last executing test programs: 2.903319525s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sy\xf3net/ppv4\x00\xd4\xb4k\x83\xb5\xa1\xf1\xe9\x95\xca\xa6\xb6\x00s/sync_\x00le\xf44.\xdbx\xc0h\x11\xc3j\t\x12%\xd3a\xaf\xb7'}, 0x4f) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2222a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xa00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xa}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {0x7, 0x0, 0x0, 0x6}, {0x5, 0x0, 0x7, 0x2, 0x0, 0x2}, {0x18, 0x9, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) 2.525365143s ago: executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e030800dd5c980128856306008e02400000000000e2ff3b3a58ae02120000479618bad5f149bf18235ff34d2d9efa28ac30e147"], 0xffdd) (fail_nth: 2) 1.821054571s ago: executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea", 0x31}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f3757f0086dd6317ce800000000000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8943, &(0x7f0000000080)) 1.782828827s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="dc", 0x33fe0}], 0x1}, 0x4040) (fail_nth: 13) 1.779729787s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x11, 0x0, 0x0, 0x8, 0xbf, &(0x7f0000000800)=""/191, 0x0, 0x72, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x14, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300000000000085000000ba000000b7000000000000009500000500000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800e9ff000700001a000000d501d3cfe5cae316637dbca0d60000000000000000470f0ee45b7a61ab971ddc54ec276aa4220a28f7c950a088984f1bed9c1da3640c81328b2cf155af6074db9751a75f484f0b120088b777b67ce27f977fea3de21b08a98b", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x89f1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a00c600feff000000010000000000000001e455a5b2ad938f81415b79403a835a13880cf2bb6c0bd7b12d1a040d4242d4f940010f9fd004fb92a391da4725a53f62648aec67e09644bcfbed7e86193e976038acbc67a991ed654494044b3f9609ad5e90b3070081595e9fcfccf9"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.485290963s ago: executing program 0: bpf$MAP_CREATE(0x1d, &(0x7f0000000080)=@base={0x0, 0x0, 0xd00}, 0x48) 1.482446873s ago: executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r1}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0xff600000) 1.481793533s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r2, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r1, r4}, 0xc) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x1fffefff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.468445536s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sy\xf3net/ppv4\x00\xd4\xb4k\x83\xb5\xa1\xf1\xe9\x95\xca\xa6\xb6\x00s/sync_\x00le\xf44.\xdbx\xc0h\x11\xc3j\t\x12%\xd3a\xaf\xb7'}, 0x4f) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2222a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xa00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xa}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {0x7, 0x0, 0x0, 0x6}, {0x5, 0x0, 0x7, 0x2, 0x0, 0x2}, {0x18, 0x9, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) 1.451307168s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sy\xf3net/ppv4\x00\xd4\xb4k\x83\xb5\xa1\xf1\xe9\x95\xca\xa6\xb6\x00s/sync_\x00le\xf44.\xdbx\xc0h\x11\xc3j\t\x12%\xd3a\xaf\xb7'}, 0x4f) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2222a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xa00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xa}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {0x7, 0x0, 0x0, 0x6}, {0x5, 0x0, 0x7, 0x2, 0x0, 0x2}, {0x18, 0x9, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) 1.44149437s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r1}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x5, 0x2, 0x4}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='ext4_allocate_inode\x00', r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x1c, &(0x7f0000000040)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b707000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090800000000007baaf0ff00000000bd8900000000000007080000f8ffffffbfa400000000000007070000f0ffffffb70200000800000018220000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf2100000000000056070000a360bf46285efef7ab000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.221427793s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x0, 0x0) write$cgroup_pressure(r1, &(0x7f0000000180)={'full', 0x20, 0x4, 0x20, 0x6}, 0x2f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/147}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r4, &(0x7f0000000680)=0xb00, 0x12) 1.081922495s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001280), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000964776ff9746c768310000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0xffbf) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000023b7007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001780)=ANY=[@ANYRESDEC=r7, @ANYRESOCT=r2, @ANYRESOCT=r1, @ANYRES32=r7, @ANYRES64, @ANYBLOB="e936fdac2d4ebfb01e8de6451c87627be35f8e3edee8968bcb89f8e53a8d66f61fcbc367b5dab8da17522899092d2bddc03a14721fecc5d215b72438149b1c046cf3ac4a80bb574420fe316ba7727343467abc65170fc7c49226138b9486eeaeffd31079c7cd9ec52b6a4f912e6c7e83c405205944d371d8ae0dac8b67d071fa36ea3b30a77da55ed02d0100e3e1edb2690753d85e7e1af196747f4391718f94a2a624964278954b0e481081ab6068fe8ad4aa401f3f64ee811195f65889a71d39d6369e2144d8d94f4f82a85fbf28ecd0dba06204a773e5bf5913630b4a1daf583422adcaa44d", @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, r2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRES16=r1], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x8e, &(0x7f0000000200)=""/142}, 0x90) socketpair(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) syz_open_procfs$namespace(0x0, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x10, &(0x7f00000001c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@call={0x85, 0x0, 0x0, 0x50}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_request_inode\x00', r11}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) 618.796945ms ago: executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000002000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x72, 0xa8, &(0x7f00000001c0)="7bc4e5d9a640e4bffe2fceab3fb5dde8aa47074271d540c869fbdde486ea5788b78fbcb1f30d504c7b50ed180a522b759d4309ed6a45da3130ccec3200a328bd0f68129f89d6f43a3751a98c01d5d914bb071e509a8af533af2fe298c70692d2c9f86db9178e48d0e204e0bbf067c0cc366f", &(0x7f00000004c0)=""/168, 0xd381, 0x0, 0x89, 0x1000, &(0x7f0000000600)="1f415d762a77ce1a5da67a0ce1b775a3455117ca18d4ce64a93ccd93d488be66a062d1278f4cf6566f3f1b8d65a1e182e548ab6429bcc7a5577efee7156b0243f671007375c167847534a1bf2137c4072773f5f6913de6591faf88407823855d9002459557db7d15cf6f0a17d30c3a1205e1f3e02ea177ee371ead39b291074e67ac9df9ce11a0066d", &(0x7f0000000d00)="75675769b0fef2840a2cd1fa6999a255f1bd01b49cabcdbb5d05a86e82c73c351db188e4f9f735917a64567a844e467f4439379e3b7347daeed2320e9d90c3eeb1f4765af0328cd2bbf9dc5cbbef1814231b9e631de7457fd615fc50e11a95b0f0396ee733c0c6b787d382fbbe281bb4776c029cd3f9530295cc2a9f067c2066baf9ba0138692c99c632c0abc75cab23976e92924c05831bc1b246924db8efd856aa120d3b598a3c1a731e1f6932f629aa64ecadb5edcd67c6819ca4d695021bcd63871783da65942168f33fce78fb3d2c7c449af2457d8e76431c5c25da060219c9957bfeccef26a6331c5dc7fececd2f503fd9fe1e4e7a2f5fe096568522a4122421b581c7deb62c2f27d8e88b620f19bc6c025da7da0b3a1bf374ccd9f7cc581889d97f99884731fa9be325adce3a0e1904470077b07d398137f2bc24bfb88dafc1eba218089271f1224dc31bf9a1ce7f66f21ed60b3312a0b9da8c8a9a58ca000449ab2529b65416dd664cbfff1c9b47c22577ef72bac5d720fd4cab412607a2e2a0e0dce7bd486ffd5b6cf2af210ae3b6c9694b09b56fbb6df7fd71e8acf970824d996b551da6b7e6f5c12f51b7dfe97cdb05a912a2ca6243012349eee7916b31231c123376f0eff7cad2a68da230b2eca759e050900cef8251e64985ddf4a2208aeb090f956344a8c599f26ddb8bd82f36ddd0f37f729d8a8b9ce28b346f11d22522aa827836f6053814546c380f14671727823b547793b39d0d894a8446ddc39376529e6c4821741223541a70efdd761adcc42edf22ae0f6a5330c4a246482b0a28f358de1fb16f6e10695e724a95fd29983f11d6a411f890636f766f0926e817f0105a155fe49a22742edf8b16cbb4a0f478e087bbfc84602e88f41cce232cbc1dac81ec1f1b51a44c922b86603e411d1328b6d68f7a7d9beb2fe16015813da7fcf51dc4af4b1729e616850bc898d49f35dfea2c33a307c80f57df41f14dd1b09ccc6199754c5e01293ffe66549307041d6f15c8421b8ffd46f20d489ceab42510867917c2cc9b49ad916d1c4b86346c906f25d048a9d7f57e89cbc4869de66b8f680c0ef291bcf3be930c36985cbe8712ef1149fad39bdccd176f3a9b972cebf28c165cbc6bd3821509c777018b78b6d9f3e015af657d99ec2a563439855975e7cbebd5123e0cd66821fdf4f286222a28776d873eff47c5f3330d71966b4b7ef176f63d05cbeae01bc57e902b752945bfcb1b9531525866fb6cfa37a3a0a5333a7cbf118157e0aa0dfdc30336d26a2d34cd2aba6d560e0ec90b4ab935212ae3351bba28c7b2c740b6e5d1afe07c735c7d072830656826a4b3816e500ccde180c45e953e43100a54880f737b89b37348a00f862671964aaaad6b6605093633e8e1052d5d373f76fbeff613172b52b41d70193be8d22fc498ba963e668ccdd4ced7e68dcb872e9e9925cf40aaad0379ec15a20ad6713692e03cac7b9da1ca7fda9a45660238f19d6d825bbaa0ed873e86cb431c224b3ebdb9cc9ae6bb19211664bfe889435a572b178c5a06e20c69bb3745db4a5d729ccaa8b8f4556d05c5ab44d4abf0a37e43385c1a606b1d86fe8372002cca6dd0b968f86a654ac56eef099f985e3764b6a6657bbb15dce91519ba82f8695ce2c090c234dad1a0094c62dd93218cac496bddc41e77277d954e324bc22347f15e3abf432baf2d54dad5c893636cd81d8814ff8a9ad2930c841cc06dd6f8a5e5513bc77139dd7c2b419eb66f90f521fba542c23a963cd8f1c6434a54471098dbbdd8b5da622bd056299868f9b0138edeea34ea59aaae40a107fe616d0aaec212c06f8ff7aef0051032f87eb316b8763c8023d038bc203a12d031a9ce9d4aaf0ea81ec7eee45f8fa3568ba1ad4f0c445adfeee7886b4b39b631424e8ea6d4e5b9d1ec314da9a0571e8c7ff3d54b9f51e93def2f8f883cc42beec9c34cbd34e6f5ea77191f06738a9b06b5b3e976fe178887d9a43c7e0131dd4b50e7a5e2927973e6c9344052a61249166e6e8ea14de43e6e21cc662a55d8c692906e8c060b8f13ea49b3a3b8518598130099b13c391984f72a25a05ef12dbe7f50fe0e522e886d4fdb6c668606cccaaf24c1f4a853b8b766a81b727e36a07f621409e3a35e1fdb69fc50d003a1879127e76d2e8962cac0a3709ff59148fd7f37a50cc477b83cbe44525a8e0c2c1d90aed4e0e13268430055d179e47fbd64809ae56cc753253e9dad166d7be527863f1c066491b0a2770d45e795c3ddda73a7cea83fbf1e68472d2c0fb27f420189a043ff161d668d61b041008bcb7279e102cb8ff9dfeaedaa285b738210cb35b762ccb9499ee7039ae92ddb1486a2612d2a888ef339b4b91b39d4c5965d0818e7ecf76c664b65cb1bbccd3ef44bccacacf4567f2aa5d47c9842b10aec751f1fab46cb573bb261b1fb33912e8210be19bda31e12840cb168048755b1921d0ac43bf32c6f5a9da6b065ed24f540e8229ce2b5dfc9df43ed11af9b77f76a4f4d50d6aacbc4f29c05300a694747c16f482b1f1ce059333051d15429fb62b3cba4bf9cd855ff386f3150d6c4d343ddf4609f38a1ac6f42b7d9d84e943c1d42b2c1fbe9a61e5055fdbc7521e4df705104b7bd194c83665baba1487d35e5fac2f8efad319c4037a2f0d2ac47326117685d2e83a3919ea46d20cb28a0211fd1f83abc778913fb4a430f97612a2a4c2bab3e31064887937588e6e897114208f5c9f8e6310484b52a3c4246f914fa28bb4d02a842cf192e45fa0d1f4a84eda9ff8b9eeb24ca3873495575452666d631e19a74b1e44a9a0f8fa4f9e648a6e5aaab4e888348b4c358d1fbfa0bc9f18b60f9ed111e3ca1864313143c301f234cb65835938f34e5f8244e588191d1501ebc445e95a52616693a3a50f8a89543f5b3fbeb7ac0cec4331d7a0b6f6a6a564c53200312bcd27d1c28540d8b9ebabe259f40aa63fb2d6ae8c66e64ea0b928fb53c5790c1e8627b4bbb2834f95bdb518be0304155a53f4f4034f195e50e6c0920a585f05440ec2d68414cfc1aa90e6b8b84bca574894b1351657f869f890f29f6f398b577f820f724f967119734d6ffd841b9a69066b846648ef806388860a4572a9db9a7d35ad8d32df5e95aab8e26410ada3b900332e213194563609a81fac5ee35cafe17cc2796c86c284062ef4ec249b3f166aa69461753582e8bfc8131d4c1be31f0e9b1733d524c0bafb32602c651f757f629062999f3aa5f79074cdcf18aaba3013f3b283c784ef42dfe2a140129a9b97db4516ce2c175ecb2aaa3c8d523350ba9937d71e345a186bdd86ef1acfde63d0ed6f7c6a98b82f2b43b03a7e21ae029cdffdde34ab2a6b151fcbb2d06aca7a7dd12bf0c470fadc53929664598d3a19f8a80c55b2f9a6721e7b66395058358519513ddc483677abb2d6a7fd23ecf62b10614c2edc0c0a7376078d7a36513354b7773e1c616744f64cd0c56bade4893bd5e4e8005c9cae9a4a88106958a52ed95a85404f6180acfe6bb07f3c0885872386914a7c381b886662f893ba31a96e66f8675a1e023e10c7cc0a28d1a9aeef5f2236cf2f0da8cdb3e17230ec439ca8bb71822ee3629678e8f52a8c7212a819efa0038f92058deedb87fc38c3a86f016498e260a749c86cec33953650045e3c31d6a62ffeb7b72656ed3fa5189738072bd8ff24741cab5409b9186caf952a5ebf75c4a787e09bda0bf23d35f505e3a4f73b801e5d607980a2743234cd9ea4a0a3c4d032829468160a66dce6d5bf894be1b5f5844f879a9a5d78c520cafe825866a0d6891f9edd8750559e728a5727f7ac5ac337eaab32e259242f2078ce0bda4f734d9ef2d813ea848c0a95de19b0f8ae8639e9dc139bb60cfb2148b263a104341d695826d386507ea8fca727f4544fee7c1b428f928003e26f03eb23196b34c5d67a76dc5d98af2a3b196a1655b54958659dbb2567fd29314c777c766eed784328a72fac1631f50e83ae0cf092b05bd2ffe321a0d399d424e5300be5128bbbb14605b4da03d09af0e2629a1274af9d42ac8d3a8163fd4a0f16b552c264b31b263a74166859317c0f04fb888904b4afde22163731171b41c19c76fb051da09dd51b2f329214f568d37256d384e02930388f19e700beabb6e12501197437f2e9f68afddca283e1a3062b0fa43b8accf639441052e3b8570ca29415d8e0bbf52a847c48a17c95c59e0768efd200d3988648109f3e5363d2f03e27227eff6b53dae146929facd5ca1dc478515a990aa9362d855b35905d5b22034550f9db14fa7f504fb83a2e8bad0389e9ec7e21744ccfec3d1496e843a28efc0af075180adee12f4d4dae07c2169763b96cd0d52b8dc6d2c868f6913cc33050cef2ea157619d3d2643a5f59bc5c00472d78ea3d8e80e2a428a023b718249856fb1b3433c153fecf896bac483a31b13b7147a1966f1d6e9cb8595778fec22a6139917d9b311e944fd1a1a83cbf05f6c9bdc54a93641f1536c78bd68c5a81d19c68b8a6e7d31c6b16eeaf18aec7d502a420da29b0ac3f2eb2f5af71f95dd7eb5c1e87af4965e98c6bfdfb98338f82530eefda0adec450fc66049aa601e626781249adad70a5844c4b285321d2bb89dd571b1e082e88a73590e6dae2173760179689992c592b631fd6f40e6ad47de4ab87a1c7db40f30c96da1387a2e5617df627a91a554c2d4e9c3329dc076efc2e371b06a0de9ec8f38d77692729b1a378138294f21f44863fc1e43c209fca278d31d95d662ade79c5f85ffdb6b9f1e9c04e7f4b08abf398c346c92e9f7c715fb75ec360552189f91aac546d349104455362fda2fdce0083d7508743d8057daaf3c0ae0f3682005b8cf19422f3527bd6933aebf9c9ba5d2f1fd05b4c7c55da5cf572c40f02db2b87706f079429308cac01e42959739c9e63c76559370c07cb2ac9d6f0579710a3fe15c7ae72253cbf5ec153ff85dadf188f62361795472ccb074ef9fa792d228d99e5cccb651f63d07e727b02682492302162adb08eb37d65f8da6642963dd4a726119c53f756e2133b8a874f9d8ab887462d811322c4f438aaff856f178b1b38d4a396acc2682f7b31fc6c5e3d759039e293d4c409f8c3ff8bb14c9be3ff9b29edbc5d474f71b0fd155990872a57313fc8f926480837d5459efd4a285bc92a204068af83ddb577b013deb359c3d56d2c68ea39f9a20b3c631adcb71c5a73c2f99e4aaa28f04a793240db548fa0e95c081a3f6f55de825d1ed7d6da5854d3f738ee01c3f90b60336e0ef54c6ddf33369c8f864fe87330616abe5d3d55610b1a0babc2541db28e75068d452b0081c53241c2925599502a61fbc5459b11c4c07e3337a498fd936bd3874cd8eb62a320050599f4fcbb7a8dce2bb581269bec81d53e7f5015936000bcdb3de43684da45774a90a28d9a4f9f8a61a59e896719a8698ce8429395adc8c6ea5f2311cf1cb4fbc0cd20fecf0ff43aeaf51f43777c45a418e12834bbaefc100b6fa357d6250048c68cfd935145aa563ed1c0d1424f05a8344c6fc349dfbb1d36b38524f332b105576edc9bd95fd52473ee4ae9ca0aa274361fe6519310dbccdfdb3e6f5c1e79b84939503ee649800490cf82b4b1e5cbc7c5de128f5d1c887446df1656255100d7900c24dae28877e183255dc8acc300cd3fb73beaad1d0444a6ce115ad0433f0b9dd30c59a7f5b80c200a4df33a4713c58ddeb426789ca2a6388ef02194db7f2d9d53080fe579f946207cbfacea657e4b9c85f8fc90d4bb0a6a2d99a", 0x2, 0x0, 0x6}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa4a4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, 0x0, 0x0, 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='kfree\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) 535.982788ms ago: executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r0}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_write_pages\x00', r3}, 0x10) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_da_write_pages\x00', r3}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r4, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) (async) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r6}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r7}, 0x10) (async) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r7}, 0x10) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) (async) write$cgroup_int(r9, &(0x7f00000001c0), 0xfffffdef) 525.37249ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_fc_cleanup\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x640, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'veth1_to_bridge\x00', 0x800}) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x2, 0x8, 0xd0eb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 499.733834ms ago: executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) close(r0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x3, 0x2, 0x2, 0x4, 0xffffffffffffffff, 0x1f, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4, 0xb}, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='mm_page_alloc\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x7}, 0x0, 0x8000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xe) close(r3) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, 0x0, &(0x7f00000000c0)}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x7fffd, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000280)={r9, 0x0, &(0x7f0000000200)=""/76}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x6, 0xff, 0x0, 0x81, 0x0, 0x1, 0x48, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0xe8, 0x5}, 0x20, 0x1, 0x5, 0x6, 0x2, 0x0, 0xbc5, 0x0, 0x5, 0x0, 0x7fd}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)=@o_path={&(0x7f0000000480)='./file0\x00', r10}, 0x18) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xb, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r12}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f0000000200), 0x1, r12}, 0x38) 499.035304ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000600000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x5452, 0x20001439) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704fa0000000000850000000200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x79, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000001a000007020000f8ffffffb703000008000000b7040000000000008500000019001600950000000000000070226d75f4fa40716581999e4bc8a95baf26c677dfd5624f6a497cdf0add87f16542d4a9a9151319d4a8e9c7c0e3715d89c7831016fcb77196e81f9772e9a53ba7fc0e10a416486f2b2fcf7ab8efaa318e0d2bbd3ba5ed6c27bedf11438fb0441221f6a5b9b721717cf8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff02d}, {0x6}]}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x4, 0x8}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000080)={r6, &(0x7f0000000300), 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0xfb, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x8a, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x1f, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000026760000000000000700000018670000080000000000000006000000182b0000", @ANYRES32=r6, @ANYBLOB="000000000600000018200000", @ANYRES32, @ANYBLOB="0000000014000000b7080000000000007b8af8ff00000000b70800008f2300007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a50000000105020001f8ffff183a00000100000000000000000000007f7170000100000018120000", @ANYRES32=r0, @ANYBLOB="00000000000000b703060000000000850088000c000000b70000000000000095000000000000006f5275e53ac51eec2d69be1643067af3ad5f561c00"], &(0x7f00000003c0)='GPL\x00', 0x7, 0x2f, &(0x7f0000000400)=""/47, 0x41000, 0x1, '\x00', r8, 0x0, r4, 0x8, &(0x7f0000000840)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x5, 0x80000000, 0x3f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x90) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='percpu_alloc_percpu\x00'}, 0x10) 494.829505ms ago: executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @func_proto={0x0, 0x0, 0x0, 0x2}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000340)=""/4083, 0x44, 0xff3, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000900)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001780)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x3, 0x3}, 0x48) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f8500000004000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r4}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x10) (async) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5b, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) (async) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 493.990555ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000954541c31d5ad5556a5325a3af0b095324865de08697b526287edf6c002d3882084a7bcd89698ad0456959fc96c9f4e792842bb8f81fa98b17f47a3aff736ae7ddd90ed109a71a5fcbfdc34c88fc0b26366fc2bf486a6494cdb7f885ab1d284cfb6680dcd2fd0495ba4b47ec3da3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f00000004c0)="9402c93fc7b28e8f460eaa", 0x0, 0x0, 0x0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'veth0_to_bridge\x00', 0x800}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e03c203008c71ef288563"], 0xffdd) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040), &(0x7f0000000140)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa2000000000000070200000900ffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f00000001c0)='ext4_evict_inode\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="000007ccf183"}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000003c0)={'bridge_slave_1\x00', 0x2000}) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0xf, &(0x7f0000000040)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {0x85, 0x0, 0x0, 0xbb}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x11, 0x8, 0x81, 0x80, 0x0, 0x99a7, 0x14000, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x102300, 0x5, 0x5, 0x4, 0x0, 0x20, 0x1, 0x0, 0xfffffff8, 0x0, 0x7}, 0x0, 0x2, r4, 0x2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 477.793127ms ago: executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x7, 0x1421, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}, 0x0, 0x0, 0x45, 0x9, 0x100000001, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000000)) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x0, 0x0, 0x5}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000000)=0xc0400001040000, 0x400000) 427.698345ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000340)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3, 0x2, 0x2d, 0x14a2, r3, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x9}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3, 0x2, 0x2d, 0x14a2, r3, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x1, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r7}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{r5}, &(0x7f0000000780), &(0x7f00000007c0)='%pK \x00'}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) 412.593197ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/197) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000b00)=ANY=[@ANYRESDEC=r1, @ANYRES64, @ANYRESHEX=r1, @ANYRES8=r2, @ANYBLOB="d12c8f2b3ea5953238e3153cf38f7f1441d5004968a3d8b7391c2fb47a7a7e8bcf64ea3719f1e7713ff89ff48040e3a5b802471c1725c2d2320d966aee4cd3ad115def1f97d30ddbbff216ffb5b18b1fe78a5d899f18f87ca4809bd7d0d1f62f38dc34a9dbc79becb71dd07f1200a106c92ef3a0d285072b25de7f3535", @ANYRESDEC=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES16=r0], 0x1a000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500"], 0x0}, 0x90) write$cgroup_subtree(r2, &(0x7f0000000880)={[{0x2b, 'cpuacct'}, {0x2d, 'hugetlb'}, {0x3e25adb31a90ffeb, 'net_prio'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2d, 'devices'}, {0x0, 'rlimit'}, {0x71, 'cpuset'}]}, 0x47) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000000f800b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x1b, 0xf, &(0x7f00000004c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @map_val={0x18, 0x3, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @alu={0x4, 0x1, 0x9, 0x0, 0xa, 0xfffffffffffffff8, 0x1}], &(0x7f0000000280)='GPL\x00', 0x7fff, 0xd8, &(0x7f0000000540)=""/216, 0x40f00, 0x1a, '\x00', 0x0, 0x31, r0, 0x8, &(0x7f0000000800)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x7, 0x7f76, 0x1f}, 0x10, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000940)=[r3, r0, r2], &(0x7f00000009c0)=[{0x3, 0x2, 0xe, 0x3}, {0x4, 0x4, 0x8, 0x1}], 0x10, 0x7ff}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@generic={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6060, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 373.841383ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001180), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="180200000002000000000000000000008500000020000000181100", @ANYRES8=0x0], &(0x7f00000014c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xde, 0x91, 0x80, 0xff, 0x0, 0x8, 0x90008, 0x7, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f00000001c0), 0x2}, 0x14020, 0x5d, 0x0, 0x4, 0x4, 0x3f, 0x6, 0x0, 0x5, 0x0, 0x200}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001240)=ANY=[@ANYBLOB="9feb010018000000000000001000fa0f050000018000000000000000000000ef9b029800"/49], 0x0, 0x2d, 0x0, 0x1}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r7, 0x26}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xf, &(0x7f00000003c0)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa0000002}, {0x85, 0x0, 0x0, 0x2d}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r11, &(0x7f0000000200), 0x43400) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r8}, &(0x7f0000000000), &(0x7f0000000080)=r5}, 0x20) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 355.654386ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000000000000000037080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095be16865c8e1c504739156b69c4bcddbf355885466c6bbd92054f6ea0a36e4d0d3d0ee2fae5c4325b53c8134c62da2496303692fa571c940e0704d231d28e06eec095cb9b7c5a3dd1444267be8c4191476c183cd9dcfcd26ab105a4d389cc3880c0508120cba48741d567fa440ffacdc5c0d36748fb1a74379c73754eb753890ff096b25a434e945b4253244512e49a3388"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x18}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000030000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000f7008500000082000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, &(0x7f00000004c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='console\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='console\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0xb, 0x103ba, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000140)={r11, &(0x7f0000000000), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r11, &(0x7f0000000180), 0x0}, 0x20) ioctl$TUNSETOFFLOAD(r10, 0x40087602, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8922, &(0x7f0000000080)) 277.180558ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r2, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, &(0x7f00000002c0), 0x0}, 0x20) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140), 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r1, r4}, 0xc) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x1fffefff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 163.511545ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='cq_schedule\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x8, 0x1, 0x4, 0x1, 0x0, 0x1, 0xfffffffc}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x3}, 0x90) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffefb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xff7e}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000200)='ext4_journal_start\x00', r5}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001812000094da63f4ad67063339aba9f35730b1a684d56c62374a84fd98d3ebd6c666af64b7c5b5bbfa40f68640756ee844f9292a216e117263f411870ba4b5167b4e98eec54f9a420ef62e3684a7c2c1ebe82bc99f7d863df91c0b3d1e0716e41e1d2b98", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r8}, 0x10) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xe) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) getpid() (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r11}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') 76.526819ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x5, 0x7fe4, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='block_split\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43422) 69.99485ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1c0042, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="1e0308004d8c71ef288563"], 0xffdd) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_int(r7, &(0x7f0000000040), 0x12) write$cgroup_pid(r2, &(0x7f0000000000), 0xfdef) 0s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sy\xf3net/ppv4\x00\xd4\xb4k\x83\xb5\xa1\xf1\xe9\x95\xca\xa6\xb6\x00s/sync_\x00le\xf44.\xdbx\xc0h\x11\xc3j\t\x12%\xd3a\xaf\xb7'}, 0x4f) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2222a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xa00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0xa}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {0x7, 0x0, 0x0, 0x6}, {0x5, 0x0, 0x7, 0x2, 0x0, 0x2}, {0x18, 0x9, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) kernel console output (not intermixed with test programs): G_RAX: 0000000000000001 [ 90.269290][ T3771] RAX: ffffffffffffffda RBX: 00007f036f5b3f80 RCX: 00007f036f47d0a9 [ 90.269302][ T3771] RDX: 000000000000004e RSI: 0000000020000000 RDI: 00000000000000c8 [ 90.269313][ T3771] RBP: 00007f03702cf120 R08: 0000000000000000 R09: 0000000000000000 [ 90.269322][ T3771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.269331][ T3771] R13: 000000000000000b R14: 00007f036f5b3f80 R15: 00007ffd511fb408 [ 90.269346][ T3771] [ 90.331923][ T3780] syz-executor.3[3780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.650999][ T3882] fscrypt: sda1: filesystem not mounted with inlinecrypt [ 91.650999][ T3882] [ 91.687097][ T3879] syz-executor.3[3879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.689250][ T3879] syz-executor.3[3879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.070911][ T28] audit: type=1400 audit(1719119338.416:135): avc: denied { write } for pid=3959 comm="syz-executor.4" name="task" dev="proc" ino=26269 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 93.126021][ T28] audit: type=1400 audit(1719119338.416:136): avc: denied { add_name } for pid=3959 comm="syz-executor.4" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 93.156138][ T28] audit: type=1400 audit(1719119338.416:137): avc: denied { create } for pid=3959 comm="syz-executor.4" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 93.186058][ T28] audit: type=1400 audit(1719119338.416:138): avc: denied { associate } for pid=3959 comm="syz-executor.4" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.448357][ T4012] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 93.851149][ T28] audit: type=1400 audit(1719119339.196:139): avc: denied { create } for pid=4046 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 94.466802][ T28] audit: type=1400 audit(1719119339.806:140): avc: denied { create } for pid=4094 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 94.654022][ T4112] FAULT_INJECTION: forcing a failure. [ 94.654022][ T4112] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 94.776671][ T4112] CPU: 0 PID: 4112 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 94.786577][ T4112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 94.796494][ T4112] Call Trace: [ 94.799679][ T4112] [ 94.802469][ T4112] dump_stack_lvl+0x151/0x1b7 [ 94.807060][ T4112] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 94.812354][ T4112] dump_stack+0x15/0x1b [ 94.816354][ T4112] should_fail_ex+0x3d0/0x520 [ 94.820860][ T4112] should_fail_alloc_page+0x68/0x90 [ 94.825894][ T4112] __alloc_pages+0x1f4/0x780 [ 94.830321][ T4112] ? prep_new_page+0x110/0x110 [ 94.834919][ T4112] ? xas_start+0x333/0x3f0 [ 94.839172][ T4112] ? xas_load+0x38f/0x3b0 [ 94.843340][ T4112] __folio_alloc+0x15/0x40 [ 94.847589][ T4112] __filemap_get_folio+0x827/0xae0 [ 94.852540][ T4112] ? page_cache_prev_miss+0x410/0x410 [ 94.857747][ T4112] ? asm_exc_page_fault+0x27/0x30 [ 94.862614][ T4112] pagecache_get_page+0x2f/0x110 [ 94.867378][ T4112] grab_cache_page_write_begin+0x42/0x60 [ 94.872847][ T4112] ext4_da_write_begin+0x4f3/0x920 [ 94.877797][ T4112] ? ext4_dirty_folio+0xf0/0xf0 [ 94.882480][ T4112] generic_perform_write+0x2f9/0x5c0 [ 94.887607][ T4112] ? generic_file_direct_write+0x6b0/0x6b0 [ 94.893241][ T4112] ? generic_write_checks_count+0x490/0x490 [ 94.898969][ T4112] ? kstrtouint+0xf6/0x180 [ 94.903230][ T4112] ext4_buffered_write_iter+0x360/0x640 [ 94.908606][ T4112] ext4_file_write_iter+0x194/0x1570 [ 94.913724][ T4112] ? irqentry_exit+0x30/0x40 [ 94.918149][ T4112] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 94.923791][ T4112] ? avc_policy_seqno+0x1b/0x70 [ 94.928476][ T4112] ? ext4_file_read_iter+0x470/0x470 [ 94.933597][ T4112] ? fsnotify_perm+0x6a/0x5d0 [ 94.938112][ T4112] vfs_write+0x902/0xeb0 [ 94.942194][ T4112] ? file_end_write+0x1c0/0x1c0 [ 94.946965][ T4112] ? mutex_lock+0xb1/0x1e0 [ 94.951217][ T4112] ? bit_wait_io_timeout+0x120/0x120 [ 94.956349][ T4112] ? __fdget_pos+0x2e2/0x390 [ 94.960856][ T4112] ? ksys_write+0x77/0x2c0 [ 94.965103][ T4112] ksys_write+0x199/0x2c0 [ 94.969272][ T4112] ? __ia32_sys_read+0x90/0x90 [ 94.973868][ T4112] ? debug_smp_processor_id+0x17/0x20 [ 94.979210][ T4112] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 94.985102][ T4112] __x64_sys_write+0x7b/0x90 [ 94.989634][ T4112] do_syscall_64+0x3d/0xb0 [ 94.993954][ T4112] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 94.999682][ T4112] RIP: 0033:0x7f036f47d0a9 [ 95.003936][ T4112] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 95.023387][ T4112] RSP: 002b:00007f03702cf0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 95.031619][ T4112] RAX: ffffffffffffffda RBX: 00007f036f5b3f80 RCX: 00007f036f47d0a9 [ 95.039431][ T4112] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000007 [ 95.047257][ T4112] RBP: 00007f03702cf120 R08: 0000000000000000 R09: 0000000000000000 [ 95.055055][ T4112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.063020][ T4112] R13: 000000000000000b R14: 00007f036f5b3f80 R15: 00007ffd511fb408 [ 95.070772][ T4112] [ 95.199769][ T4119] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 95.398333][ T28] audit: type=1400 audit(1719119340.736:141): avc: denied { setopt } for pid=4160 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 97.264167][ T28] audit: type=1400 audit(1719119342.606:142): avc: denied { read } for pid=4226 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 97.351084][ T28] audit: type=1400 audit(1719119342.656:143): avc: denied { write } for pid=4226 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 97.752043][ T4248] syz-executor.4[4248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.752110][ T4248] syz-executor.4[4248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.149383][ T4264] syz-executor.3[4264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.202334][ T4264] syz-executor.3[4264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.298297][ T4264] device veth0_vlan left promiscuous mode [ 98.438802][ T4264] device veth0_vlan entered promiscuous mode [ 98.654652][ T4313] device pim6reg1 entered promiscuous mode [ 99.509777][ T4383] device sit0 entered promiscuous mode [ 99.979900][ T4422] device pim6reg1 entered promiscuous mode [ 102.170754][ T28] audit: type=1400 audit(1719119347.506:144): avc: denied { create } for pid=4484 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 103.007211][ T28] audit: type=1400 audit(1719119348.346:145): avc: denied { attach_queue } for pid=4548 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 103.601288][ T4597] syz-executor.1[4597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.601358][ T4597] syz-executor.1[4597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.831072][ T4599] device bridge_slave_1 left promiscuous mode [ 103.861346][ T4599] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.923360][ T4599] device bridge_slave_0 left promiscuous mode [ 103.934762][ T4599] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.146672][ T4651] FAULT_INJECTION: forcing a failure. [ 104.146672][ T4651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 104.193195][ T4651] CPU: 0 PID: 4651 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 104.203192][ T4651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 104.213076][ T4651] Call Trace: [ 104.216203][ T4651] [ 104.218979][ T4651] dump_stack_lvl+0x151/0x1b7 [ 104.223497][ T4651] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 104.228873][ T4651] ? migrate_enable+0x1cb/0x2b0 [ 104.233558][ T4651] dump_stack+0x15/0x1b [ 104.237559][ T4651] should_fail_ex+0x3d0/0x520 [ 104.242064][ T4651] should_fail+0xb/0x10 [ 104.246057][ T4651] should_fail_usercopy+0x1a/0x20 [ 104.250915][ T4651] _copy_from_user+0x1e/0xc0 [ 104.255432][ T4651] generic_map_update_batch+0x4d9/0x8c0 [ 104.260899][ T4651] ? generic_map_delete_batch+0x5c0/0x5c0 [ 104.266452][ T4651] ? generic_map_delete_batch+0x5c0/0x5c0 [ 104.272006][ T4651] bpf_map_do_batch+0x4cc/0x630 [ 104.276693][ T4651] __sys_bpf+0x66b/0x7f0 [ 104.280867][ T4651] ? __this_cpu_preempt_check+0x13/0x20 [ 104.286242][ T4651] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 104.291449][ T4651] ? __kasan_check_write+0x14/0x20 [ 104.296396][ T4651] ? fpregs_restore_userregs+0x130/0x290 [ 104.301863][ T4651] __x64_sys_bpf+0x7c/0x90 [ 104.306144][ T4651] do_syscall_64+0x3d/0xb0 [ 104.310369][ T4651] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 104.316012][ T4651] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 104.321739][ T4651] RIP: 0033:0x7fcfa467d0a9 [ 104.326076][ T4651] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 104.345702][ T4651] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 104.353941][ T4651] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 104.361749][ T4651] RDX: 0000000000000038 RSI: 0000000020000300 RDI: 000000000000001a [ 104.369559][ T4651] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 104.377373][ T4651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.385182][ T4651] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 104.393002][ T4651] [ 104.512146][ T4681] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 104.558480][ T4683] syz-executor.4[4683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.558957][ T4683] syz-executor.4[4683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.649263][ T4683] syz-executor.4[4683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.703120][ T4694] syz-executor.4[4694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.773259][ T4709] device syzkaller0 entered promiscuous mode [ 105.842095][ T4776] device syzkaller0 entered promiscuous mode [ 106.230435][ T4821] syz-executor.0[4821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.230508][ T4821] syz-executor.0[4821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.258097][ T4821] syz-executor.0[4821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.274173][ T4821] syz-executor.0[4821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.510577][ T4837] device syzkaller0 entered promiscuous mode [ 106.546976][ T4838] device syzkaller0 entered promiscuous mode [ 106.589579][ T4841] FAULT_INJECTION: forcing a failure. [ 106.589579][ T4841] name failslab, interval 1, probability 0, space 0, times 0 [ 106.602271][ T4841] CPU: 0 PID: 4841 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 106.612236][ T4841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 106.622239][ T4841] Call Trace: [ 106.625340][ T4841] [ 106.628122][ T4841] dump_stack_lvl+0x151/0x1b7 [ 106.632980][ T4841] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.638372][ T4841] dump_stack+0x15/0x1b [ 106.642364][ T4841] should_fail_ex+0x3d0/0x520 [ 106.647049][ T4841] ? ext4_alloc_io_end_vec+0x2a/0x170 [ 106.652509][ T4841] __should_failslab+0xaf/0xf0 [ 106.657114][ T4841] should_failslab+0x9/0x20 [ 106.661448][ T4841] kmem_cache_alloc+0x3b/0x2c0 [ 106.666047][ T4841] ext4_alloc_io_end_vec+0x2a/0x170 [ 106.671083][ T4841] ext4_writepages+0x13b4/0x3fd0 [ 106.675859][ T4841] ? stack_trace_snprint+0xf0/0xf0 [ 106.680804][ T4841] ? ext4_read_folio+0x240/0x240 [ 106.686016][ T4841] ? __stack_depot_save+0x36/0x480 [ 106.691072][ T4841] ? 0xffffffffa00007e0 [ 106.695061][ T4841] ? kernel_text_address+0xa9/0xe0 [ 106.700276][ T4841] ? __kernel_text_address+0xd/0x40 [ 106.705303][ T4841] ? ext4_read_folio+0x240/0x240 [ 106.710078][ T4841] do_writepages+0x385/0x620 [ 106.714604][ T4841] ? __writepage+0x130/0x130 [ 106.719029][ T4841] ? __kasan_check_write+0x14/0x20 [ 106.724083][ T4841] ? _raw_spin_lock+0xa4/0x1b0 [ 106.728687][ T4841] ? _raw_spin_unlock+0x4c/0x70 [ 106.733365][ T4841] ? sched_clock+0x9/0x10 [ 106.737531][ T4841] ? sched_clock_cpu+0x71/0x2b0 [ 106.742217][ T4841] filemap_fdatawrite_wbc+0x153/0x1b0 [ 106.747562][ T4841] filemap_write_and_wait_range+0x1a4/0x290 [ 106.753290][ T4841] ? read_word_at_a_time+0x12/0x20 [ 106.758223][ T4841] ? filemap_range_has_writeback+0x620/0x620 [ 106.764037][ T4841] ? __kasan_check_write+0x14/0x20 [ 106.768985][ T4841] ? ext4_convert_inline_data+0x1cf/0x610 [ 106.774537][ T4841] ? rwsem_write_trylock+0x15b/0x290 [ 106.779656][ T4841] ? post_alloc_hook+0x213/0x220 [ 106.784432][ T4841] ext4_punch_hole+0x11f/0xc00 [ 106.789040][ T4841] ext4_fallocate+0x318/0x1e90 [ 106.793630][ T4841] ? avc_policy_seqno+0x1b/0x70 [ 106.798317][ T4841] ? selinux_file_permission+0x2bb/0x560 [ 106.803785][ T4841] ? ext4_ext_truncate+0x320/0x320 [ 106.808733][ T4841] ? fsnotify_perm+0x6a/0x5d0 [ 106.813247][ T4841] vfs_fallocate+0x492/0x570 [ 106.817674][ T4841] do_vfs_ioctl+0x2150/0x29a0 [ 106.822183][ T4841] ? kstrtouint_from_user+0x124/0x180 [ 106.827393][ T4841] ? __x64_compat_sys_ioctl+0x90/0x90 [ 106.832600][ T4841] ? kstrtol_from_user+0x180/0x180 [ 106.837548][ T4841] ? __kasan_check_write+0x14/0x20 [ 106.842494][ T4841] ? ioctl_has_perm+0x1f8/0x560 [ 106.847183][ T4841] ? ioctl_has_perm+0x3f0/0x560 [ 106.851872][ T4841] ? has_cap_mac_admin+0x3c0/0x3c0 [ 106.856811][ T4841] ? vfs_write+0xbb3/0xeb0 [ 106.861074][ T4841] ? selinux_file_ioctl+0x3cc/0x540 [ 106.866103][ T4841] ? __mutex_lock_slowpath+0x10/0x10 [ 106.871230][ T4841] ? selinux_file_alloc_security+0x120/0x120 [ 106.877042][ T4841] ? __fget_files+0x2cb/0x330 [ 106.881551][ T4841] ? security_file_ioctl+0x84/0xb0 [ 106.886497][ T4841] __se_sys_ioctl+0x99/0x190 [ 106.890928][ T4841] __x64_sys_ioctl+0x7b/0x90 [ 106.895349][ T4841] do_syscall_64+0x3d/0xb0 [ 106.899603][ T4841] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.905329][ T4841] RIP: 0033:0x7f3ce427d0a9 [ 106.909593][ T4841] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 106.929114][ T4841] RSP: 002b:00007f3ce508d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.937362][ T4841] RAX: ffffffffffffffda RBX: 00007f3ce43b3f80 RCX: 00007f3ce427d0a9 [ 106.945169][ T4841] RDX: 0000000020000280 RSI: 000000004030582b RDI: 0000000000000006 [ 106.952980][ T4841] RBP: 00007f3ce508d120 R08: 0000000000000000 R09: 0000000000000000 [ 106.960878][ T4841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.968690][ T4841] R13: 000000000000000b R14: 00007f3ce43b3f80 R15: 00007ffc5dc5e8d8 [ 106.976508][ T4841] [ 108.132859][ T4933] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 65531 (only 8 groups) [ 110.510213][ T28] audit: type=1400 audit(1719119355.856:146): avc: denied { create } for pid=5051 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 110.537283][ T5057] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.544331][ T5057] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.565636][ T5057] device bridge_slave_1 left promiscuous mode [ 110.574039][ T5057] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.581695][ T5057] device bridge_slave_0 left promiscuous mode [ 110.587808][ T5057] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.764448][ T5090] device sit0 left promiscuous mode [ 110.903374][ T5117] device pim6reg1 entered promiscuous mode [ 111.116713][ T5144] device veth1_macvtap left promiscuous mode [ 111.127327][ T5144] device macsec0 left promiscuous mode [ 111.252969][ T5147] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 111.299277][ T5145] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.306343][ T5145] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.313878][ T5145] device bridge_slave_0 entered promiscuous mode [ 111.321437][ T5145] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.328543][ T5145] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.336170][ T5145] device bridge_slave_1 entered promiscuous mode [ 111.408188][ T5161] FAULT_INJECTION: forcing a failure. [ 111.408188][ T5161] name failslab, interval 1, probability 0, space 0, times 0 [ 111.421296][ T5161] CPU: 1 PID: 5161 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 111.431261][ T5161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 111.441452][ T5161] Call Trace: [ 111.444543][ T5161] [ 111.447318][ T5161] dump_stack_lvl+0x151/0x1b7 [ 111.451835][ T5161] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.457126][ T5161] ? memset+0x35/0x40 [ 111.461031][ T5161] ? __es_remove_extent+0x310/0x1f60 [ 111.466245][ T5161] dump_stack+0x15/0x1b [ 111.470231][ T5161] should_fail_ex+0x3d0/0x520 [ 111.474744][ T5161] ? __es_insert_extent+0x72a/0x17c0 [ 111.479868][ T5161] __should_failslab+0xaf/0xf0 [ 111.484582][ T5161] should_failslab+0x9/0x20 [ 111.488930][ T5161] kmem_cache_alloc+0x3b/0x2c0 [ 111.493534][ T5161] __es_insert_extent+0x72a/0x17c0 [ 111.498557][ T5161] ? _raw_write_lock+0xa4/0x170 [ 111.503244][ T5161] ? _raw_write_trylock+0x1a0/0x1a0 [ 111.508281][ T5161] ext4_es_insert_extent+0x5a2/0x2ff0 [ 111.513485][ T5161] ? ext4_es_scan_clu+0x340/0x340 [ 111.518344][ T5161] ? __traceiter_ext4_es_find_extent_range_exit+0xa9/0xd0 [ 111.525289][ T5161] ? ext4_es_find_extent_range+0x2f6/0x320 [ 111.530926][ T5161] ? trace_ext4_ext_convert_to_initialized_fastpath+0x160/0x160 [ 111.538391][ T5161] ext4_ext_map_blocks+0x23dd/0x71e0 [ 111.543514][ T5161] ? __kasan_check_read+0x11/0x20 [ 111.548374][ T5161] ? ext4_ext_release+0x10/0x10 [ 111.553170][ T5161] ? down_read+0xbc4/0x14c0 [ 111.557511][ T5161] ? __down_common+0x690/0x690 [ 111.562114][ T5161] ? ext4_mark_iloc_dirty+0x170b/0x1970 [ 111.567496][ T5161] ? _raw_read_unlock+0x25/0x40 [ 111.572180][ T5161] ? ext4_es_lookup_extent+0x33b/0x950 [ 111.577475][ T5161] ext4_map_blocks+0x3ff/0x1ca0 [ 111.582163][ T5161] ? ext4_issue_zeroout+0x250/0x250 [ 111.587194][ T5161] ? __kasan_check_write+0x14/0x20 [ 111.592141][ T5161] ? __brelse+0x5b/0x90 [ 111.596390][ T5161] ext4_append+0x243/0x5b0 [ 111.600648][ T5161] ? ext4_init_new_dir+0x620/0x620 [ 111.605596][ T5161] ext4_init_new_dir+0x33f/0x620 [ 111.610369][ T5161] ? ext4_init_dot_dotdot+0x5d0/0x5d0 [ 111.615576][ T5161] ext4_mkdir+0x4f2/0xce0 [ 111.619740][ T5161] ? ext4_symlink+0xc10/0xc10 [ 111.624264][ T5161] ? selinux_inode_mkdir+0x22/0x30 [ 111.629387][ T5161] ? security_inode_mkdir+0xbc/0x100 [ 111.634530][ T5161] vfs_mkdir+0x398/0x570 [ 111.638577][ T5161] do_mkdirat+0x1eb/0x450 [ 111.642752][ T5161] ? vfs_mkdir+0x570/0x570 [ 111.647094][ T5161] ? getname_flags+0x1fd/0x520 [ 111.651777][ T5161] __x64_sys_mkdir+0x6e/0x80 [ 111.656209][ T5161] do_syscall_64+0x3d/0xb0 [ 111.660484][ T5161] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.666185][ T5161] RIP: 0033:0x7fcbe887d0a9 [ 111.670446][ T5161] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 111.691452][ T5161] RSP: 002b:00007fcbe96300c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 111.699860][ T5161] RAX: ffffffffffffffda RBX: 00007fcbe89b3f80 RCX: 00007fcbe887d0a9 [ 111.707701][ T5161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 111.715668][ T5161] RBP: 00007fcbe9630120 R08: 0000000000000000 R09: 0000000000000000 [ 111.724020][ T5161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.732115][ T5161] R13: 000000000000000b R14: 00007fcbe89b3f80 R15: 00007ffd608451f8 [ 111.740186][ T5161] [ 111.856811][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.865694][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.887392][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.906401][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.923616][ T4232] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.930541][ T4232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.946970][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.956316][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.966171][ T4232] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.973238][ T4232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.980619][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.989391][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.997386][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 112.005511][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.022156][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.030601][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.041317][ T5145] device veth0_vlan entered promiscuous mode [ 112.053653][ T5145] device veth1_macvtap entered promiscuous mode [ 112.063973][ T1389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.074089][ T1389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.081978][ T1389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.089975][ T1389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.128227][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.139797][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.156923][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.180641][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 112.270313][ T4656] device bridge_slave_1 left promiscuous mode [ 112.277406][ T4656] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.297777][ T4656] device bridge_slave_0 left promiscuous mode [ 112.310357][ T4656] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.327268][ T4656] device veth1_macvtap left promiscuous mode [ 112.338857][ T4656] device veth0_vlan left promiscuous mode [ 112.911044][ T5245] syz-executor.0[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.911116][ T5245] syz-executor.0[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.957052][ T5243] FAULT_INJECTION: forcing a failure. [ 112.957052][ T5243] name failslab, interval 1, probability 0, space 0, times 0 [ 113.009229][ T5243] CPU: 1 PID: 5243 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 113.019488][ T5243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 113.029386][ T5243] Call Trace: [ 113.032499][ T5243] [ 113.035278][ T5243] dump_stack_lvl+0x151/0x1b7 [ 113.039793][ T5243] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 113.045090][ T5243] ? stack_trace_save+0x113/0x1c0 [ 113.050038][ T5243] dump_stack+0x15/0x1b [ 113.054207][ T5243] should_fail_ex+0x3d0/0x520 [ 113.058715][ T5243] ? __iomap_dio_rw+0x320/0x20a0 [ 113.063497][ T5243] __should_failslab+0xaf/0xf0 [ 113.068113][ T5243] should_failslab+0x9/0x20 [ 113.072426][ T5243] __kmem_cache_alloc_node+0x3d/0x250 [ 113.077635][ T5243] ? __kasan_slab_free+0x11/0x20 [ 113.082409][ T5243] ? jbd2_journal_stop+0x82c/0xc70 [ 113.087392][ T5243] ? __ext4_journal_stop+0x111/0x1c0 [ 113.092481][ T5243] ? __iomap_dio_rw+0x320/0x20a0 [ 113.097249][ T5243] kmalloc_trace+0x2a/0xa0 [ 113.101511][ T5243] __iomap_dio_rw+0x320/0x20a0 [ 113.106128][ T5243] ? debug_smp_processor_id+0x17/0x20 [ 113.111316][ T5243] ? iomap_dio_complete_work+0x70/0x70 [ 113.116608][ T5243] ? jbd2_journal_stop+0x82c/0xc70 [ 113.121555][ T5243] ? jbd2_journal_start_reserved+0x410/0x410 [ 113.127982][ T5243] ? ext4_fc_replay_link_internal+0x340/0x340 [ 113.133882][ T5243] iomap_dio_rw+0x41/0x90 [ 113.138042][ T5243] ext4_file_write_iter+0x11a5/0x1570 [ 113.143353][ T5243] ? ext4_file_write_iter+0x761/0x1570 [ 113.148722][ T5243] ? ext4_file_read_iter+0x470/0x470 [ 113.153840][ T5243] ? fsnotify_perm+0x6a/0x5d0 [ 113.158354][ T5243] vfs_write+0x902/0xeb0 [ 113.162448][ T5243] ? file_end_write+0x1c0/0x1c0 [ 113.167208][ T5243] ? mutex_lock+0xb1/0x1e0 [ 113.171461][ T5243] ? bit_wait_io_timeout+0x120/0x120 [ 113.176681][ T5243] ? __fdget_pos+0x2e2/0x390 [ 113.181109][ T5243] ? ksys_write+0x77/0x2c0 [ 113.185357][ T5243] ksys_write+0x199/0x2c0 [ 113.189609][ T5243] ? __ia32_sys_read+0x90/0x90 [ 113.194320][ T5243] ? debug_smp_processor_id+0x17/0x20 [ 113.199840][ T5243] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 113.205837][ T5243] __x64_sys_write+0x7b/0x90 [ 113.211403][ T5243] do_syscall_64+0x3d/0xb0 [ 113.217260][ T5243] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.223174][ T5243] RIP: 0033:0x7fb7c4c7d0a9 [ 113.227534][ T5243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 113.248180][ T5243] RSP: 002b:00007fb7c599b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 113.256764][ T5243] RAX: ffffffffffffffda RBX: 00007fb7c4db3f80 RCX: 00007fb7c4c7d0a9 [ 113.264571][ T5243] RDX: 0000000000043400 RSI: 0000000020000200 RDI: 0000000000000009 [ 113.272384][ T5243] RBP: 00007fb7c599b120 R08: 0000000000000000 R09: 0000000000000000 [ 113.280291][ T5243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.288090][ T5243] R13: 000000000000000b R14: 00007fb7c4db3f80 R15: 00007ffcbe536fd8 [ 113.295997][ T5243] [ 113.304184][ T5245] syz-executor.0[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.304263][ T5245] syz-executor.0[5245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.332119][ T5250] FAULT_INJECTION: forcing a failure. [ 113.332119][ T5250] name failslab, interval 1, probability 0, space 0, times 0 [ 113.359994][ T5250] CPU: 0 PID: 5250 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 113.369890][ T5250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 113.379786][ T5250] Call Trace: [ 113.382908][ T5250] [ 113.385686][ T5250] dump_stack_lvl+0x151/0x1b7 [ 113.390201][ T5250] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 113.395494][ T5250] ? kasan_quarantine_put+0x34/0x1a0 [ 113.400629][ T5250] ? ext4_release_io_end+0x282/0x2d0 [ 113.405732][ T5250] dump_stack+0x15/0x1b [ 113.410249][ T5250] should_fail_ex+0x3d0/0x520 [ 113.414850][ T5250] ? ext4_init_io_end+0x29/0x120 [ 113.419793][ T5250] __should_failslab+0xaf/0xf0 [ 113.424482][ T5250] should_failslab+0x9/0x20 [ 113.429014][ T5250] kmem_cache_alloc+0x3b/0x2c0 [ 113.434228][ T5250] ext4_init_io_end+0x29/0x120 [ 113.438830][ T5250] ext4_writepages+0xe5f/0x3fd0 [ 113.443521][ T5250] ? __kasan_slab_free+0x11/0x20 [ 113.448310][ T5250] ? generic_write_end+0x202/0x300 [ 113.453339][ T5250] ? ksys_write+0x199/0x2c0 [ 113.457661][ T5250] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.463652][ T5250] ? ext4_read_folio+0x240/0x240 [ 113.468431][ T5250] ? __kasan_check_write+0x14/0x20 [ 113.473373][ T5250] ? jbd2_journal_stop+0x82c/0xc70 [ 113.478319][ T5250] ? ext4_read_folio+0x240/0x240 [ 113.483544][ T5250] do_writepages+0x385/0x620 [ 113.487954][ T5250] ? __writepage+0x130/0x130 [ 113.492381][ T5250] ? __kasan_check_write+0x14/0x20 [ 113.497603][ T5250] ? __kasan_check_write+0x14/0x20 [ 113.502549][ T5250] ? _raw_spin_lock+0xa4/0x1b0 [ 113.507153][ T5250] ? _raw_spin_unlock+0x4c/0x70 [ 113.511960][ T5250] ? __mark_inode_dirty+0x54e/0xa60 [ 113.516957][ T5250] filemap_fdatawrite_wbc+0x153/0x1b0 [ 113.522252][ T5250] file_write_and_wait_range+0x1ca/0x2b0 [ 113.527721][ T5250] ? __filemap_set_wb_err+0x130/0x130 [ 113.532936][ T5250] ? bpf_trace_run2+0x138/0x290 [ 113.537613][ T5250] ? generic_perform_write+0x520/0x5c0 [ 113.542996][ T5250] ext4_sync_file+0x1a2/0xa50 [ 113.547512][ T5250] vfs_fsync_range+0x17b/0x190 [ 113.552208][ T5250] ext4_buffered_write_iter+0x587/0x640 [ 113.557749][ T5250] ext4_file_write_iter+0x194/0x1570 [ 113.562872][ T5250] ? cgroup_rstat_updated+0xe5/0x370 [ 113.568000][ T5250] ? __alloc_pages+0x3a1/0x780 [ 113.572590][ T5250] ? avc_policy_seqno+0x1b/0x70 [ 113.577284][ T5250] ? ext4_file_read_iter+0x470/0x470 [ 113.582397][ T5250] ? fsnotify_perm+0x6a/0x5d0 [ 113.586909][ T5250] vfs_write+0x902/0xeb0 [ 113.590991][ T5250] ? file_end_write+0x1c0/0x1c0 [ 113.595673][ T5250] ? mutex_lock+0xb1/0x1e0 [ 113.599928][ T5250] ? bit_wait_io_timeout+0x120/0x120 [ 113.605052][ T5250] ? __fdget_pos+0x2e2/0x390 [ 113.609474][ T5250] ? ksys_write+0x77/0x2c0 [ 113.613729][ T5250] ksys_write+0x199/0x2c0 [ 113.617893][ T5250] ? __ia32_sys_read+0x90/0x90 [ 113.622514][ T5250] ? debug_smp_processor_id+0x17/0x20 [ 113.627700][ T5250] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 113.633703][ T5250] __x64_sys_write+0x7b/0x90 [ 113.638119][ T5250] do_syscall_64+0x3d/0xb0 [ 113.642387][ T5250] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 113.648097][ T5250] RIP: 0033:0x7fb7c4c7d0a9 [ 113.652348][ T5250] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 113.671883][ T5250] RSP: 002b:00007fb7c599b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 113.680122][ T5250] RAX: ffffffffffffffda RBX: 00007fb7c4db3f80 RCX: 00007fb7c4c7d0a9 [ 113.687932][ T5250] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000005 [ 113.695834][ T5250] RBP: 00007fb7c599b120 R08: 0000000000000000 R09: 0000000000000000 [ 113.703644][ T5250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.711462][ T5250] R13: 000000000000000b R14: 00007fb7c4db3f80 R15: 00007ffcbe536fd8 [ 113.719283][ T5250] [ 114.162085][ T5316] device veth0_vlan left promiscuous mode [ 114.181070][ T5316] device veth0_vlan entered promiscuous mode [ 114.193574][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.206245][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.236500][ T4232] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.346026][ T5341] device veth1_macvtap left promiscuous mode [ 114.362615][ T5341] device macsec0 entered promiscuous mode [ 114.406753][ T5341] device veth1_macvtap entered promiscuous mode [ 114.919803][ T5362] device veth0_vlan left promiscuous mode [ 114.949846][ T5362] device veth0_vlan entered promiscuous mode [ 115.190440][ T5409] FAULT_INJECTION: forcing a failure. [ 115.190440][ T5409] name failslab, interval 1, probability 0, space 0, times 0 [ 115.203593][ T5409] CPU: 1 PID: 5409 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 115.213676][ T5409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 115.223723][ T5409] Call Trace: [ 115.226842][ T5409] [ 115.229623][ T5409] dump_stack_lvl+0x151/0x1b7 [ 115.234229][ T5409] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 115.239775][ T5409] ? mutex_unlock+0xb2/0x260 [ 115.244381][ T5409] ? bit_wait_io_timeout+0x120/0x120 [ 115.249686][ T5409] ? __mutex_lock_slowpath+0x10/0x10 [ 115.254898][ T5409] dump_stack+0x15/0x1b [ 115.259158][ T5409] should_fail_ex+0x3d0/0x520 [ 115.263727][ T5409] ? getname_flags+0xba/0x520 [ 115.268580][ T5409] __should_failslab+0xaf/0xf0 [ 115.273350][ T5409] should_failslab+0x9/0x20 [ 115.277775][ T5409] kmem_cache_alloc+0x3b/0x2c0 [ 115.282378][ T5409] getname_flags+0xba/0x520 [ 115.286716][ T5409] __x64_sys_mkdir+0x5f/0x80 [ 115.291141][ T5409] do_syscall_64+0x3d/0xb0 [ 115.295395][ T5409] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.301209][ T5409] RIP: 0033:0x7fcfa467d0a9 [ 115.305467][ T5409] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 115.325003][ T5409] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 115.333416][ T5409] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 115.341241][ T5409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 115.349131][ T5409] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 115.356937][ T5409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.364913][ T5409] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 115.372822][ T5409] [ 115.393940][ T5412] device veth0_vlan left promiscuous mode [ 115.407346][ T5412] device veth0_vlan entered promiscuous mode [ 115.427130][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.439792][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.473236][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.501132][ T5424] device syzkaller0 entered promiscuous mode [ 115.659356][ T5463] FAULT_INJECTION: forcing a failure. [ 115.659356][ T5463] name failslab, interval 1, probability 0, space 0, times 0 [ 115.674163][ T5463] CPU: 0 PID: 5463 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 115.684157][ T5463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 115.694049][ T5463] Call Trace: [ 115.697325][ T5463] [ 115.700063][ T5463] dump_stack_lvl+0x151/0x1b7 [ 115.704760][ T5463] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 115.710505][ T5463] dump_stack+0x15/0x1b [ 115.714579][ T5463] should_fail_ex+0x3d0/0x520 [ 115.719085][ T5463] ? sidtab_sid2str_get+0x12b/0x2a0 [ 115.724305][ T5463] __should_failslab+0xaf/0xf0 [ 115.729102][ T5463] should_failslab+0x9/0x20 [ 115.733696][ T5463] __kmem_cache_alloc_node+0x3d/0x250 [ 115.738913][ T5463] ? sidtab_sid2str_get+0x12b/0x2a0 [ 115.744457][ T5463] __kmalloc_node_track_caller+0xa2/0x1e0 [ 115.750272][ T5463] kmemdup+0x29/0x60 [ 115.754032][ T5463] sidtab_sid2str_get+0x12b/0x2a0 [ 115.758851][ T5463] security_sid_to_context_core+0x2b5/0x490 [ 115.764577][ T5463] security_sid_to_context_force+0x36/0x40 [ 115.770218][ T5463] selinux_inode_init_security+0x6e6/0xad0 [ 115.775874][ T5463] ? __crc32c_le_base+0x6e5/0xd60 [ 115.780719][ T5463] ? selinux_inode_free_security+0x210/0x210 [ 115.786622][ T5463] ? crypto_shash_update+0x1db/0x2a0 [ 115.791745][ T5463] security_inode_init_security+0x15b/0x390 [ 115.797473][ T5463] ? ext4_init_security+0x40/0x40 [ 115.802333][ T5463] ? security_dentry_create_files_as+0xc0/0xc0 [ 115.808323][ T5463] ? __ext4_set_acl+0x5e0/0x5e0 [ 115.813529][ T5463] ? ext4_has_metadata_csum+0x1f0/0x1f0 [ 115.818921][ T5463] ext4_init_security+0x34/0x40 [ 115.823596][ T5463] __ext4_new_inode+0x31ef/0x40a0 [ 115.828458][ T5463] ? ext4_has_group_desc_csum+0x1f0/0x1f0 [ 115.834011][ T5463] ? from_kgid+0x1a3/0x730 [ 115.838266][ T5463] ? jbd2__journal_start+0x3b9/0x720 [ 115.843383][ T5463] ? __ext4_journal_start_sb+0x24d/0x4b0 [ 115.848938][ T5463] ext4_ext_migrate+0x679/0x12f0 [ 115.853717][ T5463] ? mb_regenerate_buddy+0x5a0/0x5a0 [ 115.858832][ T5463] ? inode_maybe_inc_iversion+0x19f/0x1f0 [ 115.864392][ T5463] ? __ext4_journal_stop+0x179/0x1c0 [ 115.869510][ T5463] ext4_fileattr_set+0xe60/0x16e0 [ 115.874373][ T5463] ? __set_page_owner_handle+0x38a/0x3d0 [ 115.879852][ T5463] ? ext4_fileattr_get+0x200/0x200 [ 115.884786][ T5463] ? rwsem_write_trylock+0x15b/0x290 [ 115.889907][ T5463] ? fileattr_fill_flags+0x1e5/0x320 [ 115.895030][ T5463] ? fscrypt_prepare_setflags+0x61/0x230 [ 115.900581][ T5463] vfs_fileattr_set+0x8ee/0xd30 [ 115.905355][ T5463] ? copy_fsxattr_to_user+0x3a0/0x3a0 [ 115.910564][ T5463] ? memcpy+0x56/0x70 [ 115.914479][ T5463] do_vfs_ioctl+0x1bfe/0x29a0 [ 115.918981][ T5463] ? __x64_compat_sys_ioctl+0x90/0x90 [ 115.924439][ T5463] ? kstrtol_from_user+0x180/0x180 [ 115.929311][ T5463] ? avc_has_perm+0x16f/0x260 [ 115.933910][ T5463] ? avc_has_perm_noaudit+0x430/0x430 [ 115.939130][ T5463] ? proc_fail_nth_write+0x20b/0x290 [ 115.944242][ T5463] ? proc_fail_nth_read+0x210/0x210 [ 115.949466][ T5463] ? fsnotify_perm+0x6a/0x5d0 [ 115.954235][ T5463] ? file_has_perm+0x508/0x6c0 [ 115.958904][ T5463] ? match_file+0x140/0x140 [ 115.963259][ T5463] ? selinux_file_ioctl+0x1f3/0x540 [ 115.968277][ T5463] ? __mutex_lock_slowpath+0x10/0x10 [ 115.974014][ T5463] ? selinux_file_alloc_security+0x120/0x120 [ 115.979841][ T5463] ? __fget_files+0x2cb/0x330 [ 115.984339][ T5463] ? security_file_ioctl+0x84/0xb0 [ 115.989281][ T5463] __se_sys_ioctl+0x99/0x190 [ 115.993709][ T5463] __x64_sys_ioctl+0x7b/0x90 [ 115.998139][ T5463] do_syscall_64+0x3d/0xb0 [ 116.002388][ T5463] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.008113][ T5463] RIP: 0033:0x7fcfa467d0a9 [ 116.012374][ T5463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 116.031895][ T5463] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 116.040148][ T5463] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 116.047956][ T5463] RDX: 0000000020000000 RSI: 0000000040086602 RDI: 0000000000000006 [ 116.055802][ T5463] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 116.063581][ T5463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.071386][ T5463] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 116.079209][ T5463] [ 116.196246][ T5477] FAULT_INJECTION: forcing a failure. [ 116.196246][ T5477] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.212186][ T5477] CPU: 0 PID: 5477 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 116.223529][ T5477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 116.233942][ T5477] Call Trace: [ 116.237071][ T5477] [ 116.239950][ T5477] dump_stack_lvl+0x151/0x1b7 [ 116.244535][ T5477] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 116.249930][ T5477] dump_stack+0x15/0x1b [ 116.253913][ T5477] should_fail_ex+0x3d0/0x520 [ 116.259126][ T5477] should_fail+0xb/0x10 [ 116.263322][ T5477] should_fail_usercopy+0x1a/0x20 [ 116.268186][ T5477] _copy_from_user+0x1e/0xc0 [ 116.272914][ T5477] __sys_bpf+0x23b/0x7f0 [ 116.276957][ T5477] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 116.282173][ T5477] ? kvm_sched_clock_read+0x18/0x40 [ 116.287195][ T5477] ? debug_smp_processor_id+0x17/0x20 [ 116.292398][ T5477] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 116.298298][ T5477] __x64_sys_bpf+0x7c/0x90 [ 116.302669][ T5477] do_syscall_64+0x3d/0xb0 [ 116.306912][ T5477] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 116.312646][ T5477] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 116.318384][ T5477] RIP: 0033:0x7fb7c4c7d0a9 [ 116.322623][ T5477] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 116.342074][ T5477] RSP: 002b:00007fb7c599b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.350739][ T5477] RAX: ffffffffffffffda RBX: 00007fb7c4db3f80 RCX: 00007fb7c4c7d0a9 [ 116.358644][ T5477] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000000 [ 116.366529][ T5477] RBP: 00007fb7c599b120 R08: 0000000000000000 R09: 0000000000000000 [ 116.374690][ T5477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.382761][ T5477] R13: 000000000000000b R14: 00007fb7c4db3f80 R15: 00007ffcbe536fd8 [ 116.390583][ T5477] [ 116.600823][ T5510] device veth0_vlan left promiscuous mode [ 116.607862][ T5510] device veth0_vlan entered promiscuous mode [ 116.756975][ T5517] device pim6reg1 entered promiscuous mode [ 116.810625][ T5540] device pim6reg1 entered promiscuous mode [ 116.969583][ T5562] FAULT_INJECTION: forcing a failure. [ 116.969583][ T5562] name failslab, interval 1, probability 0, space 0, times 0 [ 116.983795][ T5562] CPU: 1 PID: 5562 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 116.993863][ T5562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 117.003752][ T5562] Call Trace: [ 117.006873][ T5562] [ 117.009659][ T5562] dump_stack_lvl+0x151/0x1b7 [ 117.014400][ T5562] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 117.019690][ T5562] dump_stack+0x15/0x1b [ 117.023679][ T5562] should_fail_ex+0x3d0/0x520 [ 117.028195][ T5562] ? getname_flags+0xba/0x520 [ 117.032704][ T5562] __should_failslab+0xaf/0xf0 [ 117.037302][ T5562] should_failslab+0x9/0x20 [ 117.041644][ T5562] kmem_cache_alloc+0x3b/0x2c0 [ 117.046243][ T5562] getname_flags+0xba/0x520 [ 117.050670][ T5562] __x64_sys_mkdir+0x5f/0x80 [ 117.055270][ T5562] do_syscall_64+0x3d/0xb0 [ 117.059522][ T5562] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 117.066282][ T5562] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.072100][ T5562] RIP: 0033:0x7fcbe887d0a9 [ 117.076345][ T5562] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 117.095880][ T5562] RSP: 002b:00007fcbe96300c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 117.104338][ T5562] RAX: ffffffffffffffda RBX: 00007fcbe89b3f80 RCX: 00007fcbe887d0a9 [ 117.112111][ T5562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 117.119927][ T5562] RBP: 00007fcbe9630120 R08: 0000000000000000 R09: 0000000000000000 [ 117.128148][ T5562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.135951][ T5562] R13: 000000000000000b R14: 00007fcbe89b3f80 R15: 00007ffd608451f8 [ 117.143853][ T5562] [ 117.207472][ T5569] device syzkaller0 entered promiscuous mode [ 117.695002][ T5633] device sit0 left promiscuous mode [ 118.164983][ T5654] FAULT_INJECTION: forcing a failure. [ 118.164983][ T5654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.192357][ T5654] CPU: 1 PID: 5654 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 118.202355][ T5654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 118.213154][ T5654] Call Trace: [ 118.216376][ T5654] [ 118.219136][ T5654] dump_stack_lvl+0x151/0x1b7 [ 118.223825][ T5654] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 118.229548][ T5654] ? enqueue_hrtimer+0xca/0x250 [ 118.234327][ T5654] dump_stack+0x15/0x1b [ 118.238412][ T5654] should_fail_ex+0x3d0/0x520 [ 118.243292][ T5654] should_fail+0xb/0x10 [ 118.247357][ T5654] should_fail_usercopy+0x1a/0x20 [ 118.252961][ T5654] _copy_from_user+0x1e/0xc0 [ 118.257609][ T5654] __sys_bpf+0x23b/0x7f0 [ 118.261954][ T5654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 118.267227][ T5654] ? kvm_sched_clock_read+0x18/0x40 [ 118.272355][ T5654] ? debug_smp_processor_id+0x17/0x20 [ 118.277557][ T5654] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 118.283463][ T5654] __x64_sys_bpf+0x7c/0x90 [ 118.287710][ T5654] do_syscall_64+0x3d/0xb0 [ 118.291970][ T5654] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 118.297606][ T5654] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 118.303345][ T5654] RIP: 0033:0x7f080c47d0a9 [ 118.307585][ T5654] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 118.327122][ T5654] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.335364][ T5654] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 118.343177][ T5654] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 118.352906][ T5654] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 118.360704][ T5654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.368518][ T5654] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 118.376966][ T5654] [ 119.542938][ T5711] device veth1_macvtap left promiscuous mode [ 119.750343][ T5730] device pim6reg1 entered promiscuous mode [ 119.819781][ T5732] device sit0 entered promiscuous mode [ 119.831014][ T5732] FAULT_INJECTION: forcing a failure. [ 119.831014][ T5732] name failslab, interval 1, probability 0, space 0, times 0 [ 119.862457][ T5732] CPU: 1 PID: 5732 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 119.872358][ T5732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 119.882250][ T5732] Call Trace: [ 119.885375][ T5732] [ 119.888153][ T5732] dump_stack_lvl+0x151/0x1b7 [ 119.892666][ T5732] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 119.897970][ T5732] dump_stack+0x15/0x1b [ 119.901951][ T5732] should_fail_ex+0x3d0/0x520 [ 119.906465][ T5732] ? fib_create_info+0x858/0x1f10 [ 119.911328][ T5732] __should_failslab+0xaf/0xf0 [ 119.915938][ T5732] should_failslab+0x9/0x20 [ 119.920268][ T5732] __kmem_cache_alloc_node+0x3d/0x250 [ 119.925473][ T5732] ? 0xffffffffa00007d4 [ 119.929553][ T5732] ? is_bpf_text_address+0x172/0x190 [ 119.934672][ T5732] ? fib_create_info+0x858/0x1f10 [ 119.939531][ T5732] __kmalloc+0xa3/0x1e0 [ 119.943526][ T5732] fib_create_info+0x858/0x1f10 [ 119.948211][ T5732] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 119.954204][ T5732] fib_table_insert+0x1b7/0x20a0 [ 119.958975][ T5732] ? stack_trace_snprint+0xf0/0xf0 [ 119.963922][ T5732] ? __stack_depot_save+0x36/0x480 [ 119.968870][ T5732] ? ____ip_mc_inc_group+0x215/0x8d0 [ 119.973989][ T5732] ? ____ip_mc_inc_group+0x215/0x8d0 [ 119.979110][ T5732] ? kasan_set_track+0x60/0x70 [ 119.983718][ T5732] ? kasan_set_track+0x4b/0x70 [ 119.989211][ T5732] ? kasan_save_alloc_info+0x1f/0x30 [ 119.994336][ T5732] ? __kasan_kmalloc+0x9c/0xb0 [ 119.998937][ T5732] ? ____ip_mc_inc_group+0x215/0x8d0 [ 120.004055][ T5732] ? ip_mc_up+0x10f/0x1e0 [ 120.008223][ T5732] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 120.013685][ T5732] ? dev_change_flags+0xf0/0x1a0 [ 120.018381][ T5732] ? dev_ifsioc+0x177/0x1150 [ 120.022800][ T5732] ? dev_ioctl+0x543/0xe60 [ 120.027050][ T5732] ? sock_do_ioctl+0x26b/0x450 [ 120.031658][ T5732] fib_add_ifaddr+0x43f/0x15e0 [ 120.036259][ T5732] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 120.042068][ T5732] ? arp_mc_map+0x4f5/0x910 [ 120.046409][ T5732] ? igmp_group_added+0x1fa/0x800 [ 120.051272][ T5732] ? igmpv3_del_delrec+0x740/0x740 [ 120.056219][ T5732] ? irqentry_exit+0x30/0x40 [ 120.060642][ T5732] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 120.066282][ T5732] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 120.072275][ T5732] ? irqentry_exit+0x30/0x40 [ 120.076785][ T5732] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 120.082429][ T5732] ? fib_netdev_event+0x1eb/0x5a0 [ 120.087352][ T5732] fib_netdev_event+0x23f/0x5a0 [ 120.091978][ T5732] raw_notifier_call_chain+0x8c/0xf0 [ 120.097095][ T5732] __dev_notify_flags+0x304/0x610 [ 120.101957][ T5732] ? __dev_change_flags+0x6e0/0x6e0 [ 120.107007][ T5732] ? __dev_change_flags+0x505/0x6e0 [ 120.112029][ T5732] ? dev_get_flags+0x1e0/0x1e0 [ 120.116632][ T5732] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 120.122702][ T5732] ? full_name_hash+0x54/0xf0 [ 120.127387][ T5732] dev_change_flags+0xf0/0x1a0 [ 120.131997][ T5732] dev_ifsioc+0x177/0x1150 [ 120.136240][ T5732] ? dev_ioctl+0xe60/0xe60 [ 120.140492][ T5732] ? __kasan_check_write+0x14/0x20 [ 120.145441][ T5732] ? mutex_lock+0xb1/0x1e0 [ 120.149691][ T5732] ? bit_wait_io_timeout+0x120/0x120 [ 120.154814][ T5732] dev_ioctl+0x543/0xe60 [ 120.158891][ T5732] sock_do_ioctl+0x26b/0x450 [ 120.163319][ T5732] ? sock_show_fdinfo+0xa0/0xa0 [ 120.168006][ T5732] ? preempt_schedule_notrace+0x140/0x140 [ 120.173561][ T5732] sock_ioctl+0x455/0x740 [ 120.177726][ T5732] ? sock_poll+0x400/0x400 [ 120.181991][ T5732] ? avc_has_extended_perms+0xa7e/0x10f0 [ 120.187536][ T5732] ? security_file_ioctl+0x7d/0xb0 [ 120.192677][ T5732] ? security_file_ioctl+0x2e/0xb0 [ 120.197616][ T5732] ? security_file_ioctl+0x84/0xb0 [ 120.202561][ T5732] ? sock_poll+0x400/0x400 [ 120.206897][ T5732] __se_sys_ioctl+0x114/0x190 [ 120.211502][ T5732] __x64_sys_ioctl+0x7b/0x90 [ 120.215942][ T5732] do_syscall_64+0x3d/0xb0 [ 120.220181][ T5732] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 120.225824][ T5732] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 120.231549][ T5732] RIP: 0033:0x7fb7c4c7d0a9 [ 120.235910][ T5732] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 120.255791][ T5732] RSP: 002b:00007fb7c599b0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 120.264030][ T5732] RAX: ffffffffffffffda RBX: 00007fb7c4db3f80 RCX: 00007fb7c4c7d0a9 [ 120.271830][ T5732] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000008 [ 120.279642][ T5732] RBP: 00007fb7c599b120 R08: 0000000000000000 R09: 0000000000000000 [ 120.287539][ T5732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.295790][ T5732] R13: 000000000000000b R14: 00007fb7c4db3f80 R15: 00007ffcbe536fd8 [ 120.303603][ T5732] [ 120.696742][ T5782] device pim6reg1 entered promiscuous mode [ 121.195679][ T5800] syz-executor.4[5800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.195749][ T5800] syz-executor.4[5800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.888355][ T28] audit: type=1400 audit(1719119367.226:147): avc: denied { create } for pid=5860 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.750104][ T5920] FAULT_INJECTION: forcing a failure. [ 122.750104][ T5920] name failslab, interval 1, probability 0, space 0, times 0 [ 122.803418][ T5920] CPU: 1 PID: 5920 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 122.813446][ T5920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 122.823313][ T5920] Call Trace: [ 122.826443][ T5920] [ 122.829217][ T5920] dump_stack_lvl+0x151/0x1b7 [ 122.833727][ T5920] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 122.839144][ T5920] dump_stack+0x15/0x1b [ 122.843134][ T5920] should_fail_ex+0x3d0/0x520 [ 122.847648][ T5920] ? trace_probe_init+0x58/0x390 [ 122.852428][ T5920] __should_failslab+0xaf/0xf0 [ 122.857021][ T5920] should_failslab+0x9/0x20 [ 122.861360][ T5920] __kmem_cache_alloc_node+0x3d/0x250 [ 122.866570][ T5920] ? trace_probe_init+0x58/0x390 [ 122.871343][ T5920] __kmalloc+0xa3/0x1e0 [ 122.875340][ T5920] trace_probe_init+0x58/0x390 [ 122.879959][ T5920] ? __kasan_kmalloc+0x9c/0xb0 [ 122.884533][ T5920] ? kmalloc_trace+0x44/0xa0 [ 122.888962][ T5920] create_local_trace_uprobe+0x18c/0x710 [ 122.894445][ T5920] ? bpf_get_uprobe_info+0x540/0x540 [ 122.899552][ T5920] perf_uprobe_init+0xfa/0x1a0 [ 122.904162][ T5920] perf_uprobe_event_init+0x106/0x190 [ 122.909519][ T5920] perf_try_init_event+0x143/0x410 [ 122.914731][ T5920] perf_event_alloc+0x1029/0x1840 [ 122.919584][ T5920] __se_sys_perf_event_open+0x7b4/0x3d60 [ 122.925403][ T5920] ? bit_wait_io_timeout+0x120/0x120 [ 122.930778][ T5920] ? __mutex_lock_slowpath+0x10/0x10 [ 122.936071][ T5920] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 122.941542][ T5920] ? debug_smp_processor_id+0x17/0x20 [ 122.947005][ T5920] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 122.953000][ T5920] __x64_sys_perf_event_open+0xbf/0xd0 [ 122.958578][ T5920] do_syscall_64+0x3d/0xb0 [ 122.962823][ T5920] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 122.968547][ T5920] RIP: 0033:0x7fcfa467d0a9 [ 122.972800][ T5920] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 122.992432][ T5920] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 123.000665][ T5920] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 123.008475][ T5920] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 123.016290][ T5920] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 123.024100][ T5920] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 123.031907][ T5920] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 123.039728][ T5920] [ 123.066459][ T5920] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 123.653944][ T5989] FAULT_INJECTION: forcing a failure. [ 123.653944][ T5989] name failslab, interval 1, probability 0, space 0, times 0 [ 123.748450][ T5989] CPU: 1 PID: 5989 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 123.758358][ T5989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 123.768258][ T5989] Call Trace: [ 123.771466][ T5989] [ 123.774255][ T5989] dump_stack_lvl+0x151/0x1b7 [ 123.778757][ T5989] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 123.784137][ T5989] dump_stack+0x15/0x1b [ 123.788123][ T5989] should_fail_ex+0x3d0/0x520 [ 123.792636][ T5989] ? ext4_find_extent+0x370/0xdb0 [ 123.797529][ T5989] __should_failslab+0xaf/0xf0 [ 123.802104][ T5989] should_failslab+0x9/0x20 [ 123.806440][ T5989] __kmem_cache_alloc_node+0x3d/0x250 [ 123.811744][ T5989] ? ____kasan_slab_free+0x13c/0x180 [ 123.816857][ T5989] ? ext4_find_extent+0x370/0xdb0 [ 123.821724][ T5989] __kmalloc+0xa3/0x1e0 [ 123.825797][ T5989] ? __kmem_cache_free+0x218/0x3b0 [ 123.830779][ T5989] ? ext4_free_ext_path+0xee/0x120 [ 123.835695][ T5989] ext4_find_extent+0x370/0xdb0 [ 123.840377][ T5989] ? ext4_free_ext_path+0xee/0x120 [ 123.845322][ T5989] ? kfree+0x7a/0xf0 [ 123.849077][ T5989] mext_check_coverage+0x105/0x410 [ 123.854088][ T5989] ? move_extent_per_page+0x2540/0x2540 [ 123.859466][ T5989] ? folio_wait_writeback+0x69/0x1f0 [ 123.864607][ T5989] move_extent_per_page+0xc27/0x2540 [ 123.869723][ T5989] ? kasan_save_alloc_info+0x1f/0x30 [ 123.874829][ T5989] ? mext_check_arguments+0x930/0x930 [ 123.880039][ T5989] ? memset+0x35/0x40 [ 123.883862][ T5989] ext4_move_extents+0x94a/0xe30 [ 123.888635][ T5989] ? ext4_double_up_write_data_sem+0x30/0x30 [ 123.894451][ T5989] ? mnt_want_write_file+0x26b/0x480 [ 123.899654][ T5989] ext4_ioctl+0x34d3/0x5900 [ 123.903995][ T5989] ? memcpy+0x56/0x70 [ 123.907809][ T5989] ? avc_has_extended_perms+0xad7/0x10f0 [ 123.913279][ T5989] ? ext4_fileattr_set+0x16e0/0x16e0 [ 123.918400][ T5989] ? try_charge_memcg+0x2ea/0x16e0 [ 123.923956][ T5989] ? avc_flush+0x290/0x290 [ 123.928203][ T5989] ? kstrtouint+0xf6/0x180 [ 123.932458][ T5989] ? _kstrtol+0x150/0x150 [ 123.936624][ T5989] ? do_vfs_ioctl+0x19df/0x29a0 [ 123.941311][ T5989] ? kstrtouint_from_user+0x124/0x180 [ 123.946519][ T5989] ? __x64_compat_sys_ioctl+0x90/0x90 [ 123.952263][ T5989] ? kstrtol_from_user+0x180/0x180 [ 123.957207][ T5989] ? cgroup_rstat_updated+0xe5/0x370 [ 123.962320][ T5989] ? __alloc_pages+0x3a1/0x780 [ 123.966916][ T5989] ? __kasan_check_write+0x14/0x20 [ 123.971861][ T5989] ? ioctl_has_perm+0x1f8/0x560 [ 123.976553][ T5989] ? ioctl_has_perm+0x3f0/0x560 [ 123.981329][ T5989] ? has_cap_mac_admin+0x3c0/0x3c0 [ 123.986268][ T5989] ? vfs_write+0xbb3/0xeb0 [ 123.990523][ T5989] ? selinux_file_ioctl+0x3cc/0x540 [ 123.995562][ T5989] ? selinux_file_alloc_security+0x120/0x120 [ 124.001382][ T5989] ? __fget_files+0x2cb/0x330 [ 124.005905][ T5989] ? security_file_ioctl+0x84/0xb0 [ 124.010827][ T5989] ? ext4_fileattr_set+0x16e0/0x16e0 [ 124.015954][ T5989] __se_sys_ioctl+0x114/0x190 [ 124.020468][ T5989] __x64_sys_ioctl+0x7b/0x90 [ 124.024891][ T5989] do_syscall_64+0x3d/0xb0 [ 124.029142][ T5989] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 124.035318][ T5989] RIP: 0033:0x7fcbe887d0a9 [ 124.039559][ T5989] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 124.059629][ T5989] RSP: 002b:00007fcbe96300c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 124.067876][ T5989] RAX: ffffffffffffffda RBX: 00007fcbe89b3f80 RCX: 00007fcbe887d0a9 [ 124.075683][ T5989] RDX: 00000000200005c0 RSI: 00000000c028660f RDI: 0000000000000005 [ 124.083495][ T5989] RBP: 00007fcbe9630120 R08: 0000000000000000 R09: 0000000000000000 [ 124.091307][ T5989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.099119][ T5989] R13: 000000000000000b R14: 00007fcbe89b3f80 R15: 00007ffd608451f8 [ 124.106935][ T5989] [ 124.224783][ T28] audit: type=1400 audit(1719119369.566:148): avc: denied { create } for pid=6012 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 125.201494][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.201567][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.268513][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.333630][ T6137] device pim6reg1 entered promiscuous mode [ 125.344713][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.373057][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.388278][ T6119] syz-executor.2[6119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.413465][ T6153] syz-executor.3[6153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.429013][ T6153] syz-executor.3[6153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.567190][ T6158] Â: renamed from pim6reg1 [ 125.645639][ T6166] device syzkaller0 entered promiscuous mode [ 125.695335][ T6177] device syzkaller0 entered promiscuous mode [ 126.650739][ T28] audit: type=1400 audit(1719119371.996:149): avc: denied { create } for pid=6237 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 126.719141][ T6242] Â: renamed from pim6reg1 [ 126.830361][ T6248] FAULT_INJECTION: forcing a failure. [ 126.830361][ T6248] name failslab, interval 1, probability 0, space 0, times 0 [ 126.918695][ T6248] CPU: 0 PID: 6248 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 126.928601][ T6248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 126.938494][ T6248] Call Trace: [ 126.941618][ T6248] [ 126.944396][ T6248] dump_stack_lvl+0x151/0x1b7 [ 126.948907][ T6248] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 126.954654][ T6248] dump_stack+0x15/0x1b [ 126.958772][ T6248] should_fail_ex+0x3d0/0x520 [ 126.963303][ T6248] ? __vmalloc_node_range+0x581/0x1540 [ 126.968721][ T6248] __should_failslab+0xaf/0xf0 [ 126.973264][ T6248] should_failslab+0x9/0x20 [ 126.977691][ T6248] __kmem_cache_alloc_node+0x3d/0x250 [ 126.983361][ T6248] ? _raw_spin_unlock+0x4c/0x70 [ 126.988215][ T6248] ? __vmalloc_node_range+0x581/0x1540 [ 126.993507][ T6248] __kmalloc_node+0xa3/0x1e0 [ 126.997940][ T6248] __vmalloc_node_range+0x581/0x1540 [ 127.003067][ T6248] ? selinux_capable+0x2f1/0x430 [ 127.007826][ T6248] ? vmap+0x2b0/0x2b0 [ 127.011722][ T6248] ? selinux_capset+0xf0/0xf0 [ 127.016160][ T6248] ? avc_has_perm_noaudit+0x348/0x430 [ 127.021373][ T6248] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 127.026747][ T6248] __vmalloc+0x7a/0x90 [ 127.030655][ T6248] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 127.036043][ T6248] bpf_prog_alloc_no_stats+0x3e/0x400 [ 127.041253][ T6248] bpf_prog_alloc+0x22/0x1c0 [ 127.045671][ T6248] bpf_prog_load+0x84a/0x1bf0 [ 127.050278][ T6248] ? map_freeze+0x3a0/0x3a0 [ 127.054612][ T6248] ? selinux_bpf+0xcb/0x100 [ 127.058948][ T6248] ? security_bpf+0x82/0xb0 [ 127.063297][ T6248] __sys_bpf+0x52c/0x7f0 [ 127.067375][ T6248] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 127.072586][ T6248] ? debug_smp_processor_id+0x17/0x20 [ 127.077784][ T6248] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 127.083689][ T6248] __x64_sys_bpf+0x7c/0x90 [ 127.087951][ T6248] do_syscall_64+0x3d/0xb0 [ 127.092192][ T6248] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.097916][ T6248] RIP: 0033:0x7fcfa467d0a9 [ 127.102174][ T6248] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 127.121613][ T6248] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.129856][ T6248] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 127.137669][ T6248] RDX: 0000000000000023 RSI: 00000000202a0fb8 RDI: 0000000000000005 [ 127.145488][ T6248] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 127.153293][ T6248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.161190][ T6248] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 127.169011][ T6248] [ 127.535867][ T6282] FAULT_INJECTION: forcing a failure. [ 127.535867][ T6282] name failslab, interval 1, probability 0, space 0, times 0 [ 127.569536][ T6282] CPU: 0 PID: 6282 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 127.579610][ T6282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 127.589501][ T6282] Call Trace: [ 127.592624][ T6282] [ 127.595400][ T6282] dump_stack_lvl+0x151/0x1b7 [ 127.599915][ T6282] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 127.605207][ T6282] ? fscrypt_match_name+0x132/0x260 [ 127.610256][ T6282] ? __getblk_gfp+0x3d/0x7d0 [ 127.614863][ T6282] dump_stack+0x15/0x1b [ 127.618856][ T6282] should_fail_ex+0x3d0/0x520 [ 127.623371][ T6282] __should_failslab+0xaf/0xf0 [ 127.627971][ T6282] should_failslab+0x9/0x20 [ 127.632394][ T6282] slab_pre_alloc_hook+0x2e/0x1b0 [ 127.637265][ T6282] kmem_cache_alloc_lru+0x49/0x220 [ 127.642288][ T6282] ? ext4_alloc_inode+0x2e/0x650 [ 127.647064][ T6282] ext4_alloc_inode+0x2e/0x650 [ 127.651661][ T6282] ? ext4_group_desc_free+0x110/0x110 [ 127.656958][ T6282] new_inode_pseudo+0x65/0x1d0 [ 127.661557][ T6282] new_inode+0x28/0x1c0 [ 127.665551][ T6282] __ext4_new_inode+0x2a6/0x40a0 [ 127.670326][ T6282] ? memset+0x35/0x40 [ 127.674146][ T6282] ? __dquot_initialize+0x244/0xe10 [ 127.679178][ T6282] ? ext4_has_group_desc_csum+0x1f0/0x1f0 [ 127.684729][ T6282] ? dquot_initialize+0x20/0x20 [ 127.689420][ T6282] ext4_create+0x275/0x550 [ 127.693675][ T6282] ? ext4_lookup+0x740/0x740 [ 127.698187][ T6282] ? selinux_inode_create+0x22/0x30 [ 127.703254][ T6282] ? security_inode_create+0xbc/0x100 [ 127.708427][ T6282] ? ext4_lookup+0x740/0x740 [ 127.712951][ T6282] path_openat+0x12ee/0x2d60 [ 127.717371][ T6282] ? do_filp_open+0x480/0x480 [ 127.721880][ T6282] do_filp_open+0x230/0x480 [ 127.726222][ T6282] ? vfs_tmpfile+0x480/0x480 [ 127.730657][ T6282] ? alloc_fd+0x4fa/0x5a0 [ 127.734901][ T6282] do_sys_openat2+0x13f/0x850 [ 127.739417][ T6282] ? __kasan_check_write+0x14/0x20 [ 127.744451][ T6282] ? mutex_unlock+0xb2/0x260 [ 127.748869][ T6282] ? bit_wait_io_timeout+0x120/0x120 [ 127.753992][ T6282] ? do_sys_open+0x220/0x220 [ 127.758417][ T6282] ? __kasan_check_write+0x14/0x20 [ 127.763365][ T6282] __x64_sys_openat+0x243/0x290 [ 127.768054][ T6282] ? __ia32_sys_open+0x270/0x270 [ 127.772825][ T6282] ? debug_smp_processor_id+0x17/0x20 [ 127.778156][ T6282] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 127.784065][ T6282] ? exit_to_user_mode_prepare+0x39/0xa0 [ 127.789520][ T6282] do_syscall_64+0x3d/0xb0 [ 127.793785][ T6282] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 127.799501][ T6282] RIP: 0033:0x7fcfa467d0a9 [ 127.803755][ T6282] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 127.823284][ T6282] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 127.831525][ T6282] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 127.839339][ T6282] RDX: 000000000000275a RSI: 0000000020000140 RDI: ffffffffffffff9c [ 127.847237][ T6282] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 127.855141][ T6282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.862946][ T6282] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 127.870762][ T6282] [ 127.944167][ T6299] syz-executor.3[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.944237][ T6299] syz-executor.3[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.463741][ T6348] syz-executor.3[6348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.647684][ T6348] syz-executor.3[6348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.869831][ T6362] device wg2 entered promiscuous mode [ 128.974812][ T6370] device pim6reg1 entered promiscuous mode [ 129.344609][ T6402] device wg2 entered promiscuous mode [ 129.421448][ T6412] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 129.670322][ T6449] syz-executor.3[6449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.670389][ T6449] syz-executor.3[6449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.325135][ T6466] device sit0 entered promiscuous mode [ 130.527983][ T28] audit: type=1400 audit(1719119375.866:150): avc: denied { ioctl } for pid=6472 comm="syz-executor.2" path="net:[4026532567]" dev="nsfs" ino=4026532567 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 130.667923][ T6490] device wg2 left promiscuous mode [ 130.752194][ T6497] device wg2 entered promiscuous mode [ 131.128701][ T6528] device pim6reg1 entered promiscuous mode [ 131.144340][ T6537] syz-executor.0[6537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.144408][ T6537] syz-executor.0[6537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.167535][ T6537] syz-executor.0[6537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.186818][ T6537] syz-executor.0[6537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.201778][ T6535] device sit0 left promiscuous mode [ 131.244853][ T6541] device sit0 entered promiscuous mode [ 132.042787][ T6586] device veth0_vlan left promiscuous mode [ 132.059928][ T6593] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 132.109704][ T6586] device veth0_vlan entered promiscuous mode [ 132.500465][ T6611] device pim6reg1 entered promiscuous mode [ 132.530975][ T6613] device veth1_macvtap left promiscuous mode [ 132.579295][ T6613] device veth1_macvtap entered promiscuous mode [ 133.068205][ T6626] device pim6reg1 entered promiscuous mode [ 133.640801][ T6657] device pim6reg1 entered promiscuous mode [ 133.706034][ T6667] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 133.867309][ T6674] device pim6reg1 entered promiscuous mode [ 133.892998][ T6675] device pim6reg1 entered promiscuous mode [ 134.200795][ T6696] device macsec0 entered promiscuous mode [ 134.208826][ T6696] FAULT_INJECTION: forcing a failure. [ 134.208826][ T6696] name failslab, interval 1, probability 0, space 0, times 0 [ 134.237743][ T6696] CPU: 1 PID: 6696 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 134.247828][ T6696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 134.257721][ T6696] Call Trace: [ 134.261374][ T6696] [ 134.264161][ T6696] dump_stack_lvl+0x151/0x1b7 [ 134.268671][ T6696] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 134.273950][ T6696] ? finish_task_switch+0x207/0x7b0 [ 134.278983][ T6696] dump_stack+0x15/0x1b [ 134.282973][ T6696] should_fail_ex+0x3d0/0x520 [ 134.287499][ T6696] ? __alloc_skb+0xcc/0x2d0 [ 134.291829][ T6696] __should_failslab+0xaf/0xf0 [ 134.296631][ T6696] should_failslab+0x9/0x20 [ 134.301050][ T6696] kmem_cache_alloc_node+0x3e/0x2d0 [ 134.306087][ T6696] __alloc_skb+0xcc/0x2d0 [ 134.310249][ T6696] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 134.315485][ T6696] rtmsg_ifinfo+0x78/0x120 [ 134.319709][ T6696] __dev_notify_flags+0xdd/0x610 [ 134.324484][ T6696] ? __dev_change_flags+0x6e0/0x6e0 [ 134.329693][ T6696] ? printk_sprint+0x430/0x430 [ 134.334292][ T6696] ? __kasan_check_write+0x14/0x20 [ 134.339339][ T6696] ? __set_page_owner_handle+0x38a/0x3d0 [ 134.344800][ T6696] ? __kasan_check_read+0x11/0x20 [ 134.349659][ T6696] __dev_set_promiscuity+0x188/0x5b0 [ 134.354775][ T6696] dev_set_promiscuity+0x55/0x100 [ 134.360243][ T6696] macsec_dev_change_rx_flags+0x133/0x180 [ 134.365796][ T6696] ? macsec_start_xmit+0x3030/0x3030 [ 134.370915][ T6696] __dev_set_promiscuity+0x3fe/0x5b0 [ 134.376048][ T6696] ? macsec_dev_change_rx_flags+0x180/0x180 [ 134.381859][ T6696] __dev_change_flags+0x459/0x6e0 [ 134.386715][ T6696] ? dev_get_flags+0x1e0/0x1e0 [ 134.391311][ T6696] ? kstrtouint+0xf6/0x180 [ 134.395568][ T6696] dev_change_flags+0x8c/0x1a0 [ 134.400166][ T6696] dev_ifsioc+0x177/0x1150 [ 134.404419][ T6696] ? dev_ioctl+0xe60/0xe60 [ 134.408851][ T6696] ? __kasan_check_write+0x14/0x20 [ 134.413965][ T6696] ? mutex_lock+0xb1/0x1e0 [ 134.418481][ T6696] ? bit_wait_io_timeout+0x120/0x120 [ 134.424149][ T6696] dev_ioctl+0x543/0xe60 [ 134.428751][ T6696] sock_do_ioctl+0x26b/0x450 [ 134.433507][ T6696] ? has_cap_mac_admin+0x3c0/0x3c0 [ 134.438453][ T6696] ? sock_show_fdinfo+0xa0/0xa0 [ 134.443236][ T6696] ? selinux_file_ioctl+0x3cc/0x540 [ 134.448279][ T6696] sock_ioctl+0x455/0x740 [ 134.452521][ T6696] ? sock_poll+0x400/0x400 [ 134.456775][ T6696] ? __fget_files+0x2cb/0x330 [ 134.461461][ T6696] ? security_file_ioctl+0x84/0xb0 [ 134.466441][ T6696] ? sock_poll+0x400/0x400 [ 134.470661][ T6696] __se_sys_ioctl+0x114/0x190 [ 134.475173][ T6696] __x64_sys_ioctl+0x7b/0x90 [ 134.479599][ T6696] do_syscall_64+0x3d/0xb0 [ 134.483853][ T6696] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 134.489581][ T6696] RIP: 0033:0x7f080c47d0a9 [ 134.493832][ T6696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 134.513450][ T6696] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 134.521883][ T6696] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 134.529814][ T6696] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 000000000000000a [ 134.537624][ T6696] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 134.545436][ T6696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.553250][ T6696] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 134.561067][ T6696] [ 134.633988][ T6710] syz-executor.0[6710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.634058][ T6710] syz-executor.0[6710] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.110984][ T6740] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 135.165078][ T6744] device pim6reg1 entered promiscuous mode [ 135.203470][ T6746] device pim6reg1 entered promiscuous mode [ 136.749611][ T28] audit: type=1400 audit(1719119382.096:151): avc: denied { create } for pid=6816 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 138.129375][ T6896] FAULT_INJECTION: forcing a failure. [ 138.129375][ T6896] name failslab, interval 1, probability 0, space 0, times 0 [ 138.183067][ T6896] CPU: 0 PID: 6896 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 138.193068][ T6896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 138.203040][ T6896] Call Trace: [ 138.206161][ T6896] [ 138.208943][ T6896] dump_stack_lvl+0x151/0x1b7 [ 138.213577][ T6896] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 138.219022][ T6896] dump_stack+0x15/0x1b [ 138.223106][ T6896] should_fail_ex+0x3d0/0x520 [ 138.227600][ T6896] ? __vmalloc_node_range+0x581/0x1540 [ 138.233529][ T6896] __should_failslab+0xaf/0xf0 [ 138.238652][ T6896] should_failslab+0x9/0x20 [ 138.242974][ T6896] __kmem_cache_alloc_node+0x3d/0x250 [ 138.248291][ T6896] ? _raw_spin_unlock+0x4c/0x70 [ 138.253069][ T6896] ? __vmalloc_node_range+0x581/0x1540 [ 138.258371][ T6896] __kmalloc_node+0xa3/0x1e0 [ 138.262881][ T6896] __vmalloc_node_range+0x581/0x1540 [ 138.268006][ T6896] ? selinux_capable+0x2f1/0x430 [ 138.272771][ T6896] ? vmap+0x2b0/0x2b0 [ 138.276584][ T6896] ? selinux_capset+0xf0/0xf0 [ 138.281102][ T6896] ? avc_has_perm_noaudit+0x348/0x430 [ 138.286307][ T6896] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 138.291686][ T6896] __vmalloc+0x7a/0x90 [ 138.295595][ T6896] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 138.300977][ T6896] bpf_prog_alloc_no_stats+0x3e/0x400 [ 138.306187][ T6896] bpf_prog_alloc+0x22/0x1c0 [ 138.310608][ T6896] bpf_prog_load+0x84a/0x1bf0 [ 138.315124][ T6896] ? map_freeze+0x3a0/0x3a0 [ 138.319466][ T6896] ? selinux_bpf+0xcb/0x100 [ 138.323804][ T6896] ? security_bpf+0x82/0xb0 [ 138.328245][ T6896] __sys_bpf+0x52c/0x7f0 [ 138.332318][ T6896] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 138.337531][ T6896] ? debug_smp_processor_id+0x17/0x20 [ 138.343335][ T6896] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 138.349790][ T6896] __x64_sys_bpf+0x7c/0x90 [ 138.354022][ T6896] do_syscall_64+0x3d/0xb0 [ 138.358629][ T6896] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 138.364349][ T6896] RIP: 0033:0x7fcfa467d0a9 [ 138.368602][ T6896] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 138.388047][ T6896] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 138.396287][ T6896] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 138.404102][ T6896] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 138.411914][ T6896] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 138.419812][ T6896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.427707][ T6896] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 138.435785][ T6896] [ 140.380022][ T7069] FAULT_INJECTION: forcing a failure. [ 140.380022][ T7069] name failslab, interval 1, probability 0, space 0, times 0 [ 140.478544][ T7069] CPU: 1 PID: 7069 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 140.488461][ T7069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 140.498430][ T7069] Call Trace: [ 140.501549][ T7069] [ 140.504330][ T7069] dump_stack_lvl+0x151/0x1b7 [ 140.508851][ T7069] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 140.514141][ T7069] dump_stack+0x15/0x1b [ 140.518132][ T7069] should_fail_ex+0x3d0/0x520 [ 140.522643][ T7069] ? jbd2__journal_start+0x150/0x720 [ 140.527763][ T7069] __should_failslab+0xaf/0xf0 [ 140.532366][ T7069] should_failslab+0x9/0x20 [ 140.536705][ T7069] kmem_cache_alloc+0x3b/0x2c0 [ 140.541735][ T7069] ? slab_post_alloc_hook+0x72/0x2c0 [ 140.546859][ T7069] jbd2__journal_start+0x150/0x720 [ 140.551801][ T7069] ? ext4_init_io_end+0x29/0x120 [ 140.556584][ T7069] __ext4_journal_start_sb+0x24d/0x4b0 [ 140.561873][ T7069] ext4_writepages+0x11eb/0x3fd0 [ 140.566660][ T7069] ? __kasan_slab_free+0x11/0x20 [ 140.571423][ T7069] ? generic_write_end+0x202/0x300 [ 140.576367][ T7069] ? ksys_write+0x199/0x2c0 [ 140.580708][ T7069] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.586643][ T7069] ? ext4_read_folio+0x240/0x240 [ 140.591398][ T7069] ? jbd2_journal_stop+0x82c/0xc70 [ 140.596417][ T7069] ? ext4_read_folio+0x240/0x240 [ 140.601192][ T7069] do_writepages+0x385/0x620 [ 140.605619][ T7069] ? __writepage+0x130/0x130 [ 140.610219][ T7069] ? __kasan_check_write+0x14/0x20 [ 140.615255][ T7069] ? _raw_spin_lock+0xa4/0x1b0 [ 140.619848][ T7069] ? _raw_spin_unlock+0x4c/0x70 [ 140.624535][ T7069] ? __mark_inode_dirty+0x26b/0xa60 [ 140.629572][ T7069] filemap_fdatawrite_wbc+0x153/0x1b0 [ 140.634788][ T7069] file_write_and_wait_range+0x1ca/0x2b0 [ 140.640300][ T7069] ? __filemap_set_wb_err+0x130/0x130 [ 140.645543][ T7069] ? generic_perform_write+0x520/0x5c0 [ 140.650837][ T7069] ext4_sync_file+0x1a2/0xa50 [ 140.655351][ T7069] vfs_fsync_range+0x17b/0x190 [ 140.659950][ T7069] ext4_buffered_write_iter+0x587/0x640 [ 140.665330][ T7069] ext4_file_write_iter+0x194/0x1570 [ 140.670591][ T7069] ? folio_batch_move_lru+0x3cf/0x4a0 [ 140.675795][ T7069] ? avc_policy_seqno+0x1b/0x70 [ 140.680491][ T7069] ? ext4_file_read_iter+0x470/0x470 [ 140.685600][ T7069] ? fsnotify_perm+0x6a/0x5d0 [ 140.690116][ T7069] vfs_write+0x902/0xeb0 [ 140.694196][ T7069] ? file_end_write+0x1c0/0x1c0 [ 140.698878][ T7069] ? mutex_lock+0xb1/0x1e0 [ 140.703138][ T7069] ? bit_wait_io_timeout+0x120/0x120 [ 140.708342][ T7069] ? __fdget_pos+0x2e2/0x390 [ 140.712764][ T7069] ? ksys_write+0x77/0x2c0 [ 140.717019][ T7069] ksys_write+0x199/0x2c0 [ 140.721188][ T7069] ? __ia32_sys_read+0x90/0x90 [ 140.725784][ T7069] ? debug_smp_processor_id+0x17/0x20 [ 140.730995][ T7069] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 140.736983][ T7069] __x64_sys_write+0x7b/0x90 [ 140.741408][ T7069] do_syscall_64+0x3d/0xb0 [ 140.745673][ T7069] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 140.751563][ T7069] RIP: 0033:0x7f080c47d0a9 [ 140.755814][ T7069] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 140.775256][ T7069] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.783515][ T7069] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 140.791311][ T7069] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000007 [ 140.799131][ T7069] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 140.806945][ T7069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 140.814746][ T7069] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 140.822563][ T7069] [ 140.879591][ T7072] syz-executor.0[7072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.879662][ T7072] syz-executor.0[7072] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.038525][ T7069] EXT4-fs (sda1): ext4_writepages: jbd2_start: 9223372036854775807 pages, ino 1965; err -12 [ 141.219139][ T7095] device pim6reg1 entered promiscuous mode [ 141.465604][ T7115] FAULT_INJECTION: forcing a failure. [ 141.465604][ T7115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.598896][ T7115] CPU: 0 PID: 7115 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 141.608853][ T7115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 141.618709][ T7115] Call Trace: [ 141.621818][ T7115] [ 141.624596][ T7115] dump_stack_lvl+0x151/0x1b7 [ 141.629108][ T7115] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 141.634412][ T7115] dump_stack+0x15/0x1b [ 141.638415][ T7115] should_fail_ex+0x3d0/0x520 [ 141.643086][ T7115] should_fail_alloc_page+0x68/0x90 [ 141.648116][ T7115] __alloc_pages+0x1f4/0x780 [ 141.652552][ T7115] ? prep_new_page+0x110/0x110 [ 141.657168][ T7115] ? xas_start+0x2bd/0x3f0 [ 141.661572][ T7115] ? xas_load+0x38f/0x3b0 [ 141.665739][ T7115] __folio_alloc+0x15/0x40 [ 141.669991][ T7115] __filemap_get_folio+0x827/0xae0 [ 141.674940][ T7115] ? page_cache_prev_miss+0x410/0x410 [ 141.680155][ T7115] ? _raw_spin_trylock_bh+0x190/0x190 [ 141.685351][ T7115] pagecache_get_page+0x2f/0x110 [ 141.690125][ T7115] grab_cache_page_write_begin+0x42/0x60 [ 141.695678][ T7115] ext4_da_write_begin+0x4f3/0x920 [ 141.700632][ T7115] ? ext4_dirty_folio+0xf0/0xf0 [ 141.705837][ T7115] generic_perform_write+0x2f9/0x5c0 [ 141.710958][ T7115] ? generic_file_direct_write+0x6b0/0x6b0 [ 141.716780][ T7115] ? generic_write_checks_count+0x490/0x490 [ 141.722594][ T7115] ? kstrtouint+0xf6/0x180 [ 141.726937][ T7115] ext4_buffered_write_iter+0x360/0x640 [ 141.732404][ T7115] ext4_file_write_iter+0x194/0x1570 [ 141.737615][ T7115] ? cgroup_rstat_updated+0xe5/0x370 [ 141.742818][ T7115] ? __alloc_pages+0x3a1/0x780 [ 141.747426][ T7115] ? avc_policy_seqno+0x1b/0x70 [ 141.752103][ T7115] ? ext4_file_read_iter+0x470/0x470 [ 141.757222][ T7115] ? fsnotify_perm+0x6a/0x5d0 [ 141.761738][ T7115] vfs_write+0x902/0xeb0 [ 141.765910][ T7115] ? file_end_write+0x1c0/0x1c0 [ 141.770590][ T7115] ? mutex_lock+0xb1/0x1e0 [ 141.774844][ T7115] ? bit_wait_io_timeout+0x120/0x120 [ 141.779972][ T7115] ? __fdget_pos+0x2e2/0x390 [ 141.784398][ T7115] ? ksys_write+0x77/0x2c0 [ 141.788645][ T7115] ksys_write+0x199/0x2c0 [ 141.792816][ T7115] ? __ia32_sys_read+0x90/0x90 [ 141.797415][ T7115] ? debug_smp_processor_id+0x17/0x20 [ 141.802616][ T7115] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 141.808560][ T7115] __x64_sys_write+0x7b/0x90 [ 141.813121][ T7115] do_syscall_64+0x3d/0xb0 [ 141.817376][ T7115] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 141.823222][ T7115] RIP: 0033:0x7f3ce427d0a9 [ 141.827473][ T7115] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 141.847452][ T7115] RSP: 002b:00007f3ce508d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.855854][ T7115] RAX: ffffffffffffffda RBX: 00007f3ce43b3f80 RCX: 00007f3ce427d0a9 [ 141.863668][ T7115] RDX: 0000000000002000 RSI: 0000000020000180 RDI: 0000000000000009 [ 141.872430][ T7115] RBP: 00007f3ce508d120 R08: 0000000000000000 R09: 0000000000000000 [ 141.880250][ T7115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.888051][ T7115] R13: 000000000000000b R14: 00007f3ce43b3f80 R15: 00007ffc5dc5e8d8 [ 141.895883][ T7115] [ 142.946050][ T7180] device veth0_vlan left promiscuous mode [ 142.967700][ T7180] device veth0_vlan entered promiscuous mode [ 143.307617][ T7193] FAULT_INJECTION: forcing a failure. [ 143.307617][ T7193] name failslab, interval 1, probability 0, space 0, times 0 [ 143.396033][ T7193] CPU: 1 PID: 7193 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 143.405939][ T7193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 143.415927][ T7193] Call Trace: [ 143.419047][ T7193] [ 143.421838][ T7193] dump_stack_lvl+0x151/0x1b7 [ 143.426346][ T7193] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 143.431641][ T7193] ? jbd2_journal_start_reserved+0x410/0x410 [ 143.437449][ T7193] ? __dquot_alloc_space+0x26b/0xc00 [ 143.442672][ T7193] dump_stack+0x15/0x1b [ 143.446648][ T7193] should_fail_ex+0x3d0/0x520 [ 143.451163][ T7193] ? ext4_mb_new_blocks+0x5b2/0x48f0 [ 143.456374][ T7193] __should_failslab+0xaf/0xf0 [ 143.461078][ T7193] should_failslab+0x9/0x20 [ 143.465513][ T7193] kmem_cache_alloc+0x3b/0x2c0 [ 143.470171][ T7193] ext4_mb_new_blocks+0x5b2/0x48f0 [ 143.475154][ T7193] ? __kasan_kmalloc+0x9c/0xb0 [ 143.479840][ T7193] ? ext4_mb_pa_callback+0xd0/0xd0 [ 143.484783][ T7193] ? ext4_ext_search_right+0x3e4/0x900 [ 143.490164][ T7193] ? ext4_ext_check_overlap+0x38f/0x5d0 [ 143.495543][ T7193] ? ext4_ext_find_goal+0x105/0x200 [ 143.500678][ T7193] ext4_ext_map_blocks+0x19ca/0x71e0 [ 143.505790][ T7193] ? _raw_read_unlock+0x25/0x40 [ 143.510471][ T7193] ? __ext4_journal_start_sb+0x24d/0x4b0 [ 143.515940][ T7193] ? ext4_ext_release+0x10/0x10 [ 143.520635][ T7193] ? _raw_read_unlock+0x25/0x40 [ 143.525318][ T7193] ? ext4_es_lookup_extent+0x33b/0x950 [ 143.530610][ T7193] ext4_map_blocks+0xa36/0x1ca0 [ 143.535297][ T7193] ? slab_post_alloc_hook+0x72/0x2c0 [ 143.540418][ T7193] ? ext4_issue_zeroout+0x250/0x250 [ 143.545452][ T7193] ? __ext4_journal_start_sb+0x24d/0x4b0 [ 143.550917][ T7193] ext4_alloc_file_blocks+0x3d5/0xcd0 [ 143.556214][ T7193] ? trace_ext4_fallocate_enter+0x160/0x160 [ 143.561945][ T7193] ext4_fallocate+0x942/0x1e90 [ 143.566543][ T7193] ? avc_policy_seqno+0x1b/0x70 [ 143.571226][ T7193] ? selinux_file_permission+0x2bb/0x560 [ 143.576693][ T7193] ? ext4_ext_truncate+0x320/0x320 [ 143.581643][ T7193] ? fsnotify_perm+0x6a/0x5d0 [ 143.586155][ T7193] vfs_fallocate+0x492/0x570 [ 143.590586][ T7193] do_vfs_ioctl+0x2150/0x29a0 [ 143.595099][ T7193] ? kstrtouint_from_user+0x124/0x180 [ 143.600301][ T7193] ? __x64_compat_sys_ioctl+0x90/0x90 [ 143.605514][ T7193] ? kstrtol_from_user+0x180/0x180 [ 143.610458][ T7193] ? cgroup_rstat_updated+0xe5/0x370 [ 143.615577][ T7193] ? __alloc_pages+0x3a1/0x780 [ 143.620177][ T7193] ? ioctl_has_perm+0x1f8/0x560 [ 143.624868][ T7193] ? ioctl_has_perm+0x3f0/0x560 [ 143.629639][ T7193] ? has_cap_mac_admin+0x3c0/0x3c0 [ 143.634585][ T7193] ? vfs_write+0xbb3/0xeb0 [ 143.638841][ T7193] ? selinux_file_ioctl+0x3cc/0x540 [ 143.643873][ T7193] ? __mutex_lock_slowpath+0x10/0x10 [ 143.649086][ T7193] ? selinux_file_alloc_security+0x120/0x120 [ 143.654902][ T7193] ? __fget_files+0x2cb/0x330 [ 143.659409][ T7193] ? security_file_ioctl+0x84/0xb0 [ 143.664362][ T7193] __se_sys_ioctl+0x99/0x190 [ 143.668780][ T7193] __x64_sys_ioctl+0x7b/0x90 [ 143.673208][ T7193] do_syscall_64+0x3d/0xb0 [ 143.677460][ T7193] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 143.683189][ T7193] RIP: 0033:0x7fcfa467d0a9 [ 143.687880][ T7193] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 143.707316][ T7193] RSP: 002b:00007fcfa54710c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.715561][ T7193] RAX: ffffffffffffffda RBX: 00007fcfa47b3f80 RCX: 00007fcfa467d0a9 [ 143.723466][ T7193] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000006 [ 143.731270][ T7193] RBP: 00007fcfa5471120 R08: 0000000000000000 R09: 0000000000000000 [ 143.739082][ T7193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.746894][ T7193] R13: 000000000000000b R14: 00007fcfa47b3f80 R15: 00007fff261e1ba8 [ 143.754717][ T7193] [ 144.280830][ T7240] FAULT_INJECTION: forcing a failure. [ 144.280830][ T7240] name failslab, interval 1, probability 0, space 0, times 0 [ 144.295617][ T7240] CPU: 1 PID: 7240 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 144.306045][ T7240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 144.315939][ T7240] Call Trace: [ 144.319057][ T7240] [ 144.321837][ T7240] dump_stack_lvl+0x151/0x1b7 [ 144.326561][ T7240] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 144.332535][ T7240] dump_stack+0x15/0x1b [ 144.336506][ T7240] should_fail_ex+0x3d0/0x520 [ 144.341030][ T7240] ? kvmalloc_node+0x221/0x640 [ 144.345619][ T7240] __should_failslab+0xaf/0xf0 [ 144.350292][ T7240] should_failslab+0x9/0x20 [ 144.354648][ T7240] __kmem_cache_alloc_node+0x3d/0x250 [ 144.359855][ T7240] ? kasan_save_alloc_info+0x1f/0x30 [ 144.365525][ T7240] ? kvmalloc_node+0x221/0x640 [ 144.370124][ T7240] __kmalloc_node+0xa3/0x1e0 [ 144.374553][ T7240] kvmalloc_node+0x221/0x640 [ 144.378978][ T7240] ? vm_mmap+0xb0/0xb0 [ 144.382881][ T7240] ? memset+0x35/0x40 [ 144.386710][ T7240] alloc_netdev_mqs+0xa31/0xf90 [ 144.391392][ T7240] vti6_locate+0x552/0x6a0 [ 144.395727][ T7240] ? irqentry_exit+0x30/0x40 [ 144.400156][ T7240] ? vti6_link_config+0x570/0x570 [ 144.405018][ T7240] ? vti6_siocdevprivate+0x9de/0x17e0 [ 144.410406][ T7240] ? memcpy+0x56/0x70 [ 144.414222][ T7240] vti6_siocdevprivate+0xa02/0x17e0 [ 144.419261][ T7240] ? vti6_tnl_xmit+0x1a80/0x1a80 [ 144.424035][ T7240] ? kstrtol_from_user+0x180/0x180 [ 144.428983][ T7240] ? full_name_hash+0xba/0xf0 [ 144.433495][ T7240] dev_ifsioc+0xd40/0x1150 [ 144.437831][ T7240] ? ioctl_has_perm+0x3f0/0x560 [ 144.442516][ T7240] ? dev_ioctl+0xe60/0xe60 [ 144.446768][ T7240] ? __kasan_check_write+0x14/0x20 [ 144.451716][ T7240] ? mutex_lock+0xb1/0x1e0 [ 144.455969][ T7240] ? bit_wait_io_timeout+0x120/0x120 [ 144.461181][ T7240] dev_ioctl+0x5e9/0xe60 [ 144.465430][ T7240] sock_ioctl+0x665/0x740 [ 144.469599][ T7240] ? sock_poll+0x400/0x400 [ 144.473851][ T7240] ? security_file_ioctl+0x84/0xb0 [ 144.478806][ T7240] ? sock_poll+0x400/0x400 [ 144.483048][ T7240] __se_sys_ioctl+0x114/0x190 [ 144.487567][ T7240] __x64_sys_ioctl+0x7b/0x90 [ 144.491992][ T7240] do_syscall_64+0x3d/0xb0 [ 144.496241][ T7240] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.501971][ T7240] RIP: 0033:0x7f080c47d0a9 [ 144.506220][ T7240] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 144.525669][ T7240] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 144.533911][ T7240] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 144.541724][ T7240] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 000000000000000b [ 144.549532][ T7240] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 144.557432][ T7240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.565241][ T7240] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 144.573061][ T7240] [ 144.819311][ T7265] FAULT_INJECTION: forcing a failure. [ 144.819311][ T7265] name failslab, interval 1, probability 0, space 0, times 0 [ 144.852206][ T7265] CPU: 1 PID: 7265 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 144.862105][ T7265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 144.872000][ T7265] Call Trace: [ 144.875120][ T7265] [ 144.877900][ T7265] dump_stack_lvl+0x151/0x1b7 [ 144.882421][ T7265] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 144.887711][ T7265] dump_stack+0x15/0x1b [ 144.891701][ T7265] should_fail_ex+0x3d0/0x520 [ 144.896222][ T7265] ? ext4_alloc_io_end_vec+0x2a/0x170 [ 144.901436][ T7265] __should_failslab+0xaf/0xf0 [ 144.906025][ T7265] should_failslab+0x9/0x20 [ 144.910362][ T7265] kmem_cache_alloc+0x3b/0x2c0 [ 144.914964][ T7265] ext4_alloc_io_end_vec+0x2a/0x170 [ 144.919999][ T7265] ext4_writepages+0x13b4/0x3fd0 [ 144.924770][ T7265] ? __kasan_slab_free+0x11/0x20 [ 144.929543][ T7265] ? generic_write_end+0x202/0x300 [ 144.934488][ T7265] ? ksys_write+0x199/0x2c0 [ 144.938828][ T7265] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 144.944733][ T7265] ? ext4_read_folio+0x240/0x240 [ 144.949611][ T7265] ? jbd2_journal_stop+0x82c/0xc70 [ 144.954540][ T7265] ? ext4_read_folio+0x240/0x240 [ 144.959309][ T7265] do_writepages+0x385/0x620 [ 144.963912][ T7265] ? __writepage+0x130/0x130 [ 144.968372][ T7265] ? __kasan_check_write+0x14/0x20 [ 144.973286][ T7265] ? __kasan_check_write+0x14/0x20 [ 144.978230][ T7265] ? _raw_spin_lock+0xa4/0x1b0 [ 144.982836][ T7265] ? _raw_spin_unlock+0x4c/0x70 [ 144.987519][ T7265] ? __mark_inode_dirty+0x54e/0xa60 [ 144.992551][ T7265] filemap_fdatawrite_wbc+0x153/0x1b0 [ 144.997757][ T7265] file_write_and_wait_range+0x1ca/0x2b0 [ 145.003227][ T7265] ? __filemap_set_wb_err+0x130/0x130 [ 145.008434][ T7265] ? generic_perform_write+0x520/0x5c0 [ 145.013729][ T7265] ext4_sync_file+0x1a2/0xa50 [ 145.018244][ T7265] vfs_fsync_range+0x17b/0x190 [ 145.022842][ T7265] ext4_buffered_write_iter+0x587/0x640 [ 145.028222][ T7265] ext4_file_write_iter+0x194/0x1570 [ 145.033345][ T7265] ? cgroup_rstat_updated+0xe5/0x370 [ 145.038465][ T7265] ? __alloc_pages+0x3a1/0x780 [ 145.043071][ T7265] ? avc_policy_seqno+0x1b/0x70 [ 145.047748][ T7265] ? ext4_file_read_iter+0x470/0x470 [ 145.052872][ T7265] ? fsnotify_perm+0x6a/0x5d0 [ 145.057388][ T7265] vfs_write+0x902/0xeb0 [ 145.061468][ T7265] ? file_end_write+0x1c0/0x1c0 [ 145.066498][ T7265] ? mutex_lock+0xb1/0x1e0 [ 145.070926][ T7265] ? bit_wait_io_timeout+0x120/0x120 [ 145.076046][ T7265] ? __fdget_pos+0x2e2/0x390 [ 145.080468][ T7265] ? ksys_write+0x77/0x2c0 [ 145.084823][ T7265] ksys_write+0x199/0x2c0 [ 145.089134][ T7265] ? __ia32_sys_read+0x90/0x90 [ 145.093724][ T7265] ? debug_smp_processor_id+0x17/0x20 [ 145.098932][ T7265] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 145.105104][ T7265] __x64_sys_write+0x7b/0x90 [ 145.109526][ T7265] do_syscall_64+0x3d/0xb0 [ 145.113860][ T7265] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 145.119586][ T7265] RIP: 0033:0x7f3ce427d0a9 [ 145.123838][ T7265] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 145.143282][ T7265] RSP: 002b:00007f3ce508d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 145.151698][ T7265] RAX: ffffffffffffffda RBX: 00007f3ce43b3f80 RCX: 00007f3ce427d0a9 [ 145.159536][ T7265] RDX: 0000000000000009 RSI: 0000000020000140 RDI: 0000000000000004 [ 145.167409][ T7265] RBP: 00007f3ce508d120 R08: 0000000000000000 R09: 0000000000000000 [ 145.175306][ T7265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.183115][ T7265] R13: 000000000000000b R14: 00007f3ce43b3f80 R15: 00007ffc5dc5e8d8 [ 145.190934][ T7265] [ 146.286585][ T7318] FAULT_INJECTION: forcing a failure. [ 146.286585][ T7318] name failslab, interval 1, probability 0, space 0, times 0 [ 146.300131][ T7318] CPU: 0 PID: 7318 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 146.310025][ T7318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 146.319917][ T7318] Call Trace: [ 146.323039][ T7318] [ 146.325815][ T7318] dump_stack_lvl+0x151/0x1b7 [ 146.330330][ T7318] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 146.335623][ T7318] ? kasan_quarantine_put+0x34/0x1a0 [ 146.340745][ T7318] ? ext4_release_io_end+0x282/0x2d0 [ 146.345876][ T7318] dump_stack+0x15/0x1b [ 146.349953][ T7318] should_fail_ex+0x3d0/0x520 [ 146.354722][ T7318] ? ext4_init_io_end+0x29/0x120 [ 146.359665][ T7318] __should_failslab+0xaf/0xf0 [ 146.364266][ T7318] should_failslab+0x9/0x20 [ 146.368613][ T7318] kmem_cache_alloc+0x3b/0x2c0 [ 146.373204][ T7318] ext4_init_io_end+0x29/0x120 [ 146.377806][ T7318] ext4_writepages+0xe5f/0x3fd0 [ 146.382502][ T7318] ? __kasan_slab_free+0x11/0x20 [ 146.387267][ T7318] ? generic_write_end+0x202/0x300 [ 146.392216][ T7318] ? ksys_write+0x199/0x2c0 [ 146.396550][ T7318] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 146.402460][ T7318] ? ext4_read_folio+0x240/0x240 [ 146.407671][ T7318] ? domain_dirty_limits+0x28a/0x3c0 [ 146.412794][ T7318] ? balance_dirty_pages+0x20c6/0x2410 [ 146.418092][ T7318] ? jbd2_journal_stop+0x82c/0xc70 [ 146.423033][ T7318] ? ext4_read_folio+0x240/0x240 [ 146.427803][ T7318] do_writepages+0x385/0x620 [ 146.432236][ T7318] ? __writepage+0x130/0x130 [ 146.436660][ T7318] ? __kasan_check_write+0x14/0x20 [ 146.441605][ T7318] ? _raw_spin_lock+0xa4/0x1b0 [ 146.446297][ T7318] ? _raw_spin_unlock+0x4c/0x70 [ 146.450978][ T7318] ? __mark_inode_dirty+0x54e/0xa60 [ 146.456014][ T7318] filemap_fdatawrite_wbc+0x153/0x1b0 [ 146.461228][ T7318] file_write_and_wait_range+0x1ca/0x2b0 [ 146.466691][ T7318] ? __filemap_set_wb_err+0x130/0x130 [ 146.472330][ T7318] ? generic_perform_write+0x520/0x5c0 [ 146.477626][ T7318] ext4_sync_file+0x1a2/0xa50 [ 146.482136][ T7318] vfs_fsync_range+0x17b/0x190 [ 146.486739][ T7318] ext4_buffered_write_iter+0x587/0x640 [ 146.492119][ T7318] ext4_file_write_iter+0x194/0x1570 [ 146.497238][ T7318] ? cgroup_rstat_updated+0xe5/0x370 [ 146.502360][ T7318] ? __alloc_pages+0x3a1/0x780 [ 146.506959][ T7318] ? avc_policy_seqno+0x1b/0x70 [ 146.511646][ T7318] ? ext4_file_read_iter+0x470/0x470 [ 146.516764][ T7318] ? fsnotify_perm+0x6a/0x5d0 [ 146.521280][ T7318] vfs_write+0x902/0xeb0 [ 146.525361][ T7318] ? file_end_write+0x1c0/0x1c0 [ 146.530220][ T7318] ? mutex_lock+0xb1/0x1e0 [ 146.534473][ T7318] ? bit_wait_io_timeout+0x120/0x120 [ 146.539596][ T7318] ? __fdget_pos+0x2e2/0x390 [ 146.544018][ T7318] ? ksys_write+0x77/0x2c0 [ 146.548273][ T7318] ksys_write+0x199/0x2c0 [ 146.552442][ T7318] ? __ia32_sys_read+0x90/0x90 [ 146.557037][ T7318] ? debug_smp_processor_id+0x17/0x20 [ 146.562258][ T7318] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 146.568324][ T7318] __x64_sys_write+0x7b/0x90 [ 146.572835][ T7318] do_syscall_64+0x3d/0xb0 [ 146.577086][ T7318] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 146.582818][ T7318] RIP: 0033:0x7fcbe887d0a9 [ 146.587068][ T7318] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 146.606509][ T7318] RSP: 002b:00007fcbe96300c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 146.614755][ T7318] RAX: ffffffffffffffda RBX: 00007fcbe89b3f80 RCX: 00007fcbe887d0a9 [ 146.622565][ T7318] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000007 [ 146.630377][ T7318] RBP: 00007fcbe9630120 R08: 0000000000000000 R09: 0000000000000000 [ 146.638188][ T7318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.646085][ T7318] R13: 000000000000000b R14: 00007fcbe89b3f80 R15: 00007ffd608451f8 [ 146.653904][ T7318] [ 146.668083][ T7309] device syzkaller0 entered promiscuous mode [ 148.187521][ T28] audit: type=1400 audit(1719119393.526:152): avc: denied { create } for pid=7376 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 148.712424][ T7399] FAULT_INJECTION: forcing a failure. [ 148.712424][ T7399] name failslab, interval 1, probability 0, space 0, times 0 [ 148.859584][ T7399] CPU: 0 PID: 7399 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 148.869488][ T7399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 148.879381][ T7399] Call Trace: [ 148.882504][ T7399] [ 148.885283][ T7399] dump_stack_lvl+0x151/0x1b7 [ 148.889798][ T7399] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 148.895177][ T7399] dump_stack+0x15/0x1b [ 148.899177][ T7399] should_fail_ex+0x3d0/0x520 [ 148.903682][ T7399] ? ext4_find_extent+0x370/0xdb0 [ 148.908544][ T7399] __should_failslab+0xaf/0xf0 [ 148.913145][ T7399] should_failslab+0x9/0x20 [ 148.917481][ T7399] __kmem_cache_alloc_node+0x3d/0x250 [ 148.922774][ T7399] ? 0xffffffffa00007e8 [ 148.926766][ T7399] ? is_bpf_text_address+0x172/0x190 [ 148.931892][ T7399] ? ext4_find_extent+0x370/0xdb0 [ 148.936749][ T7399] __kmalloc+0xa3/0x1e0 [ 148.940742][ T7399] ext4_find_extent+0x370/0xdb0 [ 148.945431][ T7399] ext4_ext_map_blocks+0x255/0x71e0 [ 148.950462][ T7399] ? stack_trace_save+0x113/0x1c0 [ 148.955327][ T7399] ? kasan_set_track+0x60/0x70 [ 148.959919][ T7399] ? kasan_set_track+0x4b/0x70 [ 148.964520][ T7399] ? kasan_save_alloc_info+0x1f/0x30 [ 148.969639][ T7399] ? __kasan_slab_alloc+0x6c/0x80 [ 148.974501][ T7399] ? slab_post_alloc_hook+0x53/0x2c0 [ 148.979709][ T7399] ? kmem_cache_alloc+0x175/0x2c0 [ 148.984570][ T7399] ? ext4_ext_release+0x10/0x10 [ 148.989262][ T7399] ? filemap_write_and_wait_range+0x1a4/0x290 [ 148.997332][ T7399] ? __iomap_dio_rw+0xb4a/0x20a0 [ 149.002316][ T7399] ? iomap_dio_rw+0x41/0x90 [ 149.006653][ T7399] ? ext4_file_write_iter+0x11a5/0x1570 [ 149.012179][ T7399] ? vfs_write+0x902/0xeb0 [ 149.016374][ T7399] ? ksys_write+0x199/0x2c0 [ 149.020711][ T7399] ? __x64_sys_write+0x7b/0x90 [ 149.025308][ T7399] ? do_syscall_64+0x3d/0xb0 [ 149.029737][ T7399] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 149.035647][ T7399] ? _raw_read_unlock+0x25/0x40 [ 149.040325][ T7399] ? ext4_es_lookup_extent+0x33b/0x950 [ 149.045623][ T7399] ext4_map_blocks+0xa36/0x1ca0 [ 149.050307][ T7399] ? slab_post_alloc_hook+0x72/0x2c0 [ 149.055869][ T7399] ? ext4_issue_zeroout+0x250/0x250 [ 149.060899][ T7399] ? ext4_inode_journal_mode+0x3ab/0x470 [ 149.066366][ T7399] ext4_writepages+0x17b5/0x3fd0 [ 149.071162][ T7399] ? ext4_read_folio+0x240/0x240 [ 149.075910][ T7399] ? 0xffffffffa00007e8 [ 149.079903][ T7399] ? is_bpf_text_address+0x172/0x190 [ 149.085023][ T7399] ? stack_trace_save+0x1c0/0x1c0 [ 149.089882][ T7399] ? kernel_text_address+0xa9/0xe0 [ 149.094830][ T7399] ? __kernel_text_address+0xd/0x40 [ 149.099869][ T7399] ? unwind_get_return_address+0x4d/0x90 [ 149.105421][ T7399] ? stack_trace_save+0x113/0x1c0 [ 149.110279][ T7399] ? stack_trace_snprint+0xf0/0xf0 [ 149.115226][ T7399] ? ext4_read_folio+0x240/0x240 [ 149.120001][ T7399] do_writepages+0x385/0x620 [ 149.124427][ T7399] ? __writepage+0x130/0x130 [ 149.128852][ T7399] ? kasan_set_track+0x60/0x70 [ 149.133451][ T7399] ? kasan_set_track+0x4b/0x70 [ 149.138052][ T7399] ? kasan_save_alloc_info+0x1f/0x30 [ 149.143175][ T7399] ? __kasan_kmalloc+0x9c/0xb0 [ 149.147787][ T7399] ? kmalloc_trace+0x44/0xa0 [ 149.152205][ T7399] ? __iomap_dio_rw+0x320/0x20a0 [ 149.156974][ T7399] ? iomap_dio_rw+0x41/0x90 [ 149.161314][ T7399] ? ext4_file_write_iter+0x11a5/0x1570 [ 149.166695][ T7399] ? vfs_write+0x902/0xeb0 [ 149.170948][ T7399] ? ksys_write+0x199/0x2c0 [ 149.175286][ T7399] ? __kasan_check_write+0x14/0x20 [ 149.180234][ T7399] ? _raw_spin_lock+0xa4/0x1b0 [ 149.184834][ T7399] ? _raw_spin_unlock+0x4c/0x70 [ 149.189523][ T7399] filemap_fdatawrite_wbc+0x153/0x1b0 [ 149.194737][ T7399] filemap_write_and_wait_range+0x1a4/0x290 [ 149.200460][ T7399] ? filemap_range_has_writeback+0x620/0x620 [ 149.206453][ T7399] ? kasan_save_alloc_info+0x1f/0x30 [ 149.211570][ T7399] ? __kasan_kmalloc+0x9c/0xb0 [ 149.216190][ T7399] __iomap_dio_rw+0xb4a/0x20a0 [ 149.220774][ T7399] ? iomap_dio_complete_work+0x70/0x70 [ 149.226067][ T7399] ? jbd2_journal_stop+0x82c/0xc70 [ 149.231011][ T7399] ? jbd2_journal_start_reserved+0x410/0x410 [ 149.237019][ T7399] ? ext4_fc_replay_link_internal+0x340/0x340 [ 149.242898][ T7399] iomap_dio_rw+0x41/0x90 [ 149.247403][ T7399] ext4_file_write_iter+0x11a5/0x1570 [ 149.252697][ T7399] ? ext4_file_write_iter+0x761/0x1570 [ 149.257991][ T7399] ? ext4_file_read_iter+0x470/0x470 [ 149.263103][ T7399] ? fsnotify_perm+0x6a/0x5d0 [ 149.267619][ T7399] vfs_write+0x902/0xeb0 [ 149.271699][ T7399] ? file_end_write+0x1c0/0x1c0 [ 149.276384][ T7399] ? mutex_lock+0xb1/0x1e0 [ 149.280640][ T7399] ? bit_wait_io_timeout+0x120/0x120 [ 149.285763][ T7399] ? __fdget_pos+0x2e2/0x390 [ 149.290181][ T7399] ? ksys_write+0x77/0x2c0 [ 149.294447][ T7399] ksys_write+0x199/0x2c0 [ 149.298601][ T7399] ? __ia32_sys_read+0x90/0x90 [ 149.303200][ T7399] ? debug_smp_processor_id+0x17/0x20 [ 149.308411][ T7399] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 149.314310][ T7399] __x64_sys_write+0x7b/0x90 [ 149.318826][ T7399] do_syscall_64+0x3d/0xb0 [ 149.323081][ T7399] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 149.328898][ T7399] RIP: 0033:0x7f080c47d0a9 [ 149.333145][ T7399] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 149.352675][ T7399] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 149.360920][ T7399] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 149.368735][ T7399] RDX: 000000000000004f RSI: 0000000020000280 RDI: 0000000000000008 [ 149.376538][ T7399] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 149.384354][ T7399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.392507][ T7399] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 149.400478][ T7399] [ 150.108684][ T7451] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 49 (only 8 groups) [ 151.775875][ T7537] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 152.102454][ T7555] device syzkaller0 entered promiscuous mode [ 152.832028][ T7580] device syzkaller0 entered promiscuous mode [ 153.278264][ T7601] FAULT_INJECTION: forcing a failure. [ 153.278264][ T7601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.319607][ T7601] CPU: 1 PID: 7601 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 153.329604][ T7601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 153.339513][ T7601] Call Trace: [ 153.342698][ T7601] [ 153.345560][ T7601] dump_stack_lvl+0x151/0x1b7 [ 153.350086][ T7601] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 153.355367][ T7601] ? __stack_depot_save+0x36/0x480 [ 153.360315][ T7601] dump_stack+0x15/0x1b [ 153.364315][ T7601] should_fail_ex+0x3d0/0x520 [ 153.368820][ T7601] should_fail_alloc_page+0x68/0x90 [ 153.374028][ T7601] __alloc_pages+0x1f4/0x780 [ 153.378469][ T7601] ? prep_new_page+0x110/0x110 [ 153.383051][ T7601] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 153.388696][ T7601] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 153.394684][ T7601] __get_free_pages+0xe/0x30 [ 153.399455][ T7601] kasan_populate_vmalloc_pte+0x39/0x130 [ 153.404938][ T7601] ? __apply_to_page_range+0x8ca/0xbe0 [ 153.410406][ T7601] __apply_to_page_range+0x8dd/0xbe0 [ 153.415570][ T7601] ? kasan_populate_vmalloc+0x70/0x70 [ 153.420831][ T7601] ? kasan_populate_vmalloc+0x70/0x70 [ 153.426035][ T7601] apply_to_page_range+0x3b/0x50 [ 153.430811][ T7601] kasan_populate_vmalloc+0x65/0x70 [ 153.435844][ T7601] alloc_vmap_area+0x1961/0x1aa0 [ 153.440620][ T7601] ? vm_map_ram+0x940/0x940 [ 153.444954][ T7601] ? __kasan_kmalloc+0x9c/0xb0 [ 153.449726][ T7601] ? kmalloc_node_trace+0x3d/0xb0 [ 153.454586][ T7601] __get_vm_area_node+0x171/0x370 [ 153.459449][ T7601] __vmalloc_node_range+0x36e/0x1540 [ 153.464571][ T7601] ? array_map_alloc+0x278/0x6d0 [ 153.469427][ T7601] ? memset_erms+0xb/0x10 [ 153.473599][ T7601] ? vmap+0x2b0/0x2b0 [ 153.477413][ T7601] ? cap_capable+0x1d2/0x270 [ 153.481846][ T7601] bpf_map_area_alloc+0xdc/0xf0 [ 153.486527][ T7601] ? array_map_alloc+0x278/0x6d0 [ 153.491300][ T7601] array_map_alloc+0x278/0x6d0 [ 153.495903][ T7601] map_create+0x44a/0xcf0 [ 153.500066][ T7601] __sys_bpf+0x2e6/0x7f0 [ 153.504142][ T7601] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 153.509354][ T7601] ? debug_smp_processor_id+0x17/0x20 [ 153.514562][ T7601] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 153.520463][ T7601] __x64_sys_bpf+0x7c/0x90 [ 153.524715][ T7601] do_syscall_64+0x3d/0xb0 [ 153.528967][ T7601] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 153.534610][ T7601] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 153.540337][ T7601] RIP: 0033:0x7f080c47d0a9 [ 153.544588][ T7601] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 153.564030][ T7601] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 153.572275][ T7601] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 153.580260][ T7601] RDX: 0000000000000048 RSI: 0000000020000340 RDI: 0000000000000000 [ 153.588074][ T7601] RBP: 00007f080d20d120 R08: 0000000000000000 R09: 0000000000000000 [ 153.595884][ T7601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.603782][ T7601] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 153.611617][ T7601] [ 154.579604][ T4666] device veth1_macvtap left promiscuous mode [ 154.713371][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.720410][ T7630] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.727872][ T7630] device bridge_slave_0 entered promiscuous mode [ 154.734851][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.741784][ T7630] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.749697][ T7630] device bridge_slave_1 entered promiscuous mode [ 154.817006][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.823893][ T7630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.831003][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.837756][ T7630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.847820][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.868578][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.910865][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.918520][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.932502][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.942057][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.950933][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.957797][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.965097][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.973329][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.981630][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.988669][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.006679][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.014980][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.022926][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.031460][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.039475][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.047713][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.060496][ T7630] device veth0_vlan entered promiscuous mode [ 155.069145][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.077291][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.091855][ T7630] device veth1_macvtap entered promiscuous mode [ 155.098658][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.106183][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.114136][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.122410][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.130523][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.146008][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.155129][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.163777][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.172033][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.235364][ T7644] device pim6reg1 entered promiscuous mode [ 155.290046][ T7643] device pim6reg1 entered promiscuous mode [ 155.424513][ T7650] FAULT_INJECTION: forcing a failure. [ 155.424513][ T7650] name failslab, interval 1, probability 0, space 0, times 0 [ 155.438181][ T7650] CPU: 0 PID: 7650 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 155.448159][ T7650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 155.458235][ T7650] Call Trace: [ 155.461349][ T7650] [ 155.464127][ T7650] dump_stack_lvl+0x151/0x1b7 [ 155.468731][ T7650] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 155.474033][ T7650] dump_stack+0x15/0x1b [ 155.478010][ T7650] should_fail_ex+0x3d0/0x520 [ 155.482527][ T7650] ? ext4_mb_new_blocks+0xf3d/0x48f0 [ 155.487646][ T7650] __should_failslab+0xaf/0xf0 [ 155.492269][ T7650] should_failslab+0x9/0x20 [ 155.496672][ T7650] kmem_cache_alloc+0x3b/0x2c0 [ 155.501271][ T7650] ? ext4_mb_new_blocks+0x5b2/0x48f0 [ 155.506394][ T7650] ext4_mb_new_blocks+0xf3d/0x48f0 [ 155.511343][ T7650] ? __kasan_kmalloc+0x9c/0xb0 [ 155.516030][ T7650] ? ext4_mb_pa_callback+0xd0/0xd0 [ 155.521059][ T7650] ? ext4_ext_search_right+0x4f5/0x900 [ 155.526358][ T7650] ? ext4_inode_to_goal_block+0x35c/0x4b0 [ 155.531908][ T7650] ? ext4_ext_find_goal+0x117/0x200 [ 155.536945][ T7650] ext4_ext_map_blocks+0x19ca/0x71e0 [ 155.542343][ T7650] ? ext4_ext_map_blocks+0x259b/0x71e0 [ 155.547636][ T7650] ? ext4_ext_map_blocks+0x259b/0x71e0 [ 155.552927][ T7650] ? kfree+0x7a/0xf0 [ 155.556658][ T7650] ? ext4_ext_release+0x10/0x10 [ 155.561350][ T7650] ? _raw_read_unlock+0x25/0x40 [ 155.566030][ T7650] ? ext4_es_lookup_extent+0x33b/0x950 [ 155.571336][ T7650] ext4_map_blocks+0xa36/0x1ca0 [ 155.576012][ T7650] ? ext4_mark_iloc_dirty+0x170b/0x1970 [ 155.581402][ T7650] ? ext4_issue_zeroout+0x250/0x250 [ 155.586426][ T7650] ? _raw_read_unlock+0x25/0x40 [ 155.591121][ T7650] ? up_read+0x55/0x170 [ 155.595156][ T7650] ext4_getblk+0x1eb/0x7b0 [ 155.599378][ T7650] ? ext4_get_block_unwritten+0x110/0x110 [ 155.604914][ T7650] ? __kasan_check_write+0x14/0x20 [ 155.609862][ T7650] ext4_bread+0x2f/0x180 [ 155.614065][ T7650] ext4_append+0x31f/0x5b0 [ 155.618315][ T7650] ? ext4_init_new_dir+0x620/0x620 [ 155.623266][ T7650] ext4_init_new_dir+0x33f/0x620 [ 155.628039][ T7650] ? ext4_init_dot_dotdot+0x5d0/0x5d0 [ 155.633247][ T7650] ext4_mkdir+0x4f2/0xce0 [ 155.637778][ T7650] ? ext4_symlink+0xc10/0xc10 [ 155.642281][ T7650] ? selinux_inode_mkdir+0x22/0x30 [ 155.648095][ T7650] ? security_inode_mkdir+0xbc/0x100 [ 155.653216][ T7650] vfs_mkdir+0x398/0x570 [ 155.657297][ T7650] do_mkdirat+0x1eb/0x450 [ 155.661469][ T7650] ? vfs_mkdir+0x570/0x570 [ 155.665717][ T7650] ? getname_flags+0x1fd/0x520 [ 155.670315][ T7650] __x64_sys_mkdir+0x6e/0x80 [ 155.674742][ T7650] do_syscall_64+0x3d/0xb0 [ 155.678990][ T7650] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 155.684721][ T7650] RIP: 0033:0x7f3ce427d0a9 [ 155.688975][ T7650] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 155.708420][ T7650] RSP: 002b:00007f3ce508d0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 155.716746][ T7650] RAX: ffffffffffffffda RBX: 00007f3ce43b3f80 RCX: 00007f3ce427d0a9 [ 155.724559][ T7650] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 155.732664][ T7650] RBP: 00007f3ce508d120 R08: 0000000000000000 R09: 0000000000000000 [ 155.740708][ T7650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 155.748605][ T7650] R13: 000000000000000b R14: 00007f3ce43b3f80 R15: 00007ffc5dc5e8d8 [ 155.756507][ T7650] [ 155.917875][ T7654] FAULT_INJECTION: forcing a failure. [ 155.917875][ T7654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 155.991504][ T7654] CPU: 0 PID: 7654 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 156.001432][ T7654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 156.011313][ T7654] Call Trace: [ 156.014426][ T7654] [ 156.017208][ T7654] dump_stack_lvl+0x151/0x1b7 [ 156.021729][ T7654] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 156.027020][ T7654] dump_stack+0x15/0x1b [ 156.031017][ T7654] should_fail_ex+0x3d0/0x520 [ 156.035522][ T7654] should_fail+0xb/0x10 [ 156.039601][ T7654] should_fail_usercopy+0x1a/0x20 [ 156.044473][ T7654] _copy_from_user+0x1e/0xc0 [ 156.048977][ T7654] generic_map_update_batch+0x4d9/0x8c0 [ 156.054356][ T7654] ? generic_map_delete_batch+0x5c0/0x5c0 [ 156.060000][ T7654] ? generic_map_delete_batch+0x5c0/0x5c0 [ 156.065558][ T7654] bpf_map_do_batch+0x4cc/0x630 [ 156.070240][ T7654] __sys_bpf+0x66b/0x7f0 [ 156.074315][ T7654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 156.079774][ T7654] ? kvm_sched_clock_read+0x18/0x40 [ 156.084826][ T7654] __x64_sys_bpf+0x7c/0x90 [ 156.089069][ T7654] do_syscall_64+0x3d/0xb0 [ 156.093567][ T7654] ? sysvec_call_function_single+0x52/0xb0 [ 156.099139][ T7654] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 156.104864][ T7654] RIP: 0033:0x7fcbe887d0a9 [ 156.109191][ T7654] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 156.128762][ T7654] RSP: 002b:00007fcbe96300c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 156.137003][ T7654] RAX: ffffffffffffffda RBX: 00007fcbe89b3f80 RCX: 00007fcbe887d0a9 [ 156.144813][ T7654] RDX: 0000000000000038 RSI: 0000000020000680 RDI: 000000000000001a [ 156.152627][ T7654] RBP: 00007fcbe9630120 R08: 0000000000000000 R09: 0000000000000000 [ 156.160437][ T7654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.168332][ T7654] R13: 000000000000000b R14: 00007fcbe89b3f80 R15: 00007ffd608451f8 [ 156.176153][ T7654] [ 156.904397][ T7707] device syzkaller0 entered promiscuous mode [ 156.938532][ T7717] syz-executor.2[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.938621][ T7717] syz-executor.2[7717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.154601][ T7725] device syzkaller0 entered promiscuous mode [ 157.907265][ T7768] syz-executor.2[7768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.907342][ T7768] syz-executor.2[7768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.924386][ T7768] syz-executor.2[7768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.936584][ T7768] syz-executor.2[7768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.281655][ T7817] device syzkaller0 entered promiscuous mode [ 158.302697][ T7817] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 158.311816][ T7817] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 159.069849][ T7859] FAULT_INJECTION: forcing a failure. [ 159.069849][ T7859] name failslab, interval 1, probability 0, space 0, times 0 [ 159.072479][ T7856] device vxcan1 entered promiscuous mode [ 159.271138][ T7859] CPU: 0 PID: 7859 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 159.281045][ T7859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 159.290950][ T7859] Call Trace: [ 159.294059][ T7859] [ 159.296839][ T7859] dump_stack_lvl+0x151/0x1b7 [ 159.301351][ T7859] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 159.306647][ T7859] dump_stack+0x15/0x1b [ 159.310639][ T7859] should_fail_ex+0x3d0/0x520 [ 159.315155][ T7859] ? __alloc_skb+0xcc/0x2d0 [ 159.319578][ T7859] __should_failslab+0xaf/0xf0 [ 159.324528][ T7859] should_failslab+0x9/0x20 [ 159.328864][ T7859] kmem_cache_alloc_node+0x3e/0x2d0 [ 159.333900][ T7859] __alloc_skb+0xcc/0x2d0 [ 159.338079][ T7859] alloc_skb_with_frags+0xa6/0x680 [ 159.343360][ T7859] ? __kasan_check_write+0x14/0x20 [ 159.348313][ T7859] ? __set_page_owner_handle+0x38a/0x3d0 [ 159.353782][ T7859] sock_alloc_send_pskb+0x915/0xa50 [ 159.358814][ T7859] ? sock_kzfree_s+0x60/0x60 [ 159.363232][ T7859] ? kstrtoull+0x1cd/0x2e0 [ 159.367486][ T7859] ? iov_iter_advance+0x98/0x1b0 [ 159.372258][ T7859] tun_get_user+0xfaf/0x3a90 [ 159.376692][ T7859] ? _kstrtol+0x150/0x150 [ 159.380883][ T7859] ? tun_do_read+0x1ee0/0x1ee0 [ 159.385448][ T7859] ? ref_tracker_alloc+0x31d/0x450 [ 159.390398][ T7859] ? ref_tracker_dir_print+0x160/0x160 [ 159.395695][ T7859] ? avc_policy_seqno+0x1b/0x70 [ 159.400379][ T7859] ? tun_get+0xe9/0x120 [ 159.404456][ T7859] tun_chr_write_iter+0x129/0x210 [ 159.409327][ T7859] vfs_write+0x902/0xeb0 [ 159.413398][ T7859] ? file_end_write+0x1c0/0x1c0 [ 159.418083][ T7859] ? __fget_files+0x2cb/0x330 [ 159.422610][ T7859] ? __fdget_pos+0x204/0x390 [ 159.427021][ T7859] ? ksys_write+0x77/0x2c0 [ 159.431286][ T7859] ksys_write+0x199/0x2c0 [ 159.435447][ T7859] ? __ia32_sys_read+0x90/0x90 [ 159.440049][ T7859] ? debug_smp_processor_id+0x17/0x20 [ 159.445253][ T7859] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.451251][ T7859] __x64_sys_write+0x7b/0x90 [ 159.456021][ T7859] do_syscall_64+0x3d/0xb0 [ 159.460268][ T7859] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 159.465993][ T7859] RIP: 0033:0x7fb7c4c7d0a9 [ 159.470246][ T7859] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.489773][ T7859] RSP: 002b:00007fb7c597a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 159.498026][ T7859] RAX: ffffffffffffffda RBX: 00007fb7c4db4050 RCX: 00007fb7c4c7d0a9 [ 159.505831][ T7859] RDX: 000000000000ffdd RSI: 0000000020000180 RDI: 0000000000000003 [ 159.513639][ T7859] RBP: 00007fb7c597a120 R08: 0000000000000000 R09: 0000000000000000 [ 159.521450][ T7859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.529268][ T7859] R13: 000000000000006e R14: 00007fb7c4db4050 R15: 00007ffcbe536fd8 [ 159.537080][ T7859] [ 159.633743][ T7877] FAULT_INJECTION: forcing a failure. [ 159.633743][ T7877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.650620][ T7877] CPU: 0 PID: 7877 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 159.660863][ T7877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 159.670758][ T7877] Call Trace: [ 159.673880][ T7877] [ 159.676749][ T7877] dump_stack_lvl+0x151/0x1b7 [ 159.681261][ T7877] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 159.686563][ T7877] dump_stack+0x15/0x1b [ 159.690637][ T7877] should_fail_ex+0x3d0/0x520 [ 159.695154][ T7877] should_fail+0xb/0x10 [ 159.699148][ T7877] should_fail_usercopy+0x1a/0x20 [ 159.704031][ T7877] copyin+0x1e/0x90 [ 159.707656][ T7877] _copy_from_iter+0x3c9/0xe00 [ 159.712334][ T7877] ? copyout_mc+0x80/0x80 [ 159.716498][ T7877] ? copyout_mc+0x80/0x80 [ 159.721531][ T7877] copy_page_from_iter+0x1d7/0x2b0 [ 159.726483][ T7877] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 159.732123][ T7877] unix_dgram_sendmsg+0x96c/0x2050 [ 159.737071][ T7877] ? unix_dgram_poll+0x710/0x710 [ 159.742037][ T7877] unix_seqpacket_sendmsg+0x120/0x1f0 [ 159.747238][ T7877] ? unix_dgram_peer_wake_me+0x450/0x450 [ 159.752691][ T7877] ____sys_sendmsg+0x5d3/0x9a0 [ 159.757292][ T7877] ? __sys_sendmsg_sock+0x40/0x40 [ 159.762156][ T7877] __sys_sendmsg+0x2a9/0x390 [ 159.766576][ T7877] ? ____sys_sendmsg+0x9a0/0x9a0 [ 159.771353][ T7877] ? __kasan_check_write+0x14/0x20 [ 159.776299][ T7877] ? mutex_unlock+0xb2/0x260 [ 159.780726][ T7877] ? __kasan_check_write+0x14/0x20 [ 159.785675][ T7877] ? debug_smp_processor_id+0x17/0x20 [ 159.790877][ T7877] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.796780][ T7877] __x64_sys_sendmsg+0x7f/0x90 [ 159.801384][ T7877] do_syscall_64+0x3d/0xb0 [ 159.805637][ T7877] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 159.811361][ T7877] RIP: 0033:0x7fb7c4c7d0a9 [ 159.815614][ T7877] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 159.835059][ T7877] RSP: 002b:00007fb7c599b0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 159.843302][ T7877] RAX: ffffffffffffffda RBX: 00007fb7c4db3f80 RCX: 00007fb7c4c7d0a9 [ 159.851634][ T7877] RDX: 0000000000004040 RSI: 0000000020000400 RDI: 0000000000000006 [ 159.859444][ T7877] RBP: 00007fb7c599b120 R08: 0000000000000000 R09: 0000000000000000 [ 159.867255][ T7877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 159.875067][ T7877] R13: 000000000000000b R14: 00007fb7c4db3f80 R15: 00007ffcbe536fd8 [ 159.882883][ T7877] [ 160.334658][ T7901] syz-executor.4[7901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.334728][ T7901] syz-executor.4[7901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.652631][ T7901] device syzkaller0 entered promiscuous mode [ 161.126043][ T7940] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 161.231713][ T7940] bond_slave_1: mtu less than device minimum [ 161.573452][ T7955] device syzkaller0 entered promiscuous mode [ 161.850557][ T7936] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 161.858200][ T7936] #PF: supervisor instruction fetch in kernel mode [ 161.864534][ T7936] #PF: error_code(0x0010) - not-present page [ 161.870348][ T7936] PGD 11a1bc067 P4D 11a1bc067 PUD 12fb2a067 PMD 0 [ 161.876684][ T7936] Oops: 0010 [#1] PREEMPT SMP KASAN [ 161.881720][ T7936] CPU: 0 PID: 7936 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 161.891612][ T7936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 161.901596][ T7936] RIP: 0010:0x0 [ 161.904898][ T7936] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 161.912093][ T7936] RSP: 0018:ffffc900028ff908 EFLAGS: 00010246 [ 161.918429][ T7936] RAX: 1ffff1102653d297 RBX: ffff8881329e94b8 RCX: 0000000000040000 [ 161.926255][ T7936] RDX: ffffc90001189000 RSI: 0000000000023d57 RDI: ffff888169686a00 [ 161.934055][ T7936] RBP: ffffc900028ff930 R08: ffffffff841d8447 R09: ffff888100b95200 [ 161.941865][ T7936] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 161.949677][ T7936] R13: dffffc0000000000 R14: ffff888169686a00 R15: dffffc0000000000 [ 161.957576][ T7936] FS: 00007f080d20d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 161.966338][ T7936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.972765][ T7936] CR2: ffffffffffffffd6 CR3: 0000000129b3f000 CR4: 00000000003506b0 [ 161.980583][ T7936] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 161.988394][ T7936] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 161.996197][ T7936] Call Trace: 2024/06/23 05:10:07 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 161.999321][ T7936] [ 162.002098][ T7936] ? __die_body+0x62/0xb0 [ 162.006264][ T7936] ? __die+0x7e/0x90 [ 162.010000][ T7936] ? page_fault_oops+0x7f9/0xa90 [ 162.014775][ T7936] ? kernelmode_fixup_or_oops+0x270/0x270 [ 162.020326][ T7936] ? kmem_cache_free+0x291/0x510 [ 162.025102][ T7936] ? kfree_skbmem+0x104/0x170 [ 162.029612][ T7936] ? preempt_schedule_notrace+0x140/0x140 [ 162.035166][ T7936] ? is_errata93+0xc7/0x240 [ 162.039507][ T7936] ? exc_page_fault+0x537/0x700 [ 162.044196][ T7936] ? asm_exc_page_fault+0x27/0x30 [ 162.049062][ T7936] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 162.054784][ T7936] sk_psock_verdict_data_ready+0x129/0x160 [ 162.060429][ T7936] unix_stream_sendmsg+0x8fd/0x1070 [ 162.065465][ T7936] ? unix_stream_sendmsg+0x8b1/0x1070 [ 162.070670][ T7936] ? unix_show_fdinfo+0x2f0/0x2f0 [ 162.075527][ T7936] ? security_socket_sendmsg+0x82/0xb0 [ 162.080828][ T7936] ? unix_show_fdinfo+0x2f0/0x2f0 [ 162.085687][ T7936] ____sys_sendmsg+0x5d3/0x9a0 [ 162.090283][ T7936] ? __sys_sendmsg_sock+0x40/0x40 [ 162.095138][ T7936] ? __sys_sendmsg+0x28f/0x390 [ 162.099739][ T7936] ? ____sys_sendmsg+0xd/0x9a0 [ 162.104343][ T7936] __sys_sendmsg+0x2a9/0x390 [ 162.108764][ T7936] ? ____sys_sendmsg+0x9a0/0x9a0 [ 162.113622][ T7936] ? __hrtimer_run_queues+0xa72/0xad0 [ 162.118839][ T7936] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 162.124563][ T7936] ? __kasan_check_write+0x14/0x20 [ 162.129507][ T7936] ? fpregs_restore_userregs+0x130/0x290 [ 162.134976][ T7936] __x64_sys_sendmsg+0x7f/0x90 [ 162.139575][ T7936] do_syscall_64+0x3d/0xb0 [ 162.143827][ T7936] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 162.149557][ T7936] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 162.155283][ T7936] RIP: 0033:0x7f080c47d0a9 [ 162.159717][ T7936] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 162.179624][ T7936] RSP: 002b:00007f080d20d0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 162.187961][ T7936] RAX: ffffffffffffffda RBX: 00007f080c5b3f80 RCX: 00007f080c47d0a9 [ 162.195955][ T7936] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 000000000000000e [ 162.203931][ T7936] RBP: 00007f080c4ec074 R08: 0000000000000000 R09: 0000000000000000 [ 162.212279][ T7936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 162.220235][ T7936] R13: 000000000000000b R14: 00007f080c5b3f80 R15: 00007ffe2bd26918 [ 162.228058][ T7936] [ 162.230998][ T7936] Modules linked in: [ 162.234773][ T7936] CR2: 0000000000000000 [ 162.238727][ T7936] ---[ end trace 0000000000000000 ]--- [ 162.244019][ T7936] RIP: 0010:0x0 [ 162.247326][ T7936] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 162.254520][ T7936] RSP: 0018:ffffc900028ff908 EFLAGS: 00010246 [ 162.260422][ T7936] RAX: 1ffff1102653d297 RBX: ffff8881329e94b8 RCX: 0000000000040000 [ 162.268234][ T7936] RDX: ffffc90001189000 RSI: 0000000000023d57 RDI: ffff888169686a00 [ 162.276048][ T7936] RBP: ffffc900028ff930 R08: ffffffff841d8447 R09: ffff888100b95200 [ 162.283854][ T7936] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 162.291935][ T7936] R13: dffffc0000000000 R14: ffff888169686a00 R15: dffffc0000000000 [ 162.299934][ T7936] FS: 00007f080d20d6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 162.309390][ T7936] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 162.315897][ T7936] CR2: ffffffffffffffd6 CR3: 0000000129b3f000 CR4: 00000000003506b0 [ 162.323798][ T7936] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.332127][ T7936] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 162.339954][ T7936] Kernel panic - not syncing: Fatal exception [ 162.346172][ T7936] Kernel Offset: disabled [ 162.350295][ T7936] Rebooting in 86400 seconds..