] syz-executor.0[6717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.084061][ T6717] syz-executor.0[6717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.085110][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 623.121301][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 623.152928][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 623.161375][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 623.174416][ T6717] device pim6reg1 entered promiscuous mode [ 623.206045][ T348] bridge0: port 3(macsec0) entered disabled state [ 623.215884][ T348] device bridge_slave_1 left promiscuous mode [ 623.235033][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.245650][ T348] device bridge_slave_0 left promiscuous mode [ 623.252840][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.263456][ T348] device veth1_macvtap left promiscuous mode [ 623.583489][ T6750] device pim6reg1 entered promiscuous mode [ 623.625922][ T6760] device syzkaller0 entered promiscuous mode [ 623.747214][ T6778] device veth1_macvtap left promiscuous mode [ 623.927771][ T6796] device pim6reg1 entered promiscuous mode [ 623.979774][ T6798] device wg2 left promiscuous mode [ 624.061552][ T6800] Y­4`Ò˜: renamed from lo [ 624.272716][ T6821] device syzkaller0 entered promiscuous mode [ 624.345653][ T6838] device pim6reg1 entered promiscuous mode [ 624.698357][ T6878] device pim6reg1 entered promiscuous mode [ 624.717111][ T6879] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 624.731063][ T6880] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 624.746357][ T6877] device pim6reg1 entered promiscuous mode [ 625.020769][ T6909] device pim6reg1 entered promiscuous mode [ 625.266942][ T6942] device syzkaller0 entered promiscuous mode [ 625.308051][ T6966] device pim6reg1 entered promiscuous mode [ 625.654590][ T6972] device syzkaller0 entered promiscuous mode [ 625.716144][ T6987] device sit0 entered promiscuous mode [ 625.827253][ T7005] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 625.985585][ T7021] device vxcan1 entered promiscuous mode [ 627.697452][ T7147] device syzkaller0 entered promiscuous mode [ 627.977693][ T7176] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.984780][ T7176] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.026307][ T7169] Y­4`Ò˜: renamed from lo [ 628.267980][ T7193] geneve0: tun_chr_ioctl cmd 1074025675 [ 628.273511][ T7193] geneve0: persist disabled [ 628.330245][ T7195] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 629.345805][ T7233] device syzkaller0 entered promiscuous mode [ 629.402695][ T7240] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 629.477338][ T7246] bpf_get_probe_write_proto: 16 callbacks suppressed [ 629.477349][ T7246] syz-executor.3[7246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.486409][ T7246] syz-executor.3[7246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.523319][ T7246] device pim6reg1 entered promiscuous mode [ 629.672774][ T7262] device syzkaller0 entered promiscuous mode [ 629.863136][ T7274] device veth1_macvtap left promiscuous mode [ 629.869237][ T7274] device macsec0 left promiscuous mode [ 629.954859][ T7282] syz-executor.0[7282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.954939][ T7282] syz-executor.0[7282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.974346][ T7282] device pim6reg1 entered promiscuous mode [ 630.440621][ T7326] syz-executor.4[7326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.440715][ T7326] syz-executor.4[7326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.507468][ T7326] device pim6reg1 entered promiscuous mode [ 631.076815][ T7358] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 631.175764][ T7364] syz-executor.0[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.175827][ T7364] syz-executor.0[7364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.242560][ T7374] device pim6reg1 entered promiscuous mode [ 631.593911][ T7394] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 631.923778][ T7408] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 631.971795][ T7412] syz-executor.1[7412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.971862][ T7412] syz-executor.1[7412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.988226][ T7412] device pim6reg1 entered promiscuous mode [ 632.231830][ T7417] device pim6reg1 entered promiscuous mode [ 632.487003][ T7440] device pim6reg1 entered promiscuous mode [ 632.526348][ T7451] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 632.543586][ T7444] device pim6reg1 entered promiscuous mode [ 632.753066][ T7496] tap0: tun_chr_ioctl cmd 1074025677 [ 632.758526][ T7496] tap0: linktype set to 780 [ 633.405469][ T7530] device wg2 entered promiscuous mode [ 633.447104][ T7532] device pim6reg1 entered promiscuous mode [ 633.657413][ T7550] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 633.688244][ T7538] device syzkaller0 entered promiscuous mode [ 633.763191][ T7556] device syzkaller0 entered promiscuous mode [ 634.005873][ T7574] device pim6reg1 entered promiscuous mode [ 634.286609][ T7588] device wg2 entered promiscuous mode [ 634.310067][ T7581] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 634.421856][ T7615] device pim6reg1 entered promiscuous mode [ 634.710982][ T7626] device syzkaller0 entered promiscuous mode [ 635.120827][ T7653] bpf_get_probe_write_proto: 8 callbacks suppressed [ 635.120839][ T7653] syz-executor.2[7653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.127911][ T7653] syz-executor.2[7653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.180359][ T7653] device pim6reg1 entered promiscuous mode [ 635.214332][ T7665] syz-executor.4[7665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.214379][ T7665] syz-executor.4[7665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.226938][ T7665] syz-executor.4[7665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.239287][ T7665] syz-executor.4[7665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.381916][ T7740] device sit0 entered promiscuous mode [ 636.516673][ T7747] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 636.735328][ T7766] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 637.772729][ T7813] syz-executor.3[7813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.772795][ T7813] syz-executor.3[7813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.787750][ T7813] device pim6reg1 entered promiscuous mode [ 637.954242][ T7829] device syzkaller0 entered promiscuous mode [ 638.111018][ T7834] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 638.141900][ T7853] syz-executor.4[7853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.141968][ T7853] syz-executor.4[7853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.163337][ T7853] device pim6reg1 entered promiscuous mode [ 638.763603][ T7899] device pim6reg1 entered promiscuous mode [ 638.879991][ T7903] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 639.310163][ T7918] device vxcan1 entered promiscuous mode [ 639.458218][ T7924] device pim6reg1 entered promiscuous mode [ 639.706875][ T7964] device pim6reg1 entered promiscuous mode [ 639.859991][ T7971] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 639.912819][ T7969] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.927502][ T7969] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.942606][ T7969] device bridge_slave_0 entered promiscuous mode [ 639.958548][ T7969] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.973255][ T7969] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.984600][ T7969] device bridge_slave_1 entered promiscuous mode [ 640.005738][ T7977] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 640.060880][ T7969] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.067845][ T7969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.074946][ T7969] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.081797][ T7969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.108642][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 640.118272][ T3352] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.125782][ T3352] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.146456][T11870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.163986][T11870] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.170895][T11870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.178500][T11870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.187555][T11870] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.194449][T11870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.202026][T11870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 640.209945][T11870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 640.226678][ T7992] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 640.250280][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 640.259291][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 640.267275][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 640.274567][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 640.282659][ T7969] device veth0_vlan entered promiscuous mode [ 640.296157][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 640.305022][ T7988] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 640.306036][ T7969] device veth1_macvtap entered promiscuous mode [ 640.331035][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 640.352092][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 640.379136][ T7992] device pim6reg1 entered promiscuous mode [ 640.656165][ T8020] device sit0 left promiscuous mode [ 640.755795][ T348] device bridge_slave_1 left promiscuous mode [ 640.772771][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.785092][ T348] device bridge_slave_0 left promiscuous mode [ 640.791145][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.029851][ T8050] device pim6reg1 entered promiscuous mode [ 641.057880][ T8053] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 641.163883][ T8061] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 641.184246][ T8066] bpf_get_probe_write_proto: 14 callbacks suppressed [ 641.184259][ T8066] syz-executor.4[8066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.202069][ T8066] syz-executor.4[8066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.410814][ T8085] device pim6reg1 entered promiscuous mode [ 641.497614][ T8092] device vxcan1 entered promiscuous mode [ 641.606369][ T8096] EXT4-fs warning: 1 callbacks suppressed [ 641.606385][ T8096] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 641.606395][ T8102] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 641.678742][ T8114] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 641.798758][ T8124] device pim6reg1 entered promiscuous mode [ 642.232300][ T8146] device syzkaller0 entered promiscuous mode [ 642.339106][ T8156] device pim6reg1 entered promiscuous mode [ 642.994100][ T8218] syz-executor.1[8218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.994163][ T8218] syz-executor.1[8218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 643.032104][ T8214] device vxcan1 entered promiscuous mode [ 643.187366][ T8222] syz-executor.4[8222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 643.695509][ T8244] device syzkaller0 entered promiscuous mode [ 643.828860][ T8256] device pim6reg1 entered promiscuous mode [ 644.190942][ T8264] syz-executor.4[8264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.191005][ T8264] syz-executor.4[8264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.637632][ T8275] syz-executor.3[8275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.649434][ T8275] syz-executor.3[8275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.785770][ T8289] device pim6reg1 entered promiscuous mode [ 645.114457][ T8346] device pim6reg1 entered promiscuous mode [ 645.128395][ T8328] device sit0 entered promiscuous mode [ 645.584247][ T8379] device pim6reg1 entered promiscuous mode [ 645.660539][ T8383] device sit0 entered promiscuous mode [ 645.910443][ T8410] device pim6reg1 entered promiscuous mode [ 646.026336][ T8429] device syzkaller0 entered promiscuous mode [ 646.288580][ T8447] device pim6reg1 entered promiscuous mode [ 646.348020][ T8454] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 646.683428][ T8478] device syzkaller0 entered promiscuous mode [ 646.746468][ T8491] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 647.169512][ T8529] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 647.408194][ T8566] syz-executor.3[8566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.408255][ T8566] syz-executor.3[8566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.437093][ T8571] syz-executor.0[8571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.449661][ T8571] syz-executor.0[8571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.561752][ T8583] device pim6reg1 entered promiscuous mode [ 647.816499][ T8607] device pim6reg1 entered promiscuous mode [ 647.866342][ T8612] device syzkaller0 entered promiscuous mode [ 648.510011][ T8620] device pim6reg1 entered promiscuous mode [ 648.666920][ T8632] device sit0 left promiscuous mode [ 648.906521][ T8651] device wlan0 entered promiscuous mode [ 649.575647][ T8677] device vxcan1 entered promiscuous mode [ 649.655163][ T8683] device pim6reg1 entered promiscuous mode [ 649.702986][ T8686] device syzkaller0 entered promiscuous mode [ 650.134078][ T8733] device pim6reg1 entered promiscuous mode [ 650.455873][ T8755] device pim6reg1 entered promiscuous mode [ 650.905775][ T8806] syz-executor.2[8806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.905830][ T8806] syz-executor.2[8806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.919301][ T8806] syz-executor.2[8806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 650.933772][ T8806] syz-executor.2[8806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.041420][ T8808] device syzkaller0 entered promiscuous mode [ 651.132008][ T8820] device pim6reg1 entered promiscuous mode [ 651.242002][ T8832] device vxcan1 entered promiscuous mode [ 651.808456][ T8879] device syzkaller0 entered promiscuous mode [ 651.952401][ T8920] device pim6reg1 entered promiscuous mode [ 652.254045][ T8943] device syzkaller0 entered promiscuous mode [ 652.826912][ T9016] device syzkaller0 entered promiscuous mode [ 653.032576][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.039466][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.047363][ T9051] device bridge_slave_0 entered promiscuous mode [ 653.077107][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.086977][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.114154][ T9051] device bridge_slave_1 entered promiscuous mode [ 653.176073][ T9072] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 653.273113][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 653.280800][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 653.305179][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 653.313485][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.323511][ T6628] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.330394][ T6628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.337684][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 653.345950][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.353976][ T6628] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.360841][ T6628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.370486][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.380272][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.393623][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 653.467193][T20357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 653.487481][T20357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.502069][T20357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.519723][T20357] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.537128][ T9051] device veth0_vlan entered promiscuous mode [ 653.562566][T20373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 653.583248][ T9051] device veth1_macvtap entered promiscuous mode [ 653.615020][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 653.623757][ T9097] syz-executor.4[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.623824][ T9097] syz-executor.4[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.637483][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 653.697259][ T348] device veth1_macvtap left promiscuous mode [ 654.397702][ T9133] device pim6reg1 entered promiscuous mode [ 655.097799][ T9166] device syzkaller0 entered promiscuous mode [ 655.239100][ T9167] device vxcan1 entered promiscuous mode [ 655.336360][ T9171] device wg2 left promiscuous mode [ 655.487168][ T9182] tap0: tun_chr_ioctl cmd 1074025673 [ 655.510101][ T9182] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 655.577048][ T9193] device pim6reg1 entered promiscuous mode [ 655.599291][ T9186] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 655.800670][ T9215] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 656.044762][ T9239] device pim6reg1 entered promiscuous mode [ 656.122404][ T9241] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 656.183450][ T9242] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.191454][ T9242] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.199844][ T9242] device bridge_slave_0 entered promiscuous mode [ 656.211192][ T9242] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.220398][ T9242] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.230972][ T9242] device bridge_slave_1 entered promiscuous mode [ 656.372873][ T9242] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.379776][ T9242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 656.386886][ T9242] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.393724][ T9242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 656.415304][ T3350] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.432635][ T3350] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.476092][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 656.483551][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 656.491390][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 656.500284][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 656.509753][ T3348] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.516645][ T3348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 656.524170][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 656.565220][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 656.573416][ T3348] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.580289][ T3348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 656.595093][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 656.603094][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 656.611240][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 656.623160][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 656.645127][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 656.654200][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 656.666802][ T9242] device veth0_vlan entered promiscuous mode [ 656.675129][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 656.683345][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 656.697624][ T9242] device veth1_macvtap entered promiscuous mode [ 656.705176][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 656.712528][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 656.720513][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 656.728697][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 656.736928][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 656.756915][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 656.765861][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 656.774096][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 656.782532][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 656.857500][ T9269] device pim6reg1 entered promiscuous mode [ 656.955882][ T348] device bridge_slave_1 left promiscuous mode [ 656.973731][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.998408][ T348] device bridge_slave_0 left promiscuous mode [ 657.004943][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.033760][ T348] device veth1_macvtap left promiscuous mode [ 657.079309][ T9288] syz-executor.3[9288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.079372][ T9288] syz-executor.3[9288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.347161][ T9311] device pim6reg1 entered promiscuous mode [ 657.472954][ T9283] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.504655][ T9283] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.524239][ T9283] device bridge_slave_0 entered promiscuous mode [ 657.553474][ T9283] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.580756][ T9283] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.601495][ T9283] device bridge_slave_1 entered promiscuous mode [ 657.906085][ T9283] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.912990][ T9283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.920121][ T9283] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.926985][ T9283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.001115][ T3352] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.015932][ T3352] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.033361][ T3352] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.072926][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.084560][ T3349] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.091447][ T3349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.099803][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.108384][ T3349] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.115263][ T3349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.124266][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.132350][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.162589][ T9365] device pim6reg1 entered promiscuous mode [ 658.174523][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 658.203064][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.211362][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.222051][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 658.231302][ T9283] device veth0_vlan entered promiscuous mode [ 658.264777][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.274516][ T9283] device veth1_macvtap entered promiscuous mode [ 658.296310][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.310242][ T3348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.393958][ T9373] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 658.655509][ T348] device bridge_slave_1 left promiscuous mode [ 658.661632][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.669295][ T348] device bridge_slave_0 left promiscuous mode [ 658.677068][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.687873][ T348] device veth1_macvtap left promiscuous mode [ 658.697847][ T348] device veth0_vlan left promiscuous mode [ 659.111131][ T9453] device syzkaller0 entered promiscuous mode [ 659.261783][ T9473] device pim6reg1 entered promiscuous mode [ 659.454169][ T9506] device pim6reg1 entered promiscuous mode [ 659.813284][ T9512] device syzkaller0 entered promiscuous mode [ 659.903237][ T9537] device pim6reg1 entered promiscuous mode [ 660.357552][ T9587] device pim6reg1 entered promiscuous mode [ 660.629414][ T9610] syz-executor.1[9610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.629470][ T9610] syz-executor.1[9610] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 660.723688][ T9619] device pim6reg1 entered promiscuous mode [ 661.105458][ T9656] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 661.447105][ T9686] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 661.830011][ T9720] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.850250][ T9720] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.857961][ T9720] device bridge_slave_0 entered promiscuous mode [ 661.869568][ T9720] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.876792][ T9720] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.886941][ T9720] device bridge_slave_1 entered promiscuous mode [ 662.059894][ T9746] device syzkaller0 entered promiscuous mode [ 662.099137][ T9720] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.106026][ T9720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.113127][ T9720] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.119934][ T9720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 662.159728][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 662.177435][ T3350] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.185089][ T3350] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.206167][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 662.214242][ T3350] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.221122][ T3350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 662.228878][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 662.237456][ T3350] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.244319][ T3350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.254832][T20353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 662.263598][T20353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 662.290501][T20357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 662.312938][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 662.321413][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 662.328839][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 662.337815][ T9720] device veth0_vlan entered promiscuous mode [ 662.371268][ T9720] device veth1_macvtap entered promiscuous mode [ 662.378665][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 662.393173][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 662.412617][ T3349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 662.449703][ T348] device bridge_slave_1 left promiscuous mode [ 662.460276][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.485102][ T348] device bridge_slave_0 left promiscuous mode [ 662.505511][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.517121][ T348] device veth1_macvtap left promiscuous mode [ 662.602980][ T9798] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 662.939075][ T9826] device veth0_vlan left promiscuous mode [ 662.948069][ T9826] device veth0_vlan entered promiscuous mode [ 662.972584][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 662.985323][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 662.992819][ T3350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 663.268197][ T9871] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 663.381974][ T9868] device syzkaller0 entered promiscuous mode [ 663.475281][ T9877] device syzkaller0 entered promiscuous mode [ 663.628285][ T9890] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 664.330324][ T9949] syz-executor.2[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.330390][ T9949] syz-executor.2[9949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.645542][ T9971] syz-executor.1[9971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.663789][ T9971] syz-executor.1[9971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.767535][ T9977] device vxcan1 entered promiscuous mode [ 665.244031][T10011] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 665.864326][T10049] device syzkaller0 entered promiscuous mode [ 666.097288][T10076] device pim6reg1 entered promiscuous mode [ 666.391635][T10104] syz-executor.0[10104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.391694][T10104] syz-executor.0[10104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.431969][T10109] syz-executor.4[10109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.443965][T10109] syz-executor.4[10109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.499087][T10116] device pim6reg1 entered promiscuous mode [ 666.751571][T10110] device syzkaller0 entered promiscuous mode [ 666.818301][T10150] device pim6reg1 entered promiscuous mode [ 667.205376][T10216] device pim6reg1 entered promiscuous mode [ 667.268152][T10218] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 667.584883][T10257] device pim6reg1 entered promiscuous mode [ 667.726589][T10259] device syzkaller0 entered promiscuous mode [ 667.852712][T10279] device macsec0 entered promiscuous mode [ 667.882766][T10286] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 667.888069][T10284] device pim6reg1 entered promiscuous mode [ 667.902898][T10288] device sit0 entered promiscuous mode [ 668.150922][T10331] device pim6reg1 entered promiscuous mode [ 668.572340][T10353] syz-executor.3[10353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.572392][T10353] syz-executor.3[10353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.603433][T10353] syz-executor.3[10353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.616821][T10353] syz-executor.3[10353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.635195][T10351] Â: renamed from pim6reg1 [ 668.811101][T10371] syz-executor.2[10371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.811158][T10371] syz-executor.2[10371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 668.895987][T10382] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 668.974429][T10387] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 669.011317][T10390] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 669.030212][T10388] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 669.519617][T10457] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 669.709037][T10465] device wlan0 entered promiscuous mode [ 669.971734][T10495] device vxcan1 entered promiscuous mode [ 670.130811][T10530] device sit0 left promiscuous mode [ 670.151171][T10536] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 670.170980][T10530] device sit0 entered promiscuous mode [ 670.459993][T10546] device syzkaller0 entered promiscuous mode [ 670.766583][T10587] device syzkaller0 entered promiscuous mode [ 671.349649][T10642] device pim6reg1 entered promiscuous mode [ 671.622033][T10667] device pim6reg1 entered promiscuous mode [ 671.660798][T10669] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 671.684038][T10662] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.692540][T10662] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.702802][T10662] device bridge_slave_0 entered promiscuous mode [ 671.719902][T10663] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.738247][T10663] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.746039][T10663] device bridge_slave_0 entered promiscuous mode [ 671.753115][T10663] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.772860][T10663] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.780402][T10663] device bridge_slave_1 entered promiscuous mode [ 671.787277][T10662] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.794117][T10662] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.801935][T10662] device bridge_slave_1 entered promiscuous mode [ 671.977012][T10662] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.983878][T10662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 671.991006][T10662] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.997781][T10662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.022800][T11864] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.034648][T11864] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.075479][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 672.085188][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 672.094431][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 672.102939][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.110962][ T6628] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.117885][ T6628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.134876][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 672.142980][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.151007][ T3353] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.157857][ T3353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.165621][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 672.173626][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.181920][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 672.189795][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.212543][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 672.219915][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 672.237067][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 672.245434][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 672.262140][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 672.270393][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.278659][ T3353] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.285517][ T3353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.292739][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 672.300891][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.308965][T10709] bpf_get_probe_write_proto: 4 callbacks suppressed [ 672.308976][T10709] syz-executor.2[10709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.309090][ T3353] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.321811][T10709] syz-executor.2[10709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.326941][ T3353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.331718][T10662] device veth0_vlan entered promiscuous mode [ 672.372381][T10714] device pim6reg1 entered promiscuous mode [ 672.379651][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 672.387276][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 672.395689][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.410554][T10662] device veth1_macvtap entered promiscuous mode [ 672.430170][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.437791][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 672.446023][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 672.453980][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 672.463014][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 672.470696][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 672.478944][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.486859][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 672.494786][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.523168][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 672.554492][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 672.609381][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 672.617798][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 672.626185][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 672.634436][ T6628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 672.649956][ T348] device bridge_slave_1 left promiscuous mode [ 672.658355][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.667228][ T348] device bridge_slave_0 left promiscuous mode [ 672.681801][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.700799][ T348] device veth0_vlan left promiscuous mode [ 672.961759][T10663] device veth0_vlan entered promiscuous mode [ 672.975699][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 672.983460][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.991410][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.998719][T12796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 673.013176][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 673.022114][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 673.031727][T10663] device veth1_macvtap entered promiscuous mode [ 673.048949][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 673.057084][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 673.068686][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 673.081449][ T3353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 673.162651][T10776] syz-executor.0[10776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.162685][T10776] syz-executor.0[10776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.419194][T10816] device syzkaller0 entered promiscuous mode [ 673.559199][T10827] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.620388][T10835] syz-executor.0[10835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.620457][T10835] syz-executor.0[10835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 673.810298][T10858] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 673.866126][ T348] device bridge_slave_1 left promiscuous mode [ 673.880197][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.893347][ T348] device bridge_slave_0 left promiscuous mode [ 673.901175][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.910185][ T348] device veth1_macvtap left promiscuous mode [ 674.125189][T10885] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 674.471012][T10899] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 675.613313][T10961] device pim6reg1 entered promiscuous mode [ 675.718285][T10979] €Â: renamed from pim6reg1 [ 675.723378][T10965] Â: renamed from pim6reg1 [ 675.756005][T10981] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 675.952178][T11006] device pim6reg1 entered promiscuous mode [ 676.060404][T11019] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 676.196845][T11040] device pim6reg1 entered promiscuous mode [ 676.891677][T11112] device pim6reg1 entered promiscuous mode [ 677.150798][T11131] device syzkaller0 entered promiscuous mode [ 677.286414][T11143] device pim6reg1 entered promiscuous mode [ 677.512582][T11159] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.059721][T11185] device pim6reg1 entered promiscuous mode [ 678.130066][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.130116][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.149920][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.162366][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.185078][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.196828][T11189] syz-executor.3[11189] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 678.486900][T11214] device sit0 entered promiscuous mode [ 679.716651][T11338] bridge0: port 3(macsec0) entered blocking state [ 679.723023][T11338] bridge0: port 3(macsec0) entered disabled state [ 679.730071][T11338] device macsec0 entered promiscuous mode [ 679.735930][T11338] bridge0: port 3(macsec0) entered blocking state [ 679.742193][T11338] bridge0: port 3(macsec0) entered forwarding state [ 679.798382][T11342] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 679.880446][T11336] device syzkaller0 entered promiscuous mode [ 680.023600][T11374] syz-executor.4[11374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.023658][T11374] syz-executor.4[11374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.464207][T11400] device pim6reg1 entered promiscuous mode [ 680.707865][T11412] geneve0: tun_chr_ioctl cmd 1074025675 [ 680.714484][T11412] geneve0: persist disabled [ 680.785150][T11420] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 680.962420][T11431] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 681.041701][T11420] device syzkaller0 entered promiscuous mode [ 681.173739][T11442] device wg2 entered promiscuous mode [ 681.894847][T11469] syz-executor.4[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.894911][T11469] syz-executor.4[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.538532][T11537] device pim6reg1 entered promiscuous mode [ 682.557488][T11535] FAULT_INJECTION: forcing a failure. [ 682.557488][T11535] name failslab, interval 1, probability 0, space 0, times 0 [ 682.570069][T11535] CPU: 1 PID: 11535 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 682.581599][T11535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 682.591757][T11535] Call Trace: [ 682.594888][T11535] dump_stack_lvl+0x1e2/0x24b [ 682.599390][T11535] ? bfq_pos_tree_add_move+0x43b/0x43b [ 682.604699][T11535] ? __es_remove_extent+0x14a0/0x1dd0 [ 682.609896][T11535] dump_stack+0x15/0x17 [ 682.613883][T11535] should_fail+0x3c6/0x510 [ 682.618135][T11535] ? __es_insert_extent+0x72a/0x17c0 [ 682.623257][T11535] __should_failslab+0xa4/0xe0 [ 682.627859][T11535] should_failslab+0x9/0x20 [ 682.632198][T11535] kmem_cache_alloc+0x3d/0x2e0 [ 682.636981][T11535] __es_insert_extent+0x72a/0x17c0 [ 682.642048][T11535] ? _raw_write_lock+0xa4/0x170 [ 682.646730][T11535] ext4_es_insert_extent+0x576/0x2d80 [ 682.651938][T11535] ? ext4_file_write_iter+0x10d2/0x1c80 [ 682.657329][T11535] ? ext4_es_scan_clu+0x340/0x340 [ 682.662185][T11535] ? _raw_read_unlock+0x25/0x40 [ 682.666854][T11535] ? ext4_es_lookup_extent+0x33b/0x940 [ 682.672160][T11535] ext4_map_blocks+0xede/0x1d10 [ 682.676846][T11535] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 682.681873][T11535] ? ext4_inode_journal_mode+0x3ab/0x470 [ 682.687348][T11535] ext4_writepages+0x148b/0x3c00 [ 682.692131][T11535] ? ext4_readpage+0x230/0x230 [ 682.696720][T11535] ? __kernel_text_address+0x9b/0x110 [ 682.701922][T11535] ? unwind_get_return_address+0x4d/0x90 [ 682.707387][T11535] ? arch_stack_walk+0xf3/0x140 [ 682.712083][T11535] ? stack_trace_snprint+0xf0/0xf0 [ 682.717034][T11535] ? __iomap_dio_rw+0x206/0x10f0 [ 682.721792][T11535] ? __iomap_dio_rw+0x206/0x10f0 [ 682.726581][T11535] ? ext4_readpage+0x230/0x230 [ 682.731172][T11535] do_writepages+0x12e/0x270 [ 682.735594][T11535] ? iomap_dio_rw+0x35/0x80 [ 682.739932][T11535] ? ext4_file_write_iter+0x10d2/0x1c80 [ 682.745313][T11535] ? vfs_write+0xb55/0xe70 [ 682.749576][T11535] ? __writepage+0x130/0x130 [ 682.753994][T11535] ? __kasan_check_write+0x14/0x20 [ 682.758945][T11535] ? _raw_spin_lock+0xa4/0x1b0 [ 682.763539][T11535] ? _raw_spin_unlock+0x4d/0x70 [ 682.768236][T11535] __filemap_fdatawrite_range+0x33c/0x3f0 [ 682.773783][T11535] ? filemap_check_errors+0x150/0x150 [ 682.779009][T11535] filemap_write_and_wait_range+0x64/0xe0 [ 682.784547][T11535] __iomap_dio_rw+0x648/0x10f0 [ 682.789148][T11535] ? __kasan_slab_free+0x11/0x20 [ 682.793929][T11535] ? iomap_dio_complete+0x6c0/0x6c0 [ 682.798960][T11535] ? jbd2_journal_start_reserved+0x400/0x400 [ 682.804785][T11535] ? __ext4_read_dirblock+0x8a0/0x8a0 [ 682.809974][T11535] iomap_dio_rw+0x35/0x80 [ 682.814272][T11535] ? ext4_file_write_iter+0x891/0x1c80 [ 682.819564][T11535] ? ext4_file_write_iter+0x891/0x1c80 [ 682.825030][T11535] ext4_file_write_iter+0x10d2/0x1c80 [ 682.830247][T11535] ? ext4_file_write_iter+0x891/0x1c80 [ 682.835541][T11535] ? ext4_file_read_iter+0x4d0/0x4d0 [ 682.840659][T11535] ? security_file_permission+0x86/0xb0 [ 682.846037][T11535] ? iov_iter_init+0x3f/0x120 [ 682.850549][T11535] vfs_write+0xb55/0xe70 [ 682.854625][T11535] ? kernel_write+0x3d0/0x3d0 [ 682.859178][T11535] ? mutex_trylock+0xa0/0xa0 [ 682.863575][T11535] ? __fdget_pos+0x2e7/0x3a0 [ 682.867990][T11535] ? ksys_write+0x77/0x2c0 [ 682.872248][T11535] ksys_write+0x199/0x2c0 [ 682.876414][T11535] ? __ia32_sys_read+0x90/0x90 [ 682.881012][T11535] ? debug_smp_processor_id+0x17/0x20 [ 682.886235][T11535] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 682.892122][T11535] ? debug_smp_processor_id+0x17/0x20 [ 682.897328][T11535] __x64_sys_write+0x7b/0x90 [ 682.901752][T11535] do_syscall_64+0x34/0x70 [ 682.906007][T11535] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 682.911730][T11535] RIP: 0033:0x7f8e4a447ea9 [ 682.916026][T11535] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 682.935428][T11535] RSP: 002b:00007f8e497c20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 682.943670][T11535] RAX: ffffffffffffffda RBX: 00007f8e4a57ef80 RCX: 00007f8e4a447ea9 [ 682.951479][T11535] RDX: 000000000000fdef RSI: 0000000020000340 RDI: 0000000000000004 [ 682.959300][T11535] RBP: 00007f8e497c2120 R08: 0000000000000000 R09: 0000000000000000 [ 682.967361][T11535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 682.975178][T11535] R13: 000000000000000b R14: 00007f8e4a57ef80 R15: 00007fff960b5238 [ 683.083894][T11547] device syzkaller0 entered promiscuous mode [ 683.249289][T11561] tap0: tun_chr_ioctl cmd 1074025675 [ 683.254618][T11561] tap0: persist enabled [ 683.259212][T11561] tap0: tun_chr_ioctl cmd 1074025675 [ 683.264406][T11561] tap0: persist disabled [ 683.399999][T11581] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 683.648098][T11598] bpf_get_probe_write_proto: 2 callbacks suppressed [ 683.648183][T11598] syz-executor.4[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.654955][T11598] syz-executor.4[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.667442][T11597] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 683.692361][T11598] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 683.705752][T11599] syz-executor.4[11599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.705811][T11599] syz-executor.4[11599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.717856][T11598] syz-executor.4[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.747978][T11598] syz-executor.4[11598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 683.835889][T11602] geneve1: tun_chr_ioctl cmd 2148553947 [ 684.418301][T11641] syz-executor.0[11641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.418346][T11641] syz-executor.0[11641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.435020][T11641] syz-executor.0[11641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.446794][T11641] syz-executor.0[11641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 684.461014][T11641] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 684.488705][T11641] device wg2 entered promiscuous mode [ 684.640324][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.647685][T11646] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.655140][T11646] device bridge_slave_0 entered promiscuous mode [ 684.662352][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.669457][T11646] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.676947][T11646] device bridge_slave_1 entered promiscuous mode [ 684.740500][T11646] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.747507][T11646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.754639][T11646] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.761486][T11646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.788843][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 684.797288][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.805685][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.828059][T11864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.836933][T11864] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.843815][T11864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.851672][T11864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.860104][T11864] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.867010][T11864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.874627][T11864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 684.898065][T12791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 684.907577][T12791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 684.928757][T11646] device veth0_vlan entered promiscuous mode [ 684.937886][T11864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.953582][T12791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.969033][T12791] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 684.998874][T11646] device veth1_macvtap entered promiscuous mode [ 685.022515][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 685.050870][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 685.092381][T12791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 685.275435][ T348] device bridge_slave_1 left promiscuous mode [ 685.281574][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.318456][ T348] device bridge_slave_0 left promiscuous mode [ 685.324458][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.351008][ T348] device veth1_macvtap left promiscuous mode [ 685.357188][ T348] device veth0_vlan left promiscuous mode [ 685.531259][T11666] device pim6reg1 entered promiscuous mode [ 686.123959][T11696] device pim6reg1 entered promiscuous mode [ 686.490460][T11756] Â: renamed from pim6reg1 [ 687.050319][T11808] device pim6reg1 entered promiscuous mode [ 687.639399][T11852] device veth1_macvtap left promiscuous mode [ 688.252891][T11895] device vxcan1 entered promiscuous mode [ 688.261089][T11895] FAULT_INJECTION: forcing a failure. [ 688.261089][T11895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 688.277272][T11895] CPU: 1 PID: 11895 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 688.288814][T11895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 688.298693][T11895] Call Trace: [ 688.301838][T11895] dump_stack_lvl+0x1e2/0x24b [ 688.306350][T11895] ? bfq_pos_tree_add_move+0x43b/0x43b [ 688.311653][T11895] dump_stack+0x15/0x17 [ 688.315632][T11895] should_fail+0x3c6/0x510 [ 688.319893][T11895] should_fail_alloc_page+0x52/0x60 [ 688.324924][T11895] __alloc_pages_nodemask+0x1b3/0xaf0 [ 688.330214][T11895] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 688.335593][T11895] ? __kmalloc_track_caller+0x100/0x320 [ 688.340974][T11895] ? __kasan_check_write+0x14/0x20 [ 688.345925][T11895] ? __alloc_skb+0x37c/0x510 [ 688.350344][T11895] alloc_skb_with_frags+0x1b3/0x570 [ 688.355389][T11895] sock_alloc_send_pskb+0x915/0xa50 [ 688.361033][T11895] ? sock_kzfree_s+0x60/0x60 [ 688.365448][T11895] ? _copy_from_iter_full+0xa20/0xa20 [ 688.370670][T11895] tun_get_user+0xe90/0x38f0 [ 688.375098][T11895] ? __mod_node_page_state+0xac/0xf0 [ 688.380206][T11895] ? _kstrtoull+0x3a0/0x4a0 [ 688.384546][T11895] ? tun_do_read+0x1e90/0x1e90 [ 688.389314][T11895] ? kstrtouint_from_user+0x20a/0x2a0 [ 688.394530][T11895] ? _raw_spin_unlock+0x4d/0x70 [ 688.399217][T11895] ? kstrtol_from_user+0x310/0x310 [ 688.404161][T11895] ? avc_policy_seqno+0x1b/0x70 [ 688.408911][T11895] ? selinux_file_permission+0x2bb/0x560 [ 688.414315][T11895] ? fsnotify_perm+0x67/0x4e0 [ 688.418832][T11895] tun_chr_write_iter+0x1a8/0x250 [ 688.423686][T11895] vfs_write+0xb55/0xe70 [ 688.427900][T11895] ? kernel_write+0x3d0/0x3d0 [ 688.432391][T11895] ? __fdget_pos+0x209/0x3a0 [ 688.436787][T11895] ? ksys_write+0x77/0x2c0 [ 688.441188][T11895] ksys_write+0x199/0x2c0 [ 688.445338][T11895] ? __ia32_sys_read+0x90/0x90 [ 688.450000][T11895] ? debug_smp_processor_id+0x17/0x20 [ 688.455149][T11895] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 688.461068][T11895] ? debug_smp_processor_id+0x17/0x20 [ 688.466259][T11895] __x64_sys_write+0x7b/0x90 [ 688.471116][T11895] do_syscall_64+0x34/0x70 [ 688.475369][T11895] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 688.481317][T11895] RIP: 0033:0x7f78bd427ea9 [ 688.485564][T11895] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 688.505158][T11895] RSP: 002b:00007f78bc7a20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 688.513391][T11895] RAX: ffffffffffffffda RBX: 00007f78bd55ef80 RCX: 00007f78bd427ea9 [ 688.521460][T11895] RDX: 000000000000ffdd RSI: 0000000020000180 RDI: 0000000000000008 [ 688.529265][T11895] RBP: 00007f78bc7a2120 R08: 0000000000000000 R09: 0000000000000000 [ 688.537067][T11895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 688.544880][T11895] R13: 000000000000000b R14: 00007f78bd55ef80 R15: 00007ffcea1b1aa8 [ 688.704324][T11907] device vxcan1 entered promiscuous mode [ 688.875202][T11951] FAULT_INJECTION: forcing a failure. [ 688.875202][T11951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.890736][T11951] CPU: 1 PID: 11951 Comm: syz-executor.2 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 688.902336][T11951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 688.912269][T11951] Call Trace: [ 688.915407][T11951] dump_stack_lvl+0x1e2/0x24b [ 688.919911][T11951] ? bfq_pos_tree_add_move+0x43b/0x43b [ 688.925198][T11951] ? 0xffffffffa0016000 [ 688.929191][T11951] ? is_bpf_text_address+0x172/0x190 [ 688.934321][T11951] dump_stack+0x15/0x17 [ 688.938391][T11951] should_fail+0x3c6/0x510 [ 688.942646][T11951] should_fail_usercopy+0x1a/0x20 [ 688.947681][T11951] strncpy_from_user+0x24/0x2d0 [ 688.952364][T11951] __se_sys_bpf+0x1389/0x11cb0 [ 688.956973][T11951] ? terminate_walk+0x407/0x4f0 [ 688.962003][T11951] ? __kasan_check_read+0x11/0x20 [ 688.966863][T11951] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 688.972592][T11951] ? rotate_reclaimable_page+0x530/0x530 [ 688.978054][T11951] ? __mod_memcg_lruvec_state+0x131/0x310 [ 688.983612][T11951] ? __x64_sys_bpf+0x90/0x90 [ 688.988035][T11951] ? __mod_node_page_state+0xac/0xf0 [ 688.993155][T11951] ? _kstrtoull+0x3a0/0x4a0 [ 688.997502][T11951] ? memset+0x35/0x40 [ 689.001410][T11951] ? __fsnotify_parent+0x4b9/0x6c0 [ 689.006401][T11951] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 689.012965][T11951] ? proc_fail_nth_write+0x20b/0x290 [ 689.018082][T11951] ? proc_fail_nth_read+0x210/0x210 [ 689.023198][T11951] ? security_file_permission+0x86/0xb0 [ 689.028572][T11951] ? rw_verify_area+0x1c3/0x360 [ 689.033253][T11951] ? preempt_count_add+0x92/0x1a0 [ 689.038112][T11951] ? vfs_write+0x854/0xe70 [ 689.042366][T11951] ? kernel_write+0x3d0/0x3d0 [ 689.046880][T11951] ? __kasan_check_write+0x14/0x20 [ 689.051824][T11951] ? mutex_lock+0xa5/0x110 [ 689.056099][T11951] ? mutex_trylock+0xa0/0xa0 [ 689.060509][T11951] ? __kasan_check_write+0x14/0x20 [ 689.065457][T11951] ? fput_many+0x160/0x1b0 [ 689.069717][T11951] ? debug_smp_processor_id+0x17/0x20 [ 689.074917][T11951] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 689.080814][T11951] ? debug_smp_processor_id+0x17/0x20 [ 689.086021][T11951] __x64_sys_bpf+0x7b/0x90 [ 689.090306][T11951] do_syscall_64+0x34/0x70 [ 689.094635][T11951] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 689.100350][T11951] RIP: 0033:0x7f8e4a447ea9 [ 689.104601][T11951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 689.124136][T11951] RSP: 002b:00007f8e497c20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 689.132363][T11951] RAX: ffffffffffffffda RBX: 00007f8e4a57ef80 RCX: 00007f8e4a447ea9 [ 689.140175][T11951] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 689.147985][T11951] RBP: 00007f8e497c2120 R08: 0000000000000000 R09: 0000000000000000 [ 689.155807][T11951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.163607][T11951] R13: 000000000000000b R14: 00007f8e4a57ef80 R15: 00007fff960b5238 [ 689.263330][T11958] device syzkaller0 entered promiscuous mode [ 689.887268][T12018] device pim6reg1 entered promiscuous mode [ 690.471578][T12054] device pim6reg1 entered promiscuous mode [ 690.786672][T12079] bpf_get_probe_write_proto: 4 callbacks suppressed [ 690.786685][T12079] syz-executor.0[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.806045][T12079] syz-executor.0[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.830700][T12079] syz-executor.0[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.859517][T12079] syz-executor.0[12079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.005698][T12107] device pim6reg1 entered promiscuous mode [ 691.434632][ T24] audit: type=1400 audit(1718214742.690:161): avc: denied { create } for pid=12117 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 691.667494][T12123] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.674391][T12123] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.681926][T12123] device bridge_slave_0 entered promiscuous mode [ 691.689115][T12140] device pim6reg1 entered promiscuous mode [ 691.699277][T12123] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.712387][T12123] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.720490][T12123] device bridge_slave_1 entered promiscuous mode [ 691.753796][T12144] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 691.806327][T12150] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 691.817449][ T6574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 691.828505][ T6574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.851494][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 691.866455][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.874519][ T6589] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.881419][ T6589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.889204][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 691.897551][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 691.906398][ T6589] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.913254][ T6589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.931860][ T6608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 691.945099][ T6608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 691.953089][ T6608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 691.979413][ T6608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 691.989403][ T6608] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 692.009401][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 692.024011][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 692.040560][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 692.050670][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.060224][T12123] device veth0_vlan entered promiscuous mode [ 692.080385][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.100626][ T6589] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 692.111477][T12169] device pim6reg1 entered promiscuous mode [ 692.126455][T11864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 692.147521][T12123] device veth1_macvtap entered promiscuous mode [ 692.168028][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 692.176962][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 692.185240][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 692.193448][T11867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 692.508240][ T348] device bridge_slave_1 left promiscuous mode [ 692.516525][ T348] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.544423][ T348] device bridge_slave_0 left promiscuous mode [ 692.562186][ T348] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.590757][ T348] device veth0_vlan left promiscuous mode [ 692.903717][T12223] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 693.009684][T12232] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 693.190913][T12253] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 693.208049][T12255] device pim6reg1 entered promiscuous mode [ 693.241377][T12258] syz-executor.4[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.241442][T12258] syz-executor.4[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.255236][T12258] syz-executor.4[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.268476][T12258] syz-executor.4[12258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.304959][T12258] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 693.360820][T12267] device wg2 entered promiscuous mode [ 693.548942][T12291] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 694.279357][T12352] device syzkaller0 entered promiscuous mode [ 694.958640][T12382] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 695.122948][T12399] device vxcan1 entered promiscuous mode [ 695.356437][T12448] syz-executor.0[12448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.356626][T12448] syz-executor.0[12448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 695.387468][T12448] device pim6reg1 entered promiscuous mode [ 695.560982][T12484] device pim6reg1 entered promiscuous mode [ 695.631940][T12490] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 695.942159][T12552] device syzkaller0 entered promiscuous mode [ 697.682308][T12707] device syzkaller0 entered promiscuous mode [ 697.767539][T12711] bpf_get_probe_write_proto: 4 callbacks suppressed [ 697.767553][T12711] syz-executor.2[12711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 697.792047][T12711] syz-executor.2[12711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 698.099591][T12719] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.118393][T12719] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.600235][T12760] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 698.625750][T12771] device sit0 left promiscuous mode [ 698.724414][T12799] device sit0 entered promiscuous mode [ 699.073934][T12840] syz-executor.2[12840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.073999][T12840] syz-executor.2[12840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.087788][T12840] syz-executor.2[12840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.099795][T12840] syz-executor.2[12840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.861921][T12892] syz-executor.0[12892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 699.877210][T12892] syz-executor.0[12892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.179412][T12918] syz-executor.4[12918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.183698][T12908] device sit0 entered promiscuous mode [ 700.208477][T12918] syz-executor.4[12918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.467697][T12957] device syzkaller0 entered promiscuous mode [ 700.706502][T12967] device veth1_macvtap left promiscuous mode [ 700.751330][T12967] bridge0: port 3(macsec0) entered disabled state [ 700.790193][T12967] device veth1_macvtap entered promiscuous mode [ 700.831287][T12967] bridge0: port 3(macsec0) entered blocking state [ 700.837714][T12967] bridge0: port 3(macsec0) entered forwarding state [ 700.890493][T12989] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 701.253423][T13040] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 701.669527][T13090] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 702.150045][T13119] device vxcan1 entered promiscuous mode [ 703.300026][T13165] device syzkaller0 entered promiscuous mode [ 703.607554][T13209] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 703.685262][T13209] device pim6reg1 entered promiscuous mode [ 704.286365][T13328] bpf_get_probe_write_proto: 2 callbacks suppressed [ 704.286374][T13328] syz-executor.3[13328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.292931][T13328] syz-executor.3[13328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.490461][T13355] device pim6reg1 entered promiscuous mode [ 704.821057][T13373] syz-executor.4[13373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.821128][T13373] syz-executor.4[13373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 704.978763][T13383] device vxcan1 entered promiscuous mode [ 705.087082][T13391] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 705.219188][T13397] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 705.516144][T13409] syz-executor.0[13409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 705.516251][T13409] syz-executor.0[13409] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 706.115672][T13432] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 706.201775][T13440] device pim6reg1 entered promiscuous mode [ 708.085451][T13565] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 708.086813][T13568] syz-executor.4[13568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.104699][T13568] syz-executor.4[13568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.274677][T13585] syz-executor.4[13585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.287562][T13585] syz-executor.4[13585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 708.719214][T13636] EXT4-fs warning (device sda1): ext4_resize_begin:83: There are errors in the filesystem, so online resizing is not allowed [ 708.955524][T13640] device syzkaller0 entered promiscuous mode [ 709.405879][T13698] device pim6reg1 entered promiscuous mode [ 709.419470][T13697] device veth1_macvtap left promiscuous mode [ 709.425409][T13697] device macsec0 left promiscuous mode [ 709.435803][T13697] device veth1_macvtap entered promiscuous mode [ 709.442267][T13697] device macsec0 entered promiscuous mode [ 709.881602][T13703] general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN [ 709.893228][T13703] KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] [ 709.901419][T13703] CPU: 1 PID: 13703 Comm: syz-executor.0 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 709.912948][T13703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 709.922854][T13703] RIP: 0010:inherit_task_group+0x573/0x670 [ 709.928483][T13703] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 a8 00 00 00 8b 1b 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a8 00 00 00 41 89 1f 45 31 ff 44 89 f8 [ 709.947928][T13703] RSP: 0018:ffffc900017d7908 EFLAGS: 00010207 [ 709.953815][T13703] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff888125078000 [ 709.961785][T13703] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888125cd7890 [ 709.969578][T13703] RBP: ffffc900017d7970 R08: dffffc0000000000 R09: ffffed103ee2ae72 [ 709.977385][T13703] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc900017d7a20 [ 709.985202][T13703] R13: dffffc0000000000 R14: ffff888125cd7810 R15: 000000000000008c [ 709.993111][T13703] FS: 0000555556700480(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 710.001854][T13703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 710.008431][T13703] CR2: 00007f8e4a573a50 CR3: 000000010d59e000 CR4: 00000000003506a0 [ 710.016221][T13703] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 710.024029][T13703] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 710.031836][T13703] Call Trace: [ 710.034987][T13703] ? __die_body+0x62/0xb0 [ 710.039132][T13703] ? die_addr+0x9f/0xd0 [ 710.043127][T13703] ? exc_general_protection+0x3ff/0x490 [ 710.048511][T13703] ? asm_exc_general_protection+0x1e/0x30 [ 710.054063][T13703] ? inherit_task_group+0x573/0x670 [ 710.059090][T13703] ? inherit_task_group+0x52c/0x670 [ 710.064206][T13703] perf_event_init_task+0x331/0x770 [ 710.069167][T13703] ? memset+0x35/0x40 [ 710.072977][T13703] ? perf_event_attrs+0x30/0x30 [ 710.077665][T13703] ? sched_fork+0x162/0x7a0 [ 710.082007][T13703] copy_process+0x1015/0x3340 [ 710.086520][T13703] ? lru_cache_add+0x15e/0x380 [ 710.091124][T13703] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 710.096065][T13703] ? copy_clone_args_from_user+0x744/0x830 [ 710.101707][T13703] kernel_clone+0x21e/0x9e0 [ 710.106051][T13703] ? __delayed_free_task+0x20/0x20 [ 710.111002][T13703] ? create_io_thread+0x1e0/0x1e0 [ 710.115927][T13703] ? recalc_sigpending+0x1a5/0x230 [ 710.120801][T13703] __x64_sys_clone3+0x376/0x3a0 [ 710.125488][T13703] ? __ia32_sys_clone+0x290/0x290 [ 710.130354][T13703] ? debug_smp_processor_id+0x17/0x20 [ 710.135555][T13703] do_syscall_64+0x34/0x70 [ 710.139809][T13703] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 710.145534][T13703] RIP: 0033:0x7fac43f6bc99 [ 710.149799][T13703] Code: ff ff eb d2 e8 f8 62 fd ff 0f 1f 84 00 00 00 00 00 b8 ea ff ff ff 48 85 ff 74 2c 48 85 d2 74 27 49 89 c8 b8 b3 01 00 00 0f 05 <48> 85 c0 7c 18 74 01 c3 31 ed 48 83 e4 f0 4c 89 c7 ff d2 48 89 c7 [ 710.169229][T13703] RSP: 002b:00007ffde1c36188 EFLAGS: 00000202 ORIG_RAX: 00000000000001b3 2024/06/12 17:52:41 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 710.177475][T13703] RAX: ffffffffffffffda RBX: 00007fac43f14380 RCX: 00007fac43f6bc99 [ 710.185281][T13703] RDX: 00007fac43f14380 RSI: 0000000000000058 RDI: 00007ffde1c361d0 [ 710.193097][T13703] RBP: 00007fac42e326c0 R08: 00007fac42e326c0 R09: 00007ffde1c362b7 [ 710.200905][T13703] R10: 0000000000000008 R11: 0000000000000202 R12: ffffffffffffffb0 [ 710.208716][T13703] R13: 000000000000006e R14: 00007ffde1c361d0 R15: 00007ffde1c362b8 [ 710.216531][T13703] Modules linked in: [ 710.233481][T13703] ---[ end trace c1d961e720fb4c0a ]--- [ 710.265403][T13703] RIP: 0010:inherit_task_group+0x573/0x670 [ 710.271061][T13703] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 a8 00 00 00 8b 1b 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 a8 00 00 00 41 89 1f 45 31 ff 44 89 f8 [ 710.290647][T13703] RSP: 0018:ffffc900017d7908 EFLAGS: 00010207 [ 710.296677][T13703] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff888125078000 [ 710.304439][T13703] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888125cd7890 [ 710.312367][T13703] RBP: ffffc900017d7970 R08: dffffc0000000000 R09: ffffed103ee2ae72 [ 710.320198][T13703] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc900017d7a20 [ 710.328156][T13703] R13: dffffc0000000000 R14: ffff888125cd7810 R15: 000000000000008c [