last executing test programs: 10.547176643s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 8.015606762s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 6.030092616s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b709000081000000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071103d00000009001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 4.006511896s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 2.229459249s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 1.535862665s ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1.491593292s ago: executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61123000000000006113340000000700bf1000000000000015000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000560300000ee600f06702000014000000160300000ee600f0bf050000000000000f610000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586e3f640f9f7e9a73b761ad4f0952a70046270d2b6436fdeecd791614ed46de741eb8cf91c046ef9beca574b350021c7ec6ef130f53748068ca432dae4e248b22b9ad8b2811f67916a1764578cba4b069037bfb3362d5691ac397f7e207145d970f0d97867552629b146645c785fb77dbeca38e49a9d5221f1f45f0a25890d04d91a15a05ae7e7ed6252c3d6c1973fb858de1da70d67317e7872b0603ce47ed2c1520e71b527bb42aa2e20e1e85df73736ed0a782ab7e7278dd54358cfdf6313d40f926332623625b49626481054787ab2dff85a9bebd6b317f26c691a65aa97bb3d1506a3a565e9c7ea5ad4611d2d77ee8a5c1b23814a26b6a20061fbb65bdd03770fa849f2a29ba69f90625f42592a70ba890f7a92878ae73574c3a233ee5954119931a1905210715fa77a8795f2fbec3797cb90f59fe8a4abec25f40c87bf25b750bbaa"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1.453046277s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001940)=ANY=[@ANYBLOB="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"/3822], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x43) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='tlb_flush\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000090000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000630000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.420932042s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000220000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='workqueue_queue_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0}, 0x90) 1.365067801s ago: executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000280)='qdisc_reset\x00', r1}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000003db200b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x6, 0x9, &(0x7f0000000340)) r5 = getpid() syz_open_procfs$namespace(r5, &(0x7f0000000cc0)='ns/cgroup\x00') perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7, 0x1, 0x4, 0x9, 0x0, 0x3f, 0x84840, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000240), 0x5}, 0x0, 0x8afc, 0x8001, 0x7, 0xc021, 0x4, 0x180, 0x0, 0xffffffe1, 0x0, 0x7f}, r5, 0xc, 0xffffffffffffffff, 0x8) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000040), &(0x7f0000000280)=r4}, 0xfffffffffffffd6d) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) 774.170341ms ago: executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 713.435351ms ago: executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xbb, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x400082, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'veth1_to_bridge\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x100000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r8}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00'}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000180), 0x40001) 686.813295ms ago: executing program 0: bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_journal_start\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000300)='ext4_journal_start\x00', r4}, 0x30) unlink(&(0x7f0000000140)='./cgroup\x00') perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 633.067053ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000002100b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x99) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x9) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@o_path={&(0x7f0000000940)='./file0\x00', 0x0, 0x0, r2}, 0x18) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x9, 0x707e, 0x9, 0x0, r0, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8001, 0x1, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0xd, &(0x7f0000000880)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], &(0x7f0000000300)='syzkaller\x00', 0xb9, 0x2d, &(0x7f00000003c0)=""/45, 0x40f00, 0x88, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000700)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0xc, 0x10000, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000ac0)=[r4, r0, r5, r0, r1, r0, r0, r2, r0], &(0x7f0000000b00)=[{0x1, 0x2, 0x10}, {0x4, 0x2, 0x0, 0x2}, {0x2, 0x2, 0x8, 0xa}, {0x0, 0x2, 0x8, 0x1}, {0x2, 0x3, 0x5, 0x5}], 0x10, 0xb92}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_allocate_blocks\x00', r7}, 0x10) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000700000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400460004000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r6, &(0x7f00000007c0)="94b503c3f09f73a401747a09dde37cb5cccf9e79ac6859cf4c189fa65983db48b94ce59842c214a6970bdc9c6cf5b0ea63a05cfb559e8a923b2be7f77767e253cabdffbf1b60de8700b48757d9cc23a671c3443263a93f562609dd2ad6cd60ea2893d51a730e749bfc7f47a68134cc31113719026b5b825021a801a15ace5e366b175ca45d5514b8823134ff19af32284c5c53e3", &(0x7f0000000040)=""/42}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_allocate_blocks\x00', r9}, 0x10) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r10, &(0x7f00000002c0), 0x12) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r11}, 0x10) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r13}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r14}, 0x10) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x412e383, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000001c0)={r15, 0x0, 0x0}, 0x20) 534.983398ms ago: executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1, 0x53}], {0x95, 0x0, 0x700}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0xc}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='skb_copy_datagram_iovec\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x6, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0x8, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[r3, r3]}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x3, 0x0, r3}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0x2, r4}, 0x27) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 471.265748ms ago: executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{}, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xee3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 435.554604ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x894a, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8940, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x2, 0x9, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') 360.188385ms ago: executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000003440)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000003480)=""/4112, 0x1010}], 0x1, 0xfffffffffffffffd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRESHEX=0x0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="26b1b15f48e3ca8a82f5248b", @ANYRES32=r4], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000085ff2a18f6f8452e4036f4b843476cae8a1b9370666d59534cf37a45e11155fda7b242d38c2211e60d06c5fdf7a91d19aa9c4b4e460265d3ada8f32339389c21d6fe2449d2f142aed673c60d7b98e29db819a658d62d436da80fbde0700ef1b3c807f61470b160310aaa6787872d71a7d3"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdeefa000000000000ffd2acb165fe580cd568020031b87b548cb74136f366da0a9201880b"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1ab8ff00000000bfa100000000000007010000f0ffffffb702000000000000b703000000000000850000007300001a29b6a231dc13cea4c2d132579c8e79f80a23431cdf96c81c4619bf8c785dfb8c58d8bc00"/131], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='qdisc_dequeue\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) openat$cgroup_pressure(r8, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) 219.364596ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1d, 0x11, &(0x7f0000000300)=ANY=[@ANYBLOB="b7080000000000007b8af8ff00000000b708003097ff8f65e396d1ff00000000bfa10000000000000701000007040000000800000018230000000000009400000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000003f1620000800000018370000010000000000000000000000003704008b070000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x5, 0x10000, 0x3ff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000004c0)=[r0], &(0x7f0000000500)=[{0x3, 0x1, 0x10, 0xd}, {0x3, 0x5, 0x4}, {0x1, 0x1, 0x1, 0x2}, {0x5, 0x5, 0xb, 0x9}, {0x2, 0x1, 0x4, 0xb}], 0x10, 0x2}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000640)={r1, r0}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) close(r6) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x42, 0x0, r0, 0x31, '\x00', r2, 0xffffffffffffffff, 0x0, 0x1, 0x3}, 0x48) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, r7, 0x6, '\x00', 0x0, r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xd, 0xf, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {0x85, 0x0, 0x0, 0xba}}, {}, [], {{}, {0x5}}}, &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0xffffffffffffff68, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='ext4_da_update_reserve_space\x00', r12}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r13, &(0x7f0000000280)=ANY=[], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_update_reserve_space\x00', r15}, 0x10) write$cgroup_int(r14, &(0x7f0000000200), 0x43400) 162.606456ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff6d, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 127.189481ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000001f00000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1}, 0x20) 126.549301ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xf000000}, 0x48) 112.575023ms ago: executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%pB \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x248800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x43400) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r1, &(0x7f0000000280)="a9f0f2969497c792df50ea72561f9faebcd7cfb5471a51ceddf42be3f3b6417d995803b50e911c1b025072e2e44cd9a16ac9f264015ca2edf4d91de9c3ef82cfc00b9de1c9e1355fd5e6", &(0x7f0000000680)=""/132, 0x4}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='global_dirty_state\x00', r10}, 0x10) openat$cgroup_ro(r4, &(0x7f0000000200)='cgroup.controllers\x00', 0x100002, 0x0) 72.772829ms ago: executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x8, 0x4, 0x4, 0x3ad, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2}, 0x48) 65.9053ms ago: executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x553600, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='f2fs_truncate_partial_nodes\x00', r4}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002e40)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000005208c6b280e9d239ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000300), 0x0}, 0x20) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000055c0)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000003c0)={'pimreg\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000040)=0x1) 55.140551ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000ff9c00000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 33.205015ms ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1b, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0xc, [@var={0xa, 0x0, 0x0, 0xe, 0x3, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x7fff}}, @typedef={0xb, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x30, 0x5f, 0x0, 0x402c140d2990a57f, 0x61, 0x5f, 0x2e, 0x2e, 0x2e, 0x0]}}, &(0x7f00000005c0)=""/4096, 0x64, 0x1000, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r3, 0x20, &(0x7f0000000500)={&(0x7f00000004c0)=""/60, 0x3c, 0x0, &(0x7f00000015c0)=""/147, 0x93}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000000)) r6 = getpid() write$cgroup_pid(r5, &(0x7f0000000340)=r6, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000001c0)='jbd2_checkpoint_stats\x00', r4}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x5) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000180)={0x1, 0x4, [@local, @remote, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x42}, @multicast]}) 33.012625ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xcd, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000004c0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRESHEX=r1, @ANYRESHEX=r2, @ANYRES8=r1, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r3], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 28.950816ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x11, 0x5, 0x2, 0x4, 0xb71b5845ee0a57a8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1880000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='ext4_ext_rm_idx\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x36, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r8, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r9}, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0x4) r10 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r7}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000060002851000000600000018100000", @ANYRES32=r10, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) kernel console output (not intermixed with test programs): t:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 288.779734][T14620] device pim6reg1 entered promiscuous mode [ 289.111629][T14658] device pim6reg1 entered promiscuous mode [ 289.284472][T14664] device pim6reg1 entered promiscuous mode [ 290.589840][T14727] device pim6reg1 entered promiscuous mode [ 291.135203][T14755] device veth0_vlan left promiscuous mode [ 291.161313][T14755] device veth0_vlan entered promiscuous mode [ 291.235803][T14755] device pim6reg1 entered promiscuous mode [ 291.910261][T14859] syz-executor.4[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.910319][T14859] syz-executor.4[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.010463][T14859] syz-executor.4[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.025282][T14859] syz-executor.4[14859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.377715][T14898] device sit0 entered promiscuous mode [ 293.484651][T14993] syz-executor.0[14993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.484720][T14993] syz-executor.0[14993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.263602][T15062] syz-executor.3[15062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.303438][T15062] syz-executor.3[15062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.804596][T15103] device syzkaller0 entered promiscuous mode [ 294.840162][T15105] device pim6reg1 entered promiscuous mode [ 300.122267][T15222] bond_slave_1: mtu less than device minimum [ 300.541095][T15266] bridge0: port 3(dummy0) entered blocking state [ 300.543930][ T28] audit: type=1400 audit(1719210766.916:158): avc: denied { ioctl } for pid=15265 comm="syz-executor.2" path="socket:[62808]" dev="sockfs" ino=62808 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 300.572233][T15266] bridge0: port 3(dummy0) entered disabled state [ 300.578871][T15266] device dummy0 entered promiscuous mode [ 300.584568][T15266] bridge0: port 3(dummy0) entered blocking state [ 300.590744][T15266] bridge0: port 3(dummy0) entered forwarding state [ 300.883900][T15297] device syzkaller0 entered promiscuous mode [ 301.697801][T15334] Â: renamed from pim6reg1 [ 304.361118][T15530] device pim6reg1 entered promiscuous mode [ 304.423182][T15547] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 305.018752][T15613] syz-executor.1[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.018822][T15613] syz-executor.1[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.035469][T15613] syz-executor.1[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.047214][T15613] syz-executor.1[15613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.014107][T15712] device syzkaller0 entered promiscuous mode [ 306.384420][T15736] device syzkaller0 entered promiscuous mode [ 306.572640][T15748] Â: renamed from pim6reg1 [ 306.597240][T15750] Â: renamed from pim6reg1 [ 307.179579][T15765] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.186474][T15765] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.195383][T15765] device bridge_slave_0 entered promiscuous mode [ 307.223545][T15765] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.254075][T15765] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.300449][T15765] device bridge_slave_1 entered promiscuous mode [ 307.437632][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.437703][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.450415][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.462104][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.505380][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.548137][T15790] syz-executor.1[15790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.620925][ T8] device bridge_slave_1 left promiscuous mode [ 307.639554][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.647582][ T8] device bridge_slave_0 left promiscuous mode [ 307.653793][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.663073][ T8] device veth1_macvtap left promiscuous mode [ 307.670639][ T8] device veth0_vlan left promiscuous mode [ 307.935589][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.944356][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.973823][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.990790][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.013709][ T1208] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.020594][ T1208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.104609][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.141850][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.174512][ T1208] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.181394][ T1208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.250336][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 308.258105][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.266024][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.282705][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.291228][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.299161][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.327933][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.360425][T15765] device veth0_vlan entered promiscuous mode [ 308.393232][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 308.421797][T15765] device veth1_macvtap entered promiscuous mode [ 308.461477][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 308.487256][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 309.772556][T15938] device syzkaller0 entered promiscuous mode [ 310.366231][T16002] device pim6reg1 entered promiscuous mode [ 310.397726][T16004] device syzkaller0 entered promiscuous mode [ 310.478144][T16015] bpf_get_probe_write_proto: 6 callbacks suppressed [ 310.478164][T16015] syz-executor.4[16015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.489101][T16015] syz-executor.4[16015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.632853][T16032] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.651430][T16032] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.690313][T16032] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.697199][T16032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.704335][T16032] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.711198][T16032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.718729][T16032] device bridge0 entered promiscuous mode [ 311.242811][T16069] device syzkaller0 entered promiscuous mode [ 311.559180][T16093] bond_slave_1: mtu less than device minimum [ 312.984733][T16133] FAULT_INJECTION: forcing a failure. [ 312.984733][T16133] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.007703][T16133] CPU: 1 PID: 16133 Comm: syz-executor.1 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 313.019167][T16133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 313.029060][T16133] Call Trace: [ 313.032179][T16133] [ 313.034958][T16133] dump_stack_lvl+0x151/0x1b7 [ 313.039473][T16133] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 313.044771][T16133] ? __alloc_pages+0x780/0x780 [ 313.049370][T16133] dump_stack+0x15/0x1b [ 313.053358][T16133] should_fail_ex+0x3d0/0x520 [ 313.057874][T16133] should_fail_alloc_page+0x68/0x90 [ 313.062904][T16133] __alloc_pages+0x1f4/0x780 [ 313.067332][T16133] ? prep_new_page+0x110/0x110 [ 313.071933][T16133] ? _raw_spin_trylock_bh+0x190/0x190 [ 313.077139][T16133] __get_free_pages+0xe/0x30 [ 313.081565][T16133] kasan_populate_vmalloc_pte+0x39/0x130 [ 313.087033][T16133] ? __apply_to_page_range+0x8ca/0xbe0 [ 313.092331][T16133] __apply_to_page_range+0x8dd/0xbe0 [ 313.097461][T16133] ? kasan_populate_vmalloc+0x70/0x70 [ 313.102662][T16133] ? kasan_populate_vmalloc+0x70/0x70 [ 313.107865][T16133] apply_to_page_range+0x3b/0x50 [ 313.112642][T16133] kasan_populate_vmalloc+0x65/0x70 [ 313.117675][T16133] alloc_vmap_area+0x1961/0x1aa0 [ 313.122455][T16133] ? vm_map_ram+0x940/0x940 [ 313.126784][T16133] ? __kasan_kmalloc+0x9c/0xb0 [ 313.131390][T16133] ? kmalloc_node_trace+0x3d/0xb0 [ 313.136247][T16133] __get_vm_area_node+0x171/0x370 [ 313.141109][T16133] __vmalloc_node_range+0x36e/0x1540 [ 313.146230][T16133] ? htab_map_alloc+0xc31/0x17b0 [ 313.151004][T16133] ? __kasan_check_write+0x14/0x20 [ 313.155950][T16133] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 313.162471][T16133] ? debug_smp_processor_id+0x17/0x20 [ 313.167678][T16133] ? vmap+0x2b0/0x2b0 [ 313.171495][T16133] ? __alloc_percpu_gfp+0x27/0x30 [ 313.176349][T16133] bpf_map_area_alloc+0xdc/0xf0 [ 313.181048][T16133] ? htab_map_alloc+0xc31/0x17b0 [ 313.185806][T16133] htab_map_alloc+0xc31/0x17b0 [ 313.190412][T16133] map_create+0x44a/0xcf0 [ 313.194581][T16133] __sys_bpf+0x2e6/0x7f0 [ 313.198653][T16133] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 313.203865][T16133] ? debug_smp_processor_id+0x17/0x20 [ 313.209072][T16133] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 313.214974][T16133] __x64_sys_bpf+0x7c/0x90 [ 313.219221][T16133] do_syscall_64+0x3d/0xb0 [ 313.223475][T16133] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 313.229287][T16133] RIP: 0033:0x7efdbe47d0a9 [ 313.233542][T16133] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 313.253072][T16133] RSP: 002b:00007efdbf2080c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 313.261401][T16133] RAX: ffffffffffffffda RBX: 00007efdbe5b4050 RCX: 00007efdbe47d0a9 [ 313.269211][T16133] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 313.277025][T16133] RBP: 00007efdbf208120 R08: 0000000000000000 R09: 0000000000000000 [ 313.284845][T16133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 313.292645][T16133] R13: 000000000000006e R14: 00007efdbe5b4050 R15: 00007ffd104194b8 [ 313.300481][T16133] [ 315.152270][T16158] device pim6reg1 entered promiscuous mode [ 315.251620][T16155] device syzkaller0 entered promiscuous mode [ 315.818021][T16220] bridge0: port 3(dummy0) entered disabled state [ 315.824379][T16220] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.831417][T16220] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.847145][T16212] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.861364][T16212] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.873787][T16212] device bridge_slave_0 entered promiscuous mode [ 315.911457][T16229] fscrypt: sda1: filesystem not mounted with inlinecrypt [ 315.911457][T16229] [ 315.926932][T16212] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.940903][T16212] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.958305][T16212] device bridge_slave_1 entered promiscuous mode [ 316.111612][ T8] device veth1_macvtap left promiscuous mode [ 316.126992][ T8] device veth0_vlan left promiscuous mode [ 316.266817][T16251] syz-executor.4[16251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.266888][T16251] syz-executor.4[16251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.500547][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.519665][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.540281][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.548558][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.581008][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.587867][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.630907][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.679673][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.730186][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.737049][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.815146][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.855860][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.886150][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.936716][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.985813][T16212] device veth0_vlan entered promiscuous mode [ 317.041333][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.059450][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.086869][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.176489][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.227216][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 317.357867][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.430268][T16279] Â: renamed from pim6reg1 [ 317.524185][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.534284][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.546288][T16212] device veth1_macvtap entered promiscuous mode [ 317.563956][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.582732][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.603943][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.679780][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.711493][ T227] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.978580][T16308] device syzkaller0 entered promiscuous mode [ 324.805886][T16671] device pim6reg1 entered promiscuous mode [ 324.960086][T16695] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 325.419057][T16714] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.467526][T16714] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.492237][T16714] device bridge_slave_0 entered promiscuous mode [ 325.499215][T16714] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.506324][T16714] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.531833][T16714] device bridge_slave_1 entered promiscuous mode [ 325.931393][ T616] device dummy0 left promiscuous mode [ 325.937076][ T616] bridge0: port 3(dummy0) entered disabled state [ 325.957417][ T616] device bridge_slave_1 left promiscuous mode [ 326.004449][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.013659][ T616] device bridge_slave_0 left promiscuous mode [ 326.019646][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.028685][ T616] device veth1_macvtap left promiscuous mode [ 326.286923][T16763] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 326.350188][T16714] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.357072][T16714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.364196][T16714] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.371058][T16714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.501891][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.515479][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.639147][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 326.653253][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.710278][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.728330][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.773060][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.779962][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.798763][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.832978][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.880144][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.887002][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.914159][T16776] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.943247][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.957275][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.972326][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.000228][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.032927][T16714] device veth0_vlan entered promiscuous mode [ 327.041493][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 327.059789][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 327.078786][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 327.096729][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.107203][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 327.132376][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.153387][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 327.162992][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 327.173685][T16714] device veth1_macvtap entered promiscuous mode [ 327.191936][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 327.211919][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 327.230033][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 327.297466][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 327.305892][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.488357][T16826] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.503245][T16826] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.963574][T16841] device syzkaller0 entered promiscuous mode [ 328.195173][T16862] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.227222][T16862] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.558102][T16862] device bridge0 left promiscuous mode [ 328.576129][T16890] syz-executor.4[16890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.576522][T16890] syz-executor.4[16890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.080616][T16919] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 329.825142][T16942] device syzkaller0 entered promiscuous mode [ 330.127127][T16961] syz-executor.1[16961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.127196][T16961] syz-executor.1[16961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.613173][T17023] device sit0 entered promiscuous mode [ 332.517742][T17046] Â: renamed from pim6reg1 [ 332.786375][T17065] device pim6reg1 entered promiscuous mode [ 333.029661][T17076] device syzkaller0 entered promiscuous mode [ 333.705506][T17129] device pim6reg1 entered promiscuous mode [ 333.751410][T17131] device syzkaller0 entered promiscuous mode [ 333.913099][T17149] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 334.035073][T17165] syz-executor.2[17165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.035142][T17165] syz-executor.2[17165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.185220][T17174] IPv6: sit1: Disabled Multicast RS [ 334.286780][T17191] syz-executor.0[17191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.286852][T17191] syz-executor.0[17191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.603335][T17222] device syzkaller0 entered promiscuous mode [ 334.917911][T17268] syz-executor.3[17268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.917975][T17268] syz-executor.3[17268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.002406][T17272] syz-executor.2[17272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.016893][T17272] syz-executor.2[17272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.241979][T17363] FAULT_INJECTION: forcing a failure. [ 336.241979][T17363] name failslab, interval 1, probability 0, space 0, times 0 [ 336.266070][T17363] CPU: 1 PID: 17363 Comm: syz-executor.0 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 336.277489][T17363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 336.287380][T17363] Call Trace: [ 336.290531][T17363] [ 336.293279][T17363] dump_stack_lvl+0x151/0x1b7 [ 336.297792][T17363] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 336.303088][T17363] ? memset+0x35/0x40 [ 336.306906][T17363] ? __es_remove_extent+0xe4b/0x1f60 [ 336.312024][T17363] ? __kasan_slab_free+0x11/0x20 [ 336.316800][T17363] dump_stack+0x15/0x1b [ 336.320789][T17363] should_fail_ex+0x3d0/0x520 [ 336.325306][T17363] ? __es_insert_extent+0x72a/0x17c0 [ 336.330449][T17363] __should_failslab+0xaf/0xf0 [ 336.335030][T17363] should_failslab+0x9/0x20 [ 336.339369][T17363] kmem_cache_alloc+0x3b/0x2c0 [ 336.343978][T17363] __es_insert_extent+0x72a/0x17c0 [ 336.348919][T17363] ? _raw_write_lock+0xa4/0x170 [ 336.353605][T17363] ext4_es_insert_extent+0x5a2/0x2ff0 [ 336.358818][T17363] ? ext4_es_scan_clu+0x340/0x340 [ 336.363670][T17363] ? _raw_read_unlock+0x25/0x40 [ 336.368354][T17363] ? ext4_es_lookup_extent+0x33b/0x950 [ 336.373651][T17363] ext4_map_blocks+0xe1d/0x1ca0 [ 336.378335][T17363] ? ext4_mark_iloc_dirty+0x170b/0x1970 [ 336.383805][T17363] ? ext4_issue_zeroout+0x250/0x250 [ 336.388835][T17363] ? _raw_read_unlock+0x25/0x40 [ 336.393523][T17363] ? up_read+0x55/0x170 [ 336.397518][T17363] ext4_getblk+0x1eb/0x7b0 [ 336.401773][T17363] ? ext4_get_block_unwritten+0x110/0x110 [ 336.407322][T17363] ? __kasan_check_write+0x14/0x20 [ 336.412270][T17363] ext4_bread+0x2f/0x180 [ 336.416348][T17363] ext4_append+0x31f/0x5b0 [ 336.420601][T17363] ? ext4_init_new_dir+0x620/0x620 [ 336.425551][T17363] ext4_init_new_dir+0x33f/0x620 [ 336.430324][T17363] ? ext4_init_dot_dotdot+0x5d0/0x5d0 [ 336.435532][T17363] ext4_mkdir+0x4f2/0xce0 [ 336.439696][T17363] ? ext4_symlink+0xc10/0xc10 [ 336.444211][T17363] ? selinux_inode_mkdir+0x22/0x30 [ 336.449156][T17363] ? security_inode_mkdir+0xbc/0x100 [ 336.454276][T17363] vfs_mkdir+0x398/0x570 [ 336.458374][T17363] do_mkdirat+0x1eb/0x450 [ 336.462526][T17363] ? vfs_mkdir+0x570/0x570 [ 336.466773][T17363] ? getname_flags+0x1fd/0x520 [ 336.471374][T17363] __x64_sys_mkdir+0x6e/0x80 [ 336.475800][T17363] do_syscall_64+0x3d/0xb0 [ 336.480055][T17363] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 336.485779][T17363] RIP: 0033:0x7f4495a7d0a9 [ 336.490035][T17363] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 336.509649][T17363] RSP: 002b:00007f44968eb0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 336.517898][T17363] RAX: ffffffffffffffda RBX: 00007f4495bb3f80 RCX: 00007f4495a7d0a9 [ 336.525703][T17363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 336.533518][T17363] RBP: 00007f44968eb120 R08: 0000000000000000 R09: 0000000000000000 [ 336.541326][T17363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 336.549141][T17363] R13: 000000000000000b R14: 00007f4495bb3f80 R15: 00007ffdd4333468 [ 336.556955][T17363] [ 336.975857][T17359] device pim6reg1 entered promiscuous mode [ 337.065934][T17383] device veth1_macvtap left promiscuous mode [ 337.107503][T17383] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.114397][T17383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.121511][T17383] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.128266][T17383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.167073][T17383] device bridge0 entered promiscuous mode [ 337.355335][T17412] syz-executor.1[17412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.355438][T17412] syz-executor.1[17412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.990001][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.322020][T17485] tap0: tun_chr_ioctl cmd 1074025677 [ 338.329659][T17485] tap0: linktype set to 769 [ 338.492034][T17506] device pim6reg1 entered promiscuous mode [ 339.388060][T17548] syzkaller0: refused to change device tx_queue_len [ 339.847550][T17599] device pim6reg1 entered promiscuous mode [ 340.406659][T17651] bpf_get_probe_write_proto: 4 callbacks suppressed [ 340.406678][T17651] syz-executor.2[17651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.488244][T17651] syz-executor.2[17651] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.530556][ T28] audit: type=1400 audit(1719210806.906:159): avc: denied { getattr } for pid=17652 comm="syz-executor.0" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.623636][T17657] syz-executor.0[17657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.623706][T17657] syz-executor.0[17657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.715558][T17655] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.737158][T17655] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.750932][T17655] device bridge_slave_0 entered promiscuous mode [ 340.797387][T17655] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.840154][T17655] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.847542][T17655] device bridge_slave_1 entered promiscuous mode [ 340.863115][T17670] syz-executor.0[17670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.863190][T17670] syz-executor.0[17670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.925099][ T616] device bridge_slave_1 left promiscuous mode [ 340.969116][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.000212][ T616] device bridge_slave_0 left promiscuous mode [ 341.006307][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.490459][T17676] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.497318][T17676] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.530496][T17676] device bridge_slave_0 entered promiscuous mode [ 341.537564][T17676] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.584686][T17676] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.611133][T17676] device bridge_slave_1 entered promiscuous mode [ 341.781361][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 341.788673][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.837090][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 341.856512][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.865006][ T314] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.871969][ T314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.909426][T17721] syz-executor.3[17721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.909503][T17721] syz-executor.3[17721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.948579][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 341.985085][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.021548][ T314] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.028428][ T314] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.066788][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.115018][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.125991][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.211119][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.219373][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.244966][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.258453][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.266147][T17655] device veth0_vlan entered promiscuous mode [ 342.319135][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.327032][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.345359][T17655] device veth1_macvtap entered promiscuous mode [ 342.390551][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.399990][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.408185][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.417159][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.425548][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.433873][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.440749][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.448217][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.456685][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.464798][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.471651][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.478924][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 342.486943][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.494882][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.503978][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.512213][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.520296][T17738] device pim6reg1 entered promiscuous mode [ 342.569880][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.580790][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.591639][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.619236][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 342.629040][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 342.637382][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.665159][T17676] device veth0_vlan entered promiscuous mode [ 342.686651][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 342.701047][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.732089][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.740622][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.781849][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 342.789918][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 342.800887][T17676] device veth1_macvtap entered promiscuous mode [ 342.821705][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 342.829468][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 342.841109][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 342.867053][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 342.878600][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 342.921343][ T616] device veth1_macvtap left promiscuous mode [ 342.928905][ T616] device veth0_vlan left promiscuous mode [ 343.437543][T17820] device bridge_slave_1 left promiscuous mode [ 343.507779][T17820] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.533129][T17820] device bridge_slave_0 left promiscuous mode [ 343.542474][T17820] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.522928][T17922] device pim6reg1 entered promiscuous mode [ 344.968356][T17981] syz-executor.4[17981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.968431][T17981] syz-executor.4[17981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.096513][T18012] bond_slave_1: mtu less than device minimum [ 345.175438][T18010] device bridge0 entered promiscuous mode [ 346.441583][T18088] device pim6reg1 entered promiscuous mode [ 346.551940][T18093] device syzkaller0 entered promiscuous mode [ 348.136039][T18196] device pim6reg1 entered promiscuous mode [ 348.145521][T18199] FAULT_INJECTION: forcing a failure. [ 348.145521][T18199] name failslab, interval 1, probability 0, space 0, times 0 [ 348.159225][T18199] CPU: 0 PID: 18199 Comm: syz-executor.3 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 348.170694][T18199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 348.180570][T18199] Call Trace: [ 348.183695][T18199] [ 348.186473][T18199] dump_stack_lvl+0x151/0x1b7 [ 348.190990][T18199] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 348.196281][T18199] ? page_cache_prev_miss+0x410/0x410 [ 348.201636][T18199] dump_stack+0x15/0x1b [ 348.205705][T18199] should_fail_ex+0x3d0/0x520 [ 348.210367][T18199] ? jbd2_journal_add_journal_head+0x7d/0x490 [ 348.216271][T18199] __should_failslab+0xaf/0xf0 [ 348.220870][T18199] should_failslab+0x9/0x20 [ 348.225210][T18199] kmem_cache_alloc+0x3b/0x2c0 [ 348.229810][T18199] ? __find_get_block+0xc76/0x1180 [ 348.234758][T18199] jbd2_journal_add_journal_head+0x7d/0x490 [ 348.240482][T18199] jbd2_journal_get_create_access+0x48/0x4a0 [ 348.246302][T18199] __ext4_journal_get_create_access+0xaf/0x550 [ 348.252290][T18199] ? __ext4_forget+0x880/0x880 [ 348.256883][T18199] ? up_read+0x55/0x170 [ 348.260894][T18199] ext4_getblk+0x475/0x7b0 [ 348.265135][T18199] ? ext4_get_block_unwritten+0x110/0x110 [ 348.270690][T18199] ? __kasan_check_write+0x14/0x20 [ 348.275637][T18199] ext4_bread+0x2f/0x180 [ 348.279712][T18199] ext4_append+0x31f/0x5b0 [ 348.283968][T18199] ? ext4_init_new_dir+0x620/0x620 [ 348.288918][T18199] ext4_init_new_dir+0x33f/0x620 [ 348.293686][T18199] ? ext4_init_dot_dotdot+0x5d0/0x5d0 [ 348.298898][T18199] ext4_mkdir+0x4f2/0xce0 [ 348.303063][T18199] ? ext4_symlink+0xc10/0xc10 [ 348.307575][T18199] ? selinux_inode_mkdir+0x22/0x30 [ 348.312530][T18199] ? security_inode_mkdir+0xbc/0x100 [ 348.317728][T18199] vfs_mkdir+0x398/0x570 [ 348.321806][T18199] do_mkdirat+0x1eb/0x450 [ 348.325970][T18199] ? vfs_mkdir+0x570/0x570 [ 348.330226][T18199] ? getname_flags+0x1fd/0x520 [ 348.334825][T18199] __x64_sys_mkdir+0x6e/0x80 [ 348.339250][T18199] do_syscall_64+0x3d/0xb0 [ 348.343504][T18199] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 348.349230][T18199] RIP: 0033:0x7fbbd547d0a9 [ 348.353485][T18199] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 348.372922][T18199] RSP: 002b:00007fbbd62af0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 348.381179][T18199] RAX: ffffffffffffffda RBX: 00007fbbd55b3f80 RCX: 00007fbbd547d0a9 [ 348.388982][T18199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 348.396790][T18199] RBP: 00007fbbd62af120 R08: 0000000000000000 R09: 0000000000000000 [ 348.404601][T18199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 348.412416][T18199] R13: 000000000000000b R14: 00007fbbd55b3f80 R15: 00007ffcde6633d8 [ 348.420232][T18199] [ 348.429414][T18199] ENOMEM in journal_alloc_journal_head, retrying. [ 348.609982][T18211] device wg2 entered promiscuous mode [ 349.195129][T18262] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 350.011313][T18260] syz-executor.2 (18260) used greatest stack depth: 19512 bytes left [ 350.287401][T18291] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 350.739238][T18327] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 351.581601][T18393] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.643304][T18401] bpf_get_probe_write_proto: 2 callbacks suppressed [ 351.643340][T18401] syz-executor.3[18401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.654194][T18401] syz-executor.3[18401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.890929][T18429] device syzkaller0 entered promiscuous mode [ 354.356802][T18566] Â: renamed from pim6reg1 [ 354.368076][T18568] syz-executor.2[18568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.368157][T18568] syz-executor.2[18568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.876842][T18612] device syzkaller0 entered promiscuous mode [ 354.926757][T18614] Â: renamed from pim6reg1 [ 355.583907][T18715] syz-executor.1[18715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.583979][T18715] syz-executor.1[18715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.221526][T18763] bond_slave_1: mtu less than device minimum [ 357.304411][T18838] syz-executor.3[18838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.304523][T18838] syz-executor.3[18838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.547178][T18849] device wg2 left promiscuous mode [ 357.760882][T18871] Â: renamed from pim6reg1 [ 357.768361][T18873] syz-executor.2[18873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.768469][T18873] syz-executor.2[18873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.816091][T18873] syz-executor.2[18873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.839989][T18873] syz-executor.2[18873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.642787][T18947] device pim6reg1 entered promiscuous mode [ 358.889909][T18968] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.911977][T18968] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.918880][T18968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.995381][T18973] device syzkaller0 entered promiscuous mode [ 359.130439][T18985] device syzkaller0 entered promiscuous mode [ 359.381121][T19000] FAULT_INJECTION: forcing a failure. [ 359.381121][T19000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.481393][T19000] CPU: 0 PID: 19000 Comm: syz-executor.0 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 359.492947][T19000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 359.502842][T19000] Call Trace: [ 359.505965][T19000] [ 359.508744][T19000] dump_stack_lvl+0x151/0x1b7 [ 359.513255][T19000] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 359.518548][T19000] dump_stack+0x15/0x1b [ 359.522549][T19000] should_fail_ex+0x3d0/0x520 [ 359.527054][T19000] should_fail+0xb/0x10 [ 359.531046][T19000] should_fail_usercopy+0x1a/0x20 [ 359.535905][T19000] _copy_to_user+0x1e/0x90 [ 359.540157][T19000] simple_read_from_buffer+0xc7/0x150 [ 359.545366][T19000] proc_fail_nth_read+0x1a3/0x210 [ 359.550226][T19000] ? proc_fault_inject_write+0x390/0x390 [ 359.555701][T19000] ? fsnotify_perm+0x470/0x5d0 [ 359.560293][T19000] ? security_file_permission+0x86/0xb0 [ 359.565674][T19000] ? proc_fault_inject_write+0x390/0x390 [ 359.571143][T19000] vfs_read+0x26c/0xad0 [ 359.575136][T19000] ? kernel_read+0x1f0/0x1f0 [ 359.579564][T19000] ? mutex_lock+0xb1/0x1e0 [ 359.583817][T19000] ? bit_wait_io_timeout+0x120/0x120 [ 359.588938][T19000] ? __fdget_pos+0x2e2/0x390 [ 359.593363][T19000] ? ksys_read+0x77/0x2c0 [ 359.597527][T19000] ksys_read+0x199/0x2c0 [ 359.601607][T19000] ? vfs_write+0xeb0/0xeb0 [ 359.605863][T19000] ? debug_smp_processor_id+0x17/0x20 [ 359.611065][T19000] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 359.616972][T19000] __x64_sys_read+0x7b/0x90 [ 359.621317][T19000] do_syscall_64+0x3d/0xb0 [ 359.625561][T19000] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 359.631290][T19000] RIP: 0033:0x7f4495a7bd4c [ 359.635561][T19000] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 359.654985][T19000] RSP: 002b:00007f44968eb0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 359.663228][T19000] RAX: ffffffffffffffda RBX: 00007f4495bb3f80 RCX: 00007f4495a7bd4c [ 359.671039][T19000] RDX: 000000000000000f RSI: 00007f44968eb130 RDI: 0000000000000008 [ 359.678854][T19000] RBP: 00007f44968eb120 R08: 0000000000000000 R09: 0000000000000000 [ 359.686676][T19000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 359.694478][T19000] R13: 000000000000000b R14: 00007f4495bb3f80 R15: 00007ffdd4333468 [ 359.702293][T19000] [ 360.612758][T19063] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.653777][T19063] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.660754][T19063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.507938][T19110] Â: renamed from pim6reg1 [ 361.543421][T19112] syz-executor.1[19112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.543486][T19112] syz-executor.1[19112] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.842141][T19149] FAULT_INJECTION: forcing a failure. [ 361.842141][T19149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 361.871527][T19149] CPU: 1 PID: 19149 Comm: syz-executor.1 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 361.883086][T19149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 361.892971][T19149] Call Trace: [ 361.896094][T19149] [ 361.898872][T19149] dump_stack_lvl+0x151/0x1b7 [ 361.903386][T19149] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 361.909193][T19149] dump_stack+0x15/0x1b [ 361.913182][T19149] should_fail_ex+0x3d0/0x520 [ 361.917693][T19149] should_fail+0xb/0x10 [ 361.921682][T19149] should_fail_usercopy+0x1a/0x20 [ 361.926567][T19149] strncpy_from_user+0x24/0x2b0 [ 361.931234][T19149] ? getname_flags+0xba/0x520 [ 361.935746][T19149] getname_flags+0xf2/0x520 [ 361.940083][T19149] __x64_sys_unlink+0x3c/0x50 [ 361.944595][T19149] do_syscall_64+0x3d/0xb0 [ 361.948851][T19149] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 361.954577][T19149] RIP: 0033:0x7f9d0407d0a9 [ 361.958830][T19149] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 361.978285][T19149] RSP: 002b:00007f9d04d790c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 361.986608][T19149] RAX: ffffffffffffffda RBX: 00007f9d041b3f80 RCX: 00007f9d0407d0a9 [ 361.994506][T19149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 362.002320][T19149] RBP: 00007f9d04d79120 R08: 0000000000000000 R09: 0000000000000000 [ 362.010129][T19149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.017939][T19149] R13: 000000000000000b R14: 00007f9d041b3f80 R15: 00007ffce769c878 [ 362.025758][T19149] [ 362.525124][T19200] bond_slave_1: mtu less than device minimum [ 363.861732][T19243] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.870036][T19243] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.885530][T19243] device bridge_slave_0 entered promiscuous mode [ 363.892548][T19243] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.901212][T19243] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.908580][T19243] device bridge_slave_1 entered promiscuous mode [ 364.121419][T19243] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.128361][T19243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.135485][T19243] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.142355][T19243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.169081][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.194020][T19270] syz-executor.4[19270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.195493][T19270] syz-executor.4[19270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.214319][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.260976][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.286684][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.299011][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.305880][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.313373][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.321644][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.328462][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.347847][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.356187][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.371103][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.387113][T19243] device veth0_vlan entered promiscuous mode [ 364.400891][T19243] device veth1_macvtap entered promiscuous mode [ 364.433957][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.452438][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.472417][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.504080][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.544711][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.570267][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.624520][T19300] device syzkaller0 entered promiscuous mode [ 364.657529][ T616] device veth1_macvtap left promiscuous mode [ 364.667615][ T616] device veth0_vlan left promiscuous mode [ 365.071398][T19301] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.078351][T19301] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.250438][T19301] device bridge_slave_0 entered promiscuous mode [ 365.275355][T19301] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.337422][T19301] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.393343][T19301] device bridge_slave_1 entered promiscuous mode [ 365.853680][T19301] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.860579][T19301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.867662][T19301] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.874554][T19301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.886886][T19357] syz-executor.2[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.886954][T19357] syz-executor.2[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.956903][ T315] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.979919][ T315] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.996334][T19358] device pim6reg1 entered promiscuous mode [ 366.085153][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.093231][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.210124][ T616] device bridge_slave_1 left promiscuous mode [ 366.216128][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.249316][ T616] device bridge_slave_0 left promiscuous mode [ 366.257809][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.265789][ T616] device veth1_macvtap left promiscuous mode [ 366.271779][ T616] device veth0_vlan left promiscuous mode [ 366.441898][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.459293][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.467426][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.474316][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.481545][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.489731][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.498266][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.505124][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.512508][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 366.520799][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.528678][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.536848][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.544708][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.552982][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.566133][T19301] device veth0_vlan entered promiscuous mode [ 366.580055][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 366.587846][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.630255][T19301] device veth1_macvtap entered promiscuous mode [ 366.637906][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.646314][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.664173][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.676299][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.684589][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.715840][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.729113][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.746947][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.756982][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.471260][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.471548][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.523548][T19526] device syzkaller0 entered promiscuous mode [ 367.571786][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.571849][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.623100][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.658892][T19526] syz-executor.4[19526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.780036][T19562] bridge0: port 3(team_slave_1) entered blocking state [ 367.798498][T19562] bridge0: port 3(team_slave_1) entered disabled state [ 367.805880][T19562] device team_slave_1 entered promiscuous mode [ 368.191522][T19597] device syzkaller0 entered promiscuous mode [ 369.243450][T19656] Â: renamed from pim6reg1 [ 369.655038][T19705] bond_slave_1: mtu less than device minimum [ 369.814150][T19717] device syzkaller0 entered promiscuous mode [ 370.342887][T19758] device pim6reg1 entered promiscuous mode [ 370.427516][T19761] device pim6reg1 entered promiscuous mode [ 371.185455][T19823] bond_slave_1: mtu less than device minimum [ 371.471589][T19832] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.504104][T19835] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 371.541292][T19838] O3ãc¤±: renamed from bridge_slave_0 [ 372.079956][T19865] Â: renamed from pim6reg1 [ 372.137537][T19870] device syzkaller0 entered promiscuous mode [ 372.151334][T19871] device pim6reg1 entered promiscuous mode [ 372.299402][T19888] FAULT_INJECTION: forcing a failure. [ 372.299402][T19888] name failslab, interval 1, probability 0, space 0, times 0 [ 372.315714][T19888] CPU: 0 PID: 19888 Comm: syz-executor.2 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 372.327160][T19888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 372.337054][T19888] Call Trace: [ 372.340177][T19888] [ 372.342959][T19888] dump_stack_lvl+0x151/0x1b7 [ 372.347469][T19888] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 372.352767][T19888] ? __ext4_find_entry+0x17d6/0x1af0 [ 372.357885][T19888] dump_stack+0x15/0x1b [ 372.361875][T19888] should_fail_ex+0x3d0/0x520 [ 372.366388][T19888] ? jbd2__journal_start+0x150/0x720 [ 372.371509][T19888] __should_failslab+0xaf/0xf0 [ 372.376112][T19888] should_failslab+0x9/0x20 [ 372.380449][T19888] kmem_cache_alloc+0x3b/0x2c0 [ 372.385051][T19888] jbd2__journal_start+0x150/0x720 [ 372.389998][T19888] __ext4_journal_start_sb+0x24d/0x4b0 [ 372.395294][T19888] __ext4_unlink+0x412/0xba0 [ 372.399720][T19888] ? __ext4_read_dirblock+0x8f0/0x8f0 [ 372.404928][T19888] ? rwsem_mark_wake+0x6b0/0x6b0 [ 372.409705][T19888] ext4_unlink+0x142/0x3f0 [ 372.413954][T19888] vfs_unlink+0x38c/0x630 [ 372.418130][T19888] do_unlinkat+0x483/0x920 [ 372.422376][T19888] ? fsnotify_link_count+0x100/0x100 [ 372.427494][T19888] ? getname_flags+0x1fd/0x520 [ 372.432090][T19888] __x64_sys_unlink+0x49/0x50 [ 372.436605][T19888] do_syscall_64+0x3d/0xb0 [ 372.440856][T19888] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 372.446585][T19888] RIP: 0033:0x7f5501a7d0a9 [ 372.450839][T19888] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 372.470280][T19888] RSP: 002b:00007f5500df70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 372.478524][T19888] RAX: ffffffffffffffda RBX: 00007f5501bb3f80 RCX: 00007f5501a7d0a9 [ 372.486340][T19888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 372.494146][T19888] RBP: 00007f5500df7120 R08: 0000000000000000 R09: 0000000000000000 [ 372.501958][T19888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 372.509774][T19888] R13: 000000000000000b R14: 00007f5501bb3f80 R15: 00007ffea8526518 [ 372.517593][T19888] [ 372.538400][T19898] bpf_get_probe_write_proto: 6 callbacks suppressed [ 372.538419][T19898] syz-executor.0[19898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.550046][T19898] syz-executor.0[19898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.295263][T20030] Â: renamed from pim6reg1 [ 374.570216][T20065] device pim6reg1 entered promiscuous mode [ 374.587005][T20069] syz-executor.4[20069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.587095][T20069] syz-executor.4[20069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.329330][T20114] syz-executor.3[20114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.360251][T20114] syz-executor.3[20114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.405946][T20115] syz-executor.3[20115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.474496][T20115] syz-executor.3[20115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.612653][T20129] syz-executor.1[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.674384][T20129] syz-executor.1[20129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.663396][T20208] device syzkaller0 entered promiscuous mode [ 376.710394][T20220] Â: renamed from pim6reg1 [ 377.933891][T20323] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 377.947157][T20326] device pim6reg1 entered promiscuous mode [ 379.214227][T20408] bpf_get_probe_write_proto: 3 callbacks suppressed [ 379.214244][T20408] syz-executor.3[20408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.252098][T20408] syz-executor.3[20408] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.482258][T20442] Â: renamed from pim6reg1 [ 379.539424][T20443] device syzkaller0 entered promiscuous mode [ 381.127030][T20557] syz-executor.1[20557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.127116][T20557] syz-executor.1[20557] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.141028][T20557] bridge0: port 4(ip6gretap0) entered blocking state [ 381.159207][T20557] bridge0: port 4(ip6gretap0) entered disabled state [ 381.166560][T20557] device ip6gretap0 entered promiscuous mode [ 381.173380][T20557] bridge0: port 4(ip6gretap0) entered blocking state [ 381.179914][T20557] bridge0: port 4(ip6gretap0) entered forwarding state [ 381.380506][T20571] FAULT_INJECTION: forcing a failure. [ 381.380506][T20571] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 381.458622][T20571] CPU: 0 PID: 20571 Comm: syz-executor.4 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 381.470094][T20571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 381.479986][T20571] Call Trace: [ 381.483108][T20571] [ 381.485883][T20571] dump_stack_lvl+0x151/0x1b7 [ 381.490397][T20571] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 381.495695][T20571] ? cgroup_rstat_updated+0xe5/0x370 [ 381.500811][T20571] dump_stack+0x15/0x1b [ 381.504810][T20571] should_fail_ex+0x3d0/0x520 [ 381.509320][T20571] should_fail+0xb/0x10 [ 381.513324][T20571] should_fail_usercopy+0x1a/0x20 [ 381.518169][T20571] _copy_from_user+0x1e/0xc0 [ 381.522604][T20571] get_user_ifreq+0xd5/0x230 [ 381.527026][T20571] sock_do_ioctl+0x1a7/0x450 [ 381.531482][T20571] ? has_cap_mac_admin+0x3c0/0x3c0 [ 381.536398][T20571] ? sock_show_fdinfo+0xa0/0xa0 [ 381.541088][T20571] ? selinux_file_ioctl+0x3cc/0x540 [ 381.546118][T20571] sock_ioctl+0x455/0x740 [ 381.550284][T20571] ? sock_poll+0x400/0x400 [ 381.554537][T20571] ? __fget_files+0x2cb/0x330 [ 381.559056][T20571] ? security_file_ioctl+0x84/0xb0 [ 381.563997][T20571] ? sock_poll+0x400/0x400 [ 381.568248][T20571] __se_sys_ioctl+0x114/0x190 [ 381.572786][T20571] __x64_sys_ioctl+0x7b/0x90 [ 381.577189][T20571] do_syscall_64+0x3d/0xb0 [ 381.581441][T20571] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 381.587167][T20571] RIP: 0033:0x7f06a547d0a9 [ 381.591426][T20571] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 381.610957][T20571] RSP: 002b:00007f06a62aa0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 381.619195][T20571] RAX: ffffffffffffffda RBX: 00007f06a55b3f80 RCX: 00007f06a547d0a9 [ 381.627004][T20571] RDX: 0000000020000080 RSI: 0000000000008922 RDI: 0000000000000009 [ 381.634816][T20571] RBP: 00007f06a62aa120 R08: 0000000000000000 R09: 0000000000000000 [ 381.642637][T20571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.650442][T20571] R13: 000000000000000b R14: 00007f06a55b3f80 R15: 00007fffddcbc9b8 [ 381.658261][T20571] [ 382.019755][T20601] device syzkaller0 entered promiscuous mode [ 382.115039][T20603] device syzkaller0 entered promiscuous mode [ 382.337092][ T616] bridge0: port 4(ip6gretap0) entered disabled state [ 382.371302][ T616] device ip6gretap0 left promiscuous mode [ 382.386997][ T616] bridge0: port 4(ip6gretap0) entered disabled state [ 382.586658][T20627] Â: renamed from pim6reg1 [ 382.687472][T20620] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.694774][T20620] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.703637][T20638] syz-executor.3[20638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.703705][T20638] syz-executor.3[20638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.726509][T20620] device bridge_slave_0 entered promiscuous mode [ 382.775583][T20620] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.793368][T20620] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.800920][T20620] device bridge_slave_1 entered promiscuous mode [ 383.060733][ T616] device team_slave_1 left promiscuous mode [ 383.066501][ T616] bridge0: port 3(team_slave_1) entered disabled state [ 383.135311][ T616] device bridge_slave_1 left promiscuous mode [ 383.161485][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.221367][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.248305][ T616] device veth1_macvtap left promiscuous mode [ 383.278978][ T616] device veth0_vlan left promiscuous mode [ 383.614863][T20665] Â: renamed from pim6reg1 [ 383.911712][T20681] device syzkaller0 entered promiscuous mode [ 383.987185][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 384.001843][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.023479][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.050105][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.058171][ T1206] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.065305][ T1206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.072477][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.080607][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.088523][ T1206] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.095360][ T1206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.103857][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 384.128443][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 384.138765][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.146997][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 384.155330][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.188028][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.196177][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.207396][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.216479][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.224182][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.233360][T20620] device veth0_vlan entered promiscuous mode [ 384.245096][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 384.254757][T20620] device veth1_macvtap entered promiscuous mode [ 384.265844][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 384.274067][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.291133][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.299163][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.380998][T20752] device syzkaller0 entered promiscuous mode [ 385.461662][T20775] Â: renamed from pim6reg1 [ 387.198828][T20870] device syzkaller0 entered promiscuous mode [ 388.787473][T20958] device syzkaller0 entered promiscuous mode [ 389.078446][T20994] syz-executor.4[20994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.079005][T20994] syz-executor.4[20994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.154975][T20994] syz-executor.4[20994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.583834][T21028] Â: renamed from pim6reg1 [ 390.838088][T21094] Â: renamed from pim6reg1 [ 391.981423][T21201] device pim6reg1 entered promiscuous mode [ 392.797772][T21292] syz-executor.1[21292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.797847][T21292] syz-executor.1[21292] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.868229][T21295] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 393.003094][T21300] syz-executor.1[21300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.003162][T21300] syz-executor.1[21300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.241592][T21330] bridge0: port 3(dummy0) entered blocking state [ 393.263379][T21330] bridge0: port 3(dummy0) entered disabled state [ 393.270252][T21330] device dummy0 entered promiscuous mode [ 393.275834][T21330] bridge0: port 3(dummy0) entered blocking state [ 393.282015][T21330] bridge0: port 3(dummy0) entered forwarding state [ 393.491104][T21347] syz-executor.1[21347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.491185][T21347] syz-executor.1[21347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.335915][T21382] syz-executor.4[21382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.364390][T21382] syz-executor.4[21382] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.413379][T21386] device pim6reg1 entered promiscuous mode [ 394.504494][T21397] device macsec0 entered promiscuous mode [ 394.570337][T21400] syz-executor.1[21400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.570405][T21400] syz-executor.1[21400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.836497][T21408] Â: renamed from pim6reg1 [ 395.354612][T21429] ªªªªªª: renamed from vlan0 [ 396.128068][T21526] syz-executor.3[21526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.128145][T21526] syz-executor.3[21526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.771525][T21565] device wg2 entered promiscuous mode [ 397.076612][T21568] syz-executor.1[21568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.076680][T21568] syz-executor.1[21568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.150958][T21569] syz-executor.1[21569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.268999][T21569] syz-executor.1[21569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.464387][T21658] device pim6reg1 entered promiscuous mode [ 403.342570][T21760] device pim6reg1 entered promiscuous mode [ 403.470905][T21781] fscrypt: sda1: filesystem not mounted with inlinecrypt [ 403.470905][T21781] [ 403.480099][T21782] fscrypt: sda1: filesystem not mounted with inlinecrypt [ 403.480099][T21782] [ 403.635888][T21797] Â: renamed from pim6reg1 [ 404.436781][T21853] device syzkaller0 entered promiscuous mode [ 405.505194][T21913] bpf_get_probe_write_proto: 2 callbacks suppressed [ 405.505253][T21913] syz-executor.1[21913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.522293][T21913] syz-executor.1[21913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.609940][T21930] Â: renamed from pim6reg1 [ 405.616375][T21913] syz-executor.1[21913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.201839][T21962] device syzkaller0 entered promiscuous mode [ 406.745189][T22008] syz-executor.4[22008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.745263][T22008] syz-executor.4[22008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.877956][T22067] syz-executor.2[22067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.889755][T22069] device veth1_macvtap left promiscuous mode [ 407.917491][T22067] syz-executor.2[22067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.922055][T22069] device veth1_macvtap entered promiscuous mode [ 407.940614][T22069] device macsec0 entered promiscuous mode [ 408.328151][T22113] syz-executor.1[22113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.328226][T22113] syz-executor.1[22113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.733132][T22155] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 409.153165][T22192] device veth1_macvtap left promiscuous mode [ 409.190169][T22192] device macsec0 left promiscuous mode [ 409.246546][T22197] device veth1_macvtap entered promiscuous mode [ 409.267897][T22197] device macsec0 entered promiscuous mode [ 409.678720][T22222] Â: renamed from pim6reg1 [ 409.997045][T22234] device syzkaller0 entered promiscuous mode [ 410.134135][T22248] syz-executor.3[22248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.532552][T22309] device syzkaller0 entered promiscuous mode [ 411.949860][T22344] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 412.400481][T22388] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 412.596444][T22419] bpf_get_probe_write_proto: 1 callbacks suppressed [ 412.596463][T22419] syz-executor.2[22419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.684047][T22419] syz-executor.2[22419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.775505][T22428] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 412.786975][T22430] Â: renamed from pim6reg1 [ 413.194350][T22460] device syzkaller0 entered promiscuous mode [ 413.621132][T22493] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 414.261525][T22527] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 414.306107][T22533] EXT4-fs (sda1): Can't modify superblock whileperforming online resize [ 414.686574][T22567] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 414.703928][T22571] bridge0: port 3(veth1_macvtap) entered blocking state [ 414.714878][T22571] bridge0: port 3(veth1_macvtap) entered disabled state [ 415.038338][T22581] device syzkaller0 entered promiscuous mode [ 416.017973][T22643] device veth1_macvtap left promiscuous mode [ 416.040161][T22643] device macsec0 left promiscuous mode [ 417.266707][T22739] device wg2 entered promiscuous mode [ 417.417562][T22745] device syzkaller0 entered promiscuous mode [ 418.073266][T22792] device pim6reg1 entered promiscuous mode [ 418.384283][ T28] audit: type=1400 audit(1719210884.756:160): avc: denied { create } for pid=22806 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 418.744432][T22829] syz-executor.0[22829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.745839][T22829] syz-executor.0[22829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.797981][T22829] syz-executor.0[22829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.347431][T22886] syz-executor.4[22886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.397433][T22886] syz-executor.4[22886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.985246][T22924] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 420.487744][T22968] bridge0: port 3(dummy0) entered blocking state [ 420.494579][T22968] bridge0: port 3(dummy0) entered disabled state [ 420.501327][T22968] device dummy0 entered promiscuous mode [ 420.506948][T22968] bridge0: port 3(dummy0) entered blocking state [ 420.513127][T22968] bridge0: port 3(dummy0) entered forwarding state [ 421.333732][T23009] device syzkaller0 entered promiscuous mode [ 421.581313][T23049] bond_slave_1: mtu greater than device maximum [ 422.130295][T23093] device wg2 left promiscuous mode [ 422.570019][T23124] syz-executor.4[23124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.570097][T23124] syz-executor.4[23124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.676003][T23136] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 422.791403][T23145] syz-executor.4[23145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.791490][T23145] syz-executor.4[23145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.865919][T23156] syz-executor.0[23156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.713252][T23203] device syzkaller0 entered promiscuous mode [ 423.907437][T23222] device syzkaller0 entered promiscuous mode [ 424.423345][T23266] bpf_get_probe_write_proto: 1 callbacks suppressed [ 424.423361][T23266] syz-executor.3[23266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.462925][T23266] syz-executor.3[23266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.602293][ T43] device bridge_slave_1 left promiscuous mode [ 424.686358][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.721888][ T43] device bridge_slave_0 left promiscuous mode [ 424.750147][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.785623][ T43] device veth0_vlan left promiscuous mode [ 425.026482][T23286] device pim6reg1 entered promiscuous mode [ 425.299071][T23283] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.322980][T23283] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.347462][T23283] device bridge_slave_0 entered promiscuous mode [ 425.395474][T23283] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.450396][T23283] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.478192][T23283] device bridge_slave_1 entered promiscuous mode [ 425.777470][T23283] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.784344][T23283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.791441][T23283] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.798208][T23283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.886938][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 425.901612][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.912347][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.963001][T23373] syz-executor.4[23373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.963105][T23373] syz-executor.4[23373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.002169][T23371] device syzkaller0 entered promiscuous mode [ 426.040742][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.065143][ T1206] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.072031][ T1206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.090305][T23371] syz-executor.0[23371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.090384][T23371] syz-executor.0[23371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.109987][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.136155][ T1206] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.143043][ T1206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.187141][T23382] device syzkaller0 entered promiscuous mode [ 426.200560][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 426.208743][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 426.217031][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 426.225053][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 426.260163][T23389] Â: renamed from pim6reg1 [ 426.288814][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 426.301853][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 426.316561][T23283] device veth0_vlan entered promiscuous mode [ 426.323466][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 426.331900][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.362786][T23283] device veth1_macvtap entered promiscuous mode [ 426.379666][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.389193][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.407348][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 426.430333][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 426.440819][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 426.495466][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 426.504220][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 426.543036][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 426.590551][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 426.823463][T23443] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 426.839407][T23445] device pim6reg1 entered promiscuous mode [ 427.353895][T23482] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 427.485071][T23494] device veth0_vlan left promiscuous mode [ 427.502202][T23494] device veth0_vlan entered promiscuous mode [ 427.518806][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.538149][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.555899][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 427.804278][T23519] syz-executor.1[23519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.804335][T23519] syz-executor.1[23519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.078477][T23542] syz-executor.1[23542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.107334][T23542] syz-executor.1[23542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.331947][T23573] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 429.377164][T23626] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.384305][T23626] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.391652][T23626] device bridge_slave_0 entered promiscuous mode [ 429.399626][T23626] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.408474][T23626] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.416001][T23626] device bridge_slave_1 entered promiscuous mode [ 429.742722][T23626] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.749716][T23626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.756823][T23626] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.763604][T23626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.825737][ T616] device bridge_slave_1 left promiscuous mode [ 429.832899][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.842815][ T616] device bridge_slave_0 left promiscuous mode [ 429.850147][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.877930][ T616] device veth1_macvtap left promiscuous mode [ 429.894090][ T616] device veth0_vlan left promiscuous mode [ 430.113552][ T4971] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.130149][ T4971] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.179115][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 430.187749][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.211008][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 430.221483][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.233340][ T1206] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.240484][ T1206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.260042][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 430.290293][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.298514][ T1206] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.305373][ T1206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.341043][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 430.348987][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 430.365961][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 430.374906][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 430.412431][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 430.427268][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 430.443379][T23626] device veth0_vlan entered promiscuous mode [ 430.464460][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 430.474613][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 430.502058][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 430.509933][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 430.517937][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 430.527280][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 430.536840][T23626] device veth1_macvtap entered promiscuous mode [ 430.570820][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 430.581906][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 430.590521][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 430.617045][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 430.644464][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 431.223030][T23797] syz-executor.3[23797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.223486][T23797] syz-executor.3[23797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.318340][T23797] syz-executor.3[23797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.925378][T23826] Â: renamed from pim6reg1 [ 432.043051][T23827] device pim6reg1 entered promiscuous mode [ 432.562322][T23859] syz-executor.3[23859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.563128][T23859] syz-executor.3[23859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.627807][T23868] Â: renamed from pim6reg1 [ 432.817708][T23881] device syzkaller0 entered promiscuous mode [ 432.840291][T23890] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 433.477080][T23930] device pim6reg1 entered promiscuous mode [ 433.641854][T23950] device syzkaller0 entered promiscuous mode [ 434.288037][T23993] device vxcan1 entered promiscuous mode [ 435.221599][T24043] device pim6reg1 entered promiscuous mode [ 435.238354][T24045] syz-executor.0[24045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.238436][T24045] syz-executor.0[24045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.267243][T24049] device vxcan1 entered promiscuous mode [ 435.454107][T24070] Â: renamed from pim6reg1 [ 435.618623][T24085] device pim6reg1 entered promiscuous mode [ 435.687786][T24093] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 435.847833][T24096] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.855318][T24096] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.862672][T24096] device bridge_slave_0 entered promiscuous mode [ 435.871733][T24096] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.878612][T24096] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.887043][T24096] device bridge_slave_1 entered promiscuous mode [ 436.278695][ T43] device dummy0 left promiscuous mode [ 436.283986][ T43] bridge0: port 3(dummy0) entered disabled state [ 436.310472][ T43] device bridge_slave_1 left promiscuous mode [ 436.316431][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.333241][T24125] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 436.390384][ T43] device bridge_slave_0 left promiscuous mode [ 436.396353][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.418298][ T43] device veth1_macvtap left promiscuous mode [ 436.645761][T24141] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 436.662972][T24096] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.669955][T24096] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.677020][T24096] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.683820][T24096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.691686][ T682] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.700882][ T682] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.717895][T24143] FAULT_INJECTION: forcing a failure. [ 436.717895][T24143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 436.730980][T24139] device sit0 left promiscuous mode [ 436.739973][T24143] CPU: 1 PID: 24143 Comm: syz-executor.0 Tainted: G W 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 436.751619][T24143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 436.761588][T24143] Call Trace: [ 436.764712][T24143] [ 436.767494][T24143] dump_stack_lvl+0x151/0x1b7 [ 436.772007][T24143] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 436.777299][T24143] ? kstrtouint+0xf6/0x180 [ 436.781552][T24143] ? _kstrtol+0x150/0x150 [ 436.785719][T24143] dump_stack+0x15/0x1b [ 436.789710][T24143] should_fail_ex+0x3d0/0x520 [ 436.794243][T24143] should_fail+0xb/0x10 [ 436.798216][T24143] should_fail_usercopy+0x1a/0x20 [ 436.803084][T24143] _copy_from_user+0x1e/0xc0 [ 436.807503][T24143] copy_msghdr_from_user+0xaa/0x670 [ 436.812541][T24143] ? sendmsg_copy_msghdr+0x70/0x70 [ 436.817489][T24143] __sys_sendmsg+0x236/0x390 [ 436.822018][T24143] ? ____sys_sendmsg+0x9a0/0x9a0 [ 436.826790][T24143] ? __kasan_check_write+0x14/0x20 [ 436.831735][T24143] ? mutex_unlock+0xb2/0x260 [ 436.836166][T24143] ? __kasan_check_write+0x14/0x20 [ 436.841117][T24143] ? debug_smp_processor_id+0x17/0x20 [ 436.846319][T24143] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 436.852219][T24143] __x64_sys_sendmsg+0x7f/0x90 [ 436.856818][T24143] do_syscall_64+0x3d/0xb0 [ 436.861071][T24143] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 436.866798][T24143] RIP: 0033:0x7f42df67d0a9 [ 436.871142][T24143] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 436.890583][T24143] RSP: 002b:00007f42e03260c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 436.898859][T24143] RAX: ffffffffffffffda RBX: 00007f42df7b3f80 RCX: 00007f42df67d0a9 [ 436.906640][T24143] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000004 [ 436.914449][T24143] RBP: 00007f42e0326120 R08: 0000000000000000 R09: 0000000000000000 [ 436.922261][T24143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.930090][T24143] R13: 000000000000000b R14: 00007f42df7b3f80 R15: 00007ffeb5f0db18 [ 436.937888][T24143] [ 436.942240][T24141] device sit0 entered promiscuous mode [ 437.042818][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 437.054047][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.071478][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 437.084423][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.098155][ T682] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.105174][ T682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.119548][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.136143][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.144538][ T682] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.151408][ T682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.194061][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 437.205660][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.214243][T24156] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 437.224950][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 437.233061][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.249533][T24096] device veth0_vlan entered promiscuous mode [ 437.294496][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 437.307270][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 437.340231][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 437.352000][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.366375][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.373814][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.381052][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 437.389149][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 437.397965][T24096] device veth1_macvtap entered promiscuous mode [ 437.442638][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 437.459264][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 437.490890][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 437.539269][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 437.598319][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 438.635807][T24238] syz-executor.2[24238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.635883][T24238] syz-executor.2[24238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.752695][T24249] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 438.879063][T24264] Â: renamed from pim6reg1 [ 438.954041][T24283] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 439.011470][T24290] bridge0: port 3(dummy0) entered disabled state [ 439.017777][T24290] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.024725][T24290] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.056784][T24290] bridge0: port 3(dummy0) entered blocking state [ 439.062987][T24290] bridge0: port 3(dummy0) entered forwarding state [ 439.069423][T24290] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.076290][T24290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.083394][T24290] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.090174][T24290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.148022][T24290] device bridge0 entered promiscuous mode [ 439.348600][T24319] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 439.477192][T24329] device syzkaller0 entered promiscuous mode [ 439.519956][T24334] syz-executor.0[24334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.520047][T24334] syz-executor.0[24334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.592020][T24339] device sit0 left promiscuous mode [ 439.825925][T24352] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 440.369165][T24383] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 440.558886][T24407] Â: renamed from pim6reg1 [ 440.696798][T24419] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 441.130678][T24449] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 441.504004][T24462] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.511111][T24462] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.518499][T24462] device bridge_slave_0 entered promiscuous mode [ 441.540803][T24462] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.563897][T24462] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.586370][T24462] device bridge_slave_1 entered promiscuous mode [ 441.746447][ T341] device bridge_slave_1 left promiscuous mode [ 441.753702][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.764440][ T341] device bridge_slave_0 left promiscuous mode [ 441.772192][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.781324][ T341] device veth1_macvtap left promiscuous mode [ 441.787309][ T341] device veth0_vlan left promiscuous mode [ 441.983740][T24462] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.990634][T24462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.997714][T24462] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.004504][T24462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.069884][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.077596][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.087429][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.112422][T24511] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.119452][T24511] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.127182][T24511] device bridge_slave_0 entered promiscuous mode [ 442.134236][T24511] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.141149][T24511] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.148572][T24511] device bridge_slave_1 entered promiscuous mode [ 442.170999][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.178879][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.202493][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 442.230231][T24462] device veth0_vlan entered promiscuous mode [ 442.253170][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.263504][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.270901][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.285715][T24462] device veth1_macvtap entered promiscuous mode [ 442.300203][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.320750][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.338560][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.362191][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.370775][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.439584][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 442.447212][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.467099][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 442.476028][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.485017][ T682] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.491883][ T682] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.499183][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 442.508328][ T682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.516480][ T682] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.523478][ T682] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.539405][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 442.551251][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 442.569676][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.577605][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.620136][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 442.637454][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.647309][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.655496][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.663046][T24511] device veth0_vlan entered promiscuous mode [ 442.723926][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 442.735741][T24511] device veth1_macvtap entered promiscuous mode [ 442.749655][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 442.758426][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.793063][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 442.811846][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 443.015825][ T341] device bridge_slave_1 left promiscuous mode [ 443.051750][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.065474][T24578] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 443.097243][ T341] device bridge_slave_0 left promiscuous mode [ 443.115305][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.123727][ T341] device veth1_macvtap left promiscuous mode [ 443.129725][ T341] device veth0_vlan left promiscuous mode [ 443.608929][T24590] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.648417][T24590] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.674714][T24590] device bridge_slave_0 entered promiscuous mode [ 443.733117][T24590] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.762151][T24590] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.800423][T24590] device bridge_slave_1 entered promiscuous mode [ 444.177557][T24590] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.184563][T24590] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.191666][T24590] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.198452][T24590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.407736][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.421581][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.433703][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.489131][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.515601][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.544398][T21343] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.551398][T21343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.606449][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.648465][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.661086][T21343] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.667957][T21343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.697224][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 444.711794][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.743654][T24658] syz-executor.0[24658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.744914][T24658] syz-executor.0[24658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.758907][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 444.778292][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.786632][ T341] device bridge_slave_1 left promiscuous mode [ 444.792771][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.800902][ T341] device bridge_slave_0 left promiscuous mode [ 444.806848][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.816455][ T341] device veth1_macvtap left promiscuous mode [ 444.822430][ T341] device veth0_vlan left promiscuous mode [ 444.961471][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 444.969916][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.982769][T24590] device veth0_vlan entered promiscuous mode [ 444.994037][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 445.002208][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.015928][T24590] device veth1_macvtap entered promiscuous mode [ 445.022870][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.030356][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 445.037627][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 445.045778][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 445.053835][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 445.069073][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 445.077580][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 445.085758][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 445.093799][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 445.648157][T24690] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 445.895130][T24697] device syzkaller0 entered promiscuous mode [ 445.936292][T24702] device pim6reg1 entered promiscuous mode [ 446.033178][ T341] device bridge_slave_1 left promiscuous mode [ 446.040327][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.066703][ T341] device bridge_slave_0 left promiscuous mode [ 446.090541][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.128121][ T341] device veth1_macvtap left promiscuous mode [ 446.151151][ T341] device veth0_vlan left promiscuous mode [ 446.490128][T24709] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.497174][T24709] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.504805][T24709] device bridge_slave_0 entered promiscuous mode [ 446.512126][T24709] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.519417][T24709] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.526816][T24709] device bridge_slave_1 entered promiscuous mode [ 446.673063][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 446.682098][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 446.710693][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 446.721382][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 446.729412][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.736254][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.743419][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 446.751483][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 446.759611][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.766454][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.773653][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 446.781412][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 446.789368][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 446.809241][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 446.832122][T24709] device veth0_vlan entered promiscuous mode [ 446.848836][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 446.858616][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 446.866089][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 446.929202][T24740] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 446.944711][T24709] device veth1_macvtap entered promiscuous mode [ 447.134715][T24746] device syzkaller0 entered promiscuous mode [ 447.152351][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 447.186387][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 447.195418][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 447.348993][T24764] device pim6reg1 entered promiscuous mode [ 447.900808][ T8] device bridge_slave_1 left promiscuous mode [ 447.914764][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.971049][ T8] device bridge_slave_0 left promiscuous mode [ 448.007787][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.051583][ T8] device veth1_macvtap left promiscuous mode [ 448.078605][ T8] device veth0_vlan left promiscuous mode [ 448.611028][T24796] device syzkaller0 entered promiscuous mode [ 448.865180][T24835] device pim6reg1 entered promiscuous mode [ 449.094621][T24851] device pim6reg1 entered promiscuous mode [ 449.438873][T24850] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.467445][T24850] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.488111][T24850] device bridge_slave_0 entered promiscuous mode [ 449.533446][T24850] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.574018][T24850] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.589426][T24850] device bridge_slave_1 entered promiscuous mode [ 449.818579][T24863] device syzkaller0 entered promiscuous mode [ 450.286968][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.301428][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.357800][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.377127][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.390727][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.397768][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.456426][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.479395][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.517111][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.524002][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.579015][T24916] Â: renamed from pim6reg1 [ 450.595944][T24919] device pim6reg1 entered promiscuous mode [ 450.608951][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.623519][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.665290][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.691150][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 450.714981][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 450.732987][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 450.754364][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 450.769363][T24850] device veth0_vlan entered promiscuous mode [ 450.828274][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 450.848493][T24850] device veth1_macvtap entered promiscuous mode [ 450.911700][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 450.943521][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 451.001548][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 451.021831][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.792484][ T8] device bridge_slave_1 left promiscuous mode [ 451.798525][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.831753][ T8] device bridge_slave_0 left promiscuous mode [ 451.870375][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.904769][ T8] device veth1_macvtap left promiscuous mode [ 451.940663][ T8] device veth0_vlan left promiscuous mode [ 452.449637][T24993] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.494656][T24993] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.523124][T24993] device bridge_slave_0 entered promiscuous mode [ 452.557581][T24993] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.579924][T24993] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.587332][T24993] device bridge_slave_1 entered promiscuous mode [ 452.644554][T25045] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 452.924341][T24993] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.931257][T24993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.938328][T24993] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.945120][T24993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.985324][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.993440][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.015320][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.056609][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 453.075855][ T1206] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.082740][ T1206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.100678][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 453.108776][ T1206] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.115650][ T1206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.122962][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 453.132310][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 453.188126][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 453.227558][T25060] fscrypt: sda1: filesystem not mounted with inlinecrypt [ 453.227558][T25060] [ 453.247268][T24993] device veth0_vlan entered promiscuous mode [ 453.270901][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 453.278889][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 453.317200][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.347249][T24993] device veth1_macvtap entered promiscuous mode [ 453.371291][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 453.389636][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 453.398960][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 453.407728][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 453.415893][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 454.164384][ T341] device bridge_slave_1 left promiscuous mode [ 454.173100][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.196167][ T341] device bridge_slave_0 left promiscuous mode [ 454.226226][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.274823][ T341] device veth1_macvtap left promiscuous mode [ 454.299388][ T341] device veth0_vlan left promiscuous mode [ 454.667452][T25102] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.679941][T25102] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.693049][T25102] device bridge_slave_0 entered promiscuous mode [ 454.710903][T25102] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.717766][T25102] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.725322][T25102] device bridge_slave_1 entered promiscuous mode [ 454.743141][T25120] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 454.777240][T25133] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 454.821021][T25102] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.827910][T25102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.867815][ T314] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.906209][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.925889][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.007998][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.039019][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.071646][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.078535][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.124755][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.133196][T25159] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 455.150248][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.157151][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.201405][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.227031][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.289764][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.332062][T25102] device veth0_vlan entered promiscuous mode [ 455.338725][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.389373][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.439749][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.464323][T25102] device veth1_macvtap entered promiscuous mode [ 455.487749][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 455.512005][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.536484][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 456.351905][ T616] device bridge_slave_1 left promiscuous mode [ 456.357865][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.386209][ T616] device bridge_slave_0 left promiscuous mode [ 456.419028][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.445782][ T616] device veth1_macvtap left promiscuous mode [ 456.469969][ T616] device veth0_vlan left promiscuous mode [ 456.784567][T25233] device syzkaller0 entered promiscuous mode [ 456.826918][T25200] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.838630][T25200] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.846781][T25200] device bridge_slave_0 entered promiscuous mode [ 456.858716][T25200] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.865653][T25200] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.873044][T25200] device bridge_slave_1 entered promiscuous mode [ 456.962730][T25259] syz-executor.1[25259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.962806][T25259] syz-executor.1[25259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.070034][T25200] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.088435][T25200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.095591][T25200] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.102464][T25200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.145927][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.155121][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.163875][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 457.174220][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 457.200445][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 457.220962][ T1206] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.227830][ T1206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.264118][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 457.288818][ T1206] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.295700][ T1206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.341360][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 457.377154][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.419845][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 457.444588][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.467170][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.479365][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.487474][T25200] device veth0_vlan entered promiscuous mode [ 457.514128][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.525869][T25200] device veth1_macvtap entered promiscuous mode [ 457.551453][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 457.571866][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 458.029705][T25303] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.036713][T25303] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.045430][T25303] device bridge_slave_0 entered promiscuous mode [ 458.052536][T25303] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.059380][T25303] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.066751][T25303] device bridge_slave_1 entered promiscuous mode [ 458.104576][T25318] device syzkaller0 entered promiscuous mode [ 458.243410][T25303] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.250309][T25303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.257468][T25303] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.264269][T25303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.323183][ T616] device bridge_slave_1 left promiscuous mode [ 458.334917][ T616] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.347233][ T616] device bridge_slave_0 left promiscuous mode [ 458.354830][ T616] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.366351][ T616] device veth1_macvtap left promiscuous mode [ 458.373721][ T616] device veth0_vlan left promiscuous mode [ 458.618916][T25337] device syzkaller0 entered promiscuous mode [ 458.684635][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 458.695102][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.705760][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.728097][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 458.739324][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.746208][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.798518][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 458.811297][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.818172][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.853866][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 458.865886][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 458.889160][T25303] device veth0_vlan entered promiscuous mode [ 458.928452][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 458.952114][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 458.994835][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 459.033112][ T314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.092833][T25303] device veth1_macvtap entered promiscuous mode [ 459.120626][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.128299][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.136250][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 459.192769][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 459.229921][ T1206] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 459.282894][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 459.291552][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 459.340898][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 459.364992][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 459.623701][T25406] Â: renamed from pim6reg1 [ 459.844855][T25429] syz-executor.4[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.844925][T25429] syz-executor.4[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.002464][T25429] device syzkaller0 entered promiscuous mode [ 460.270833][ T341] device bridge_slave_1 left promiscuous mode [ 460.280299][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.305170][ T341] device bridge_slave_0 left promiscuous mode [ 460.320837][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.335898][ T341] device veth1_macvtap left promiscuous mode [ 460.343732][ T341] device veth0_vlan left promiscuous mode [ 460.653157][T25434] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.663473][T25434] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.688821][T25434] device bridge_slave_0 entered promiscuous mode [ 460.758913][T25434] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.778262][T25434] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.811678][T25434] device bridge_slave_1 entered promiscuous mode [ 461.026910][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 461.048835][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 461.100379][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 461.108534][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 461.116705][T21343] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.123568][T21343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.158320][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 461.178990][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 461.208651][T21343] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.215571][T21343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.252769][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.272952][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.309869][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 461.353947][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 461.374523][T25434] device veth0_vlan entered promiscuous mode [ 461.381156][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.389182][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 461.396772][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.434108][T25434] device veth1_macvtap entered promiscuous mode [ 461.444383][ T4971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.460331][T25515] device bridge0 entered promiscuous mode [ 461.490129][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.503059][T21343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 06:35:28 SYZFATAL: executor 2 failed 11 times: executor 2: failed to write control pipe: write |1: broken pipe SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67