last executing test programs: 2.308118418s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x1, 0x7fe2, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00'}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000880)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x15) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={0xffffffffffffffff, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000d00)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0xef, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x11, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffffa9}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r11}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0xb, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="923540628100000000000000ff7f000094000c0008f7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018560000100000000000000000000000088c4000800300009500000000000000"], &(0x7f0000000ac0)='syzkaller\x00', 0x9d0, 0x98, &(0x7f0000000b00)=""/152, 0x41000, 0x29, '\x00', r8, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000cc0)={0x0, 0x10, 0x2, 0x5}, 0x10, r9, 0xffffffffffffffff, 0x0, &(0x7f0000001080)=[r10, 0xffffffffffffffff, 0xffffffffffffffff, r11, 0xffffffffffffffff], 0x0, 0x10, 0x1ff}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_ext={0x1c, 0x17, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x1b}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @map_fd={0x18, 0x8, 0x1, 0x0, r2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x3f, 0x0, 0x0, 0x40f00, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0xe, 0x2, 0x9}, 0x10, 0x24786, r1, 0x6, &(0x7f0000000380)=[r3, r0, r0], &(0x7f00000006c0)=[{0x4, 0x5, 0x3, 0x4}, {0x4, 0x5, 0xb, 0xc}, {0x3, 0x5, 0x0, 0x8}, {0x5, 0x4, 0xe, 0xb}, {0x1, 0x1, 0x3, 0x3}, {0x1, 0x4, 0x6, 0xc}], 0x10, 0x3ff}, 0x90) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.110204668s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x5, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.594172876s ago: executing program 3: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x40010) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)=r5}, 0x15) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000280)={'\x00', 0x41}) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.parent_freezing\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000040000018110000", @ANYRES32=r8, @ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='softirq_noise\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7ffb, 0xcc}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 1.363353522s ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000000), 0x400000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x6f000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/197}, 0x20) 1.329276097s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x81, 0x1, 0x7fff, 0x1103, r0, 0x5ab, '\x00', r4, r5, 0x4, 0x5, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r3}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r8}, 0x10) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001412) 1.30783458s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r1, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r3}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r3}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x12001, 0x49, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x12001, 0x49, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000ac0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r9}, 0x10) ioctl$TUNSETOFFLOAD(r7, 0x40086607, 0x20001412) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="85d28b59d7c3763436002ffa8bb83501854dddab21d4d6000001feffff9500000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2b, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000040)={0xfffffffffffffffe, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x5008, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r13}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0x1c, &(0x7f0000000740)=ANY=[@ANYRES8=0x0, @ANYRES32=r3, @ANYRESDEC=r4, @ANYRES16=r12, @ANYBLOB="0000000000000004006e000000000000004608f0ff76000008bf987f000000000000000000000000008500000005000000b70000000000000095"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd50, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x4, 0x1c, &(0x7f0000000740)=ANY=[@ANYRES8=0x0, @ANYRES32=r3, @ANYRESDEC=r4, @ANYRES16=r12, @ANYBLOB="0000000000000004006e000000000000004608f0ff76000008bf987f000000000000000000000000008500000005000000b70000000000000095"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd50, 0x0, 0x0, 0x0}, 0x90) 1.274618185s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000400)=ANY=[@ANYRES8, @ANYRES64=0x0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000500)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000200)='ext4_es_remove_extent\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000032b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000032b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='ext4_es_remove_extent\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000240)='THAWED\x00', 0x7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg(r9, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 1.264541087s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff02000000000000000000000000030b"], 0xfdef) 1.226880953s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x1a00}, 0x48) 1.220348204s ago: executing program 2: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0xe1, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b40)={{0x1, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000b00)='%pi6 \x00'}, 0x20) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)=@o_path={&(0x7f0000000b80)='./file0\x00', 0x0, 0x10, r1}, 0x18) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x913, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x62, 0xd1c, 0xea, 0x1200, 0x1, 0x30, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2, 0x3}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000340), 0xfdef) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e00)={0x6, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="0000107b", @ANYRES32, @ANYBLOB="0000000001000000"], &(0x7f0000000340)='syzkaller\x00', 0x8, 0x7f, &(0x7f0000000380)=""/127, 0x1f00, 0x59, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x2, 0x5, 0x3, 0x1b}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[r0, r1, r2, r3, r4, r5, r6, r7, r8]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x2000) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0xa, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffbffd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc5afb38038e907b2, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffb2, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000012c0)='workqueue_activate_work\x00', r13}, 0x10) 1.217498724s ago: executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYRESOCT=r1, @ANYRES32, @ANYRES64=r0, @ANYRES8=r3, @ANYRES16, @ANYRESOCT=0x0, @ANYRESOCT=r2, @ANYBLOB="dd48b03c2fb7892368c9ae3f815d88a651ac9bebb91fdfadc329a383cead732f92f2b0bb080dd44d2f342bfba7b42c9acd970ee55b22e4c49cbaf05e154a7beb5e5d3e670c3a6ec57ba30c39f5a14872323e10f9e2eaa45f6f1ac76d42b3914bcdbbf7fbbe27fe19f52a4eb2b91d5d8eff046bc4a15b8e82367b5beb723f3a5c3f8382b3af9375711fd5af56bbdade89bb46281efcb132444e80e93e2880976d9bdacc257c25471ec0971abd89de745f415234f44a04e02e6e97d68057ae9040663bd1c09523d86420438befa330192e160a83d9f72e1fbbba66af32c23dec00c824"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='#)\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 1.212013195s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000208000000000000000000000000000200000000000000000000000602"], 0x0, 0x56}, 0x20) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0x0, 0x0, r0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r1, &(0x7f0000000d40), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 1.205724036s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000001c590000000d000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b700000000000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.173637371s ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x44, 0x0, 0x4, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ff}}, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x80) 1.150116724s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.148155145s ago: executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x900, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.140233696s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30d) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x2, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.04700613s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='THAWED\x00', 0x7) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000005970000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b700000000000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.042438101s ago: executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xb8}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xb9, &(0x7f0000000080)=""/185}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000140), &(0x7f0000000180)=r0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r1}, 0x38) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x6, [@volatile={0xb}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x7, 0x5}, {0x9, 0x1}, {0x10, 0x4}, {0xfffffffe}, {0xb, 0x5}]}, @fwd={0x6}, @volatile={0x10, 0x0, 0x0, 0x9, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x1}}, @fwd={0x1}, @typedef={0x5}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @restrict={0xf, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000005c0)=""/62, 0xca, 0x3e, 0x1, 0x10001}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r4}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000680), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0xffffffffffffffff, 0xb9f1, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{0x1}, &(0x7f0000000740), &(0x7f0000000780)=r0}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r10, &(0x7f0000000040), 0x12) 994.419658ms ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1300, 0x2}, 0x48) 900.607352ms ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x42400) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000059000d0000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b700000000000000950000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 593.45857ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x300, 0x0, 0x80008000, 0x3461, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x2, 0x4, 0x2300, 0x20}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000016c0)={0x0, &(0x7f0000000600)=""/41, &(0x7f0000000640), &(0x7f00000006c0), 0x1, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1100001f79a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000001a000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffffffff55bb2007ee51050512da90b5b42128aa090a79507df719af36349f298129da4871307b534bf901115e17392ac66ad022186a8929d1c000006146001e04aeacea799a22a2fa030000c412f6cae80043eb27d53319d0ad229e5752548300000000dbc2777df1509516f06f1330cf8c3a8b1ff72e6127b0dd488318b5790bee7ebd4745b7cdd77b85b941092314fd085f028f4e09d63781987af2abd55a87ac0394b2f92ffab7d153d62058d0a413b217369ca8b6712f000000001b1df65b3e1b9bf115646914ce53d13d0ccacda1ef16fdcceaede3faedc51d29a47fc813ce3d32cfc7a504c271d6d6f4ea6bf97f2f1be2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de7940b0000db8db03d4b7745fef1d04ec633dee254a6d491b8496da787e814c4fdf0b4a387b4c8149d18c1020029a18986252a70f8f92eb6f0e8c7db000068fbaa2e2a27efd9104297f2c58159f02d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa909ac06b57479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0ef94234db1f00000000000000c20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b35f421c3552772ca7f3e2c25a65f75ca13fb7c8bbd6ff43cb78b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41aad8bda74d66f47cc17d8ba3eec0fd80f82c5f573c6d294d366505000000da0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da323947004cacadcaff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389485ee7af1f0387c93559653f50a471c69608241730459f012b060e7d23fd39206000000000000eb55d00162325ba141bd587cc9dad46de56ef907b059b99a79ae5498f6589880ed6eea7b9c670012f80cd6a1397953ba5870786554df26236ebced9390cb6941b8365d936a7d2120eca291963eb2d537d87cbb54e588ee5d6944ee4de5c183c960119451c31539b22809e1d7f0c7a06a9fa87d64cb77872a0aa9a104e16b3b8c6e64836ac3f32f53c9a2bae513464ca03aff14b9aa4bd9539f5096412b92012e095b84c202060098df3314f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c363000000000223201780200c6ed7966130b547dbf8b497af0a77f52f2cd39000000200000e81c23cf14156951210001c800000000001500000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921e0128dfd70b438af60b060000000000000056642b49b745f3bf2c01808b6d7d748308eea09f0161b4735efbf3411738d6ee7aebf9ef40662d7836d252c566e1ee938a9a6804ed3a1079b0282a12043408cd60b9e53978c81839be0000000000456f7d2a42cb13da2022f23eaec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea394cd8ffd3d628293e591dc6f71c2710a7ea8a4fdc214e1cc275b26adfa892e6de9200000000e50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c73de2f04f15d005387577f480000ea65559eb00e014df20fa209bcbb5c252b11a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633c26d3927ae1beb065f5ac33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2b2bdc0af7c4c61241750d50515a59a3ad09e8802e8f4f535447dc0fc9d5f99a145dfcedad69da9cd4b75c624600e78f4458542b14f29611f95d4a318384eb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d583f436137a3c5dc714c9402c21d181aae59efb28d4f91652f6750b9195599d60c534ee8e8ff0755b09004c25edb85bcff24c757aa80900000000b6638c420eb4304f66e3a37aaf000000c42a570f0e9d76fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284df80e4636c25b96174326d82761c26e329555f9290af40000000000000100000fd3763655500344bae34347f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419a5c16e2055b8505809ed2ee9647c5d3b0000bc00edf5e9020c09ab004321610b857e8717974b633b21cb32f0e03280e09758bd445ab91d201782d656ab09f508bbbaca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92b32af00f191b66b6a6f732a91f0a2e9120be61e58c79d497247d278888901d44bf77e8246605a644e9e3d769db497c3960df05caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f3101985602688888ccb85c87b4f8ffffff7f000000002c331fca28541b7ca211115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000000102000000000000000000000027c9585c0cead5d619d18475ccde2857279a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77a23b0000e49666c464d35ca9b50f3ed3b3da8c17a23692759ccf5a205311b7d122532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769da52b3d42c68a3102fa1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e8918a0d6e2949affcacb5ba0a56aa063b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d395832f1e2aad3e519f1634e8fbd8d31330d89069f9448a2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4cfb0b9c8c80158b44ecae9420654f7016b0aac117087406d343e27b372d6027ab2aec8f2bcad7fe6bb932bc5751d2974e95455a277fa3b472bc7bbdd2ac5a1ea608e8137ace03361607cc1a84be659355629ab13ad49008c3fcfa2423439a3607961d5b59da48a0155e8e42cc13c702cc40c99cf86c2021d72f9f4ab1b00de555a5a39593c93871ff7eb5ecadb64837a2d88723ef65aa5152e3d55e5c66585e2112f5ec64b639a9864e57581b61f2b0960600000000000000265f091e7bce17d20604c5ab751773a5cf8a719a7ada06ed03832bf274707c7c970edc20f4a1eaa3b61045a20097208d03f7a146a6901913618738679d4e0af53eae997eecfa0dc3dcec19d3d9205450765d659200c92701ee75c8710470d9eb6f62c5c721883f1544ba66271c8dab05a933746c16b6e93294b561c6715a32a394ed1e6c01670c931bfa76c58c6f34d64e758a7a7f7d33c49336d4cba2cbb170ad7539a45774dfcc55257215c8ae719dc1c232fc6699ef01005887d04a543030b4328ab48744ac23ff56fd2da52eb9fb2eefcdd2d92d73ac1b111ea895e1fec36a3579879acfe366d393f1fa9cbe08d9ba57a443643e9cd251dc88e91a5e458e66ea1e822d55d4dd919a95eb4c25a08cb6e1070000003a0fd07a4ad9df240e00006aaa2db0dfe416146840d88bd08365e547c970e2983200703864a3b9c4682cb479dad6d34d211b05267eb1355520e9ec0c5014b0832f7fb35782fdbfcbf5e23a7f5d51ea480371748d18d8e10608ab8261fe058d1732f28814a9981d84a04a2bb36c89bdd245e3293a14df1ac567301a79514f103abd387d6ef2d9d94508ac0f6135c8921279573eefd5d4e33b9ef585980789a94d9848906f545559d30000b5040f0776703363249ca984cbb09752f099efbb9e7362e4999594c1086d8958e9469db01d85fb0b9b3148663e9ea2e755d96c70e540b4200e4cf82986712dd733b26d00e947d03c42215118426d548cb2077b43b89e4163d260faea1db53e2cf3427c90aefa2662a1c2b28b0e020e872bda1d39da508de5dbc37d03ee056b2579a1d16799589a2600000000aa00006c94bcaf115fbbcb216e3cb7fd9afe16d1fff2d047e508aa5f6de0ea4e9ec1b3a4ab1f8b5f312fc50000000000000000000000000042709db6de7e969ac0ce18b47280fb1b1b1531648122fed3e25edecb5200f5000000000000166f7d36b2966c19af7ffa6afa69e50821c9aa3ae60fbc196cf8ad2f7f86d79db1bb0ecbf9c3d0d3d407574def838e4def26ed9c7e6c69858f7813be8ffc565583663bebfe7485660b67e1436cbc6d4d3c48ab7b033d7d1195173edb16643f69cb779802839d490a4df94e5ea89c192af2ae83876edd59c9a7140e12ba591f073ec604f7e8f1e100cd414e9237ecfc052d9a73a868cd0e4b06da0435af72fb0d25657e8f5464b19fa83f977e6900000000367871fa37420e7a232ef9b440bb0639994c655d144c5786939d6a187b81f9ddd2bec36cd28371b1754cb6c53697fb23576ee0d3fd0a5803c9be9fe364803184f1a7a9a8eb64d17d238fa3238a001aa8ed040a69e9ec0a627e3b3ca64d4680d819c14c71684581000000000000000000000000000000000000c6a6587715865fe14558960bc936bc838bd1f2a00b17a407457681d0760000000000000040000000000000000000004faeabea6de40ae30291662594c993099ef041c264a64d77d69e0cdfa620a191704cef91e269044acf844de65a099200265e13c2a8f9b717886dea8e79407e34bc268a17965033ca1dfeeaf9b49bc68f1546595642f9fc008875ddb7aebda7a16b1d20dd8b65bcdac8cdc75a173fd2e57a9c37bf5a52ea001ec981dd7ad4e5944575ced39233ada8f3c1b856644812828bb79536a5188d14fe537250dc107121534cbbc7598f48aa2335616ae8eb72acf6982048e568e37f1f58e9714343587734c7ec0fa5c44d13165d6384bf9500757b4b0275950d6e7c451eef3fd353d47c54c4c2cf7318e6c24583ba0966225284d1abac80786519c563ddf0e6c023d537ca6e0d6d4e072c98f45415d13f0dcea174f162ebd00b42264f6fa3dccd09f4101dd254e54423b30e06713eccfacb6ffb38afff920980af938a4d78f4b9a6b5c7424e91121cda789104ee490d25843f1622bba93257cc23e45cd7ed42abdb991d51804e674e507dfd53b5ab6944df33f4f494b926f2ceb329550b46e82a939ad82b385e66809d7d4d3630b6f22c2f41fdaa0fadeea09fa4f7005813643c2d6307d55689faf6f656327ac5872a3bd4c11363909a8b9f30e5401993a0f6e1a9b42287542647d1e86b02b7e36319414629ac1f35e1457f922da0c2de76c9e97944efad0a3ad78cda81c5b82709d696e85bbf4595ef9664a6aff8cf96446cb6c26595f4eb659d26c846471f6551dbb24fc6c03a01e33efcd5939472b687d31be9bd9bd1bcda45bd2236f06c000000007d348ebcb9d810d4dc3d55bbe4055ce9c45267daeec7a7d8b498f507e933cc02fb53c2c28fa09ce5ada5de1415309761f6378c794f8ce23c1f7add4f65280ab446ea2d130000000000000000000000d1a0313ff63bc4e4463688db1d6ac7f4595a02c89349a973f118d936f33ea18e69d7739f4532e1b8580ef125b47cf5b402b6f2beffed6cc9afe2b548c4dbc78363118818d9473f29d52444685c41620eeaeb1f8786e87aeaf287fb9b63b30e6761507503dcd47b64f0b6157999c82bd151bee0c67f3e664225bd917b38aeae1da5524eefef1772d759df9ec9b4197383f9a66217e180e434e650dd560aa3ed42acddd44d6f45807a3c63e15929cfbebc7eef1a319d3147a6c06bd974168ac689392fa851ebdf524ca2331148ff7e855cccc106074ca92153734d5c5e3f9efc6592b08e0c07c7b5d42ec71484bb2a4c0f4293138369f39f9fa4a9cc607b42ba6102f918ce4e76d66fba450e940ed6a6a301a0b761a9cd849962fae5059bda419fd2a170ea387c10a4ada5893f38486069ef1bfdbb432ab322c887d7a94fa967135833157bafbed3b48bb267fc3aa56d1e5b66417a673b40884fc91ec9558eab6a08222dfe37767095b2d94cda881290d6017137595cdd53972353f485adfde8015cac0e1acd64ca97d67023f75a54b1ebe55053652ad16292a15e79dc58ba080f795f1a548da6f669e5c34afc272e5a32e85d5f44979431eab3fcd8d33d54000000000000000000ff1f3f6f4b33adcbee66736b4b35b5b909bc7ddd03f17f5f6436156a56c7e77e0808703b370f0cb4f00074200ae3e4ea0611d548f34582848903e4459d0a18ab9b113ebc614fafe4bd03cb1a8843e592f1b102b1bb87f13c50a1dc5df223e5bbcd06c55393f9c0e08ab6509bbed0dfedbf37309c99bf1e1fc7512afb7bd334653356419f8aa57f1224a54a85a3041657fb5037dda5b0f2e6a9673cc0d51b28954ef8c0ca82e69d198729b2c984a04b0f6ef9486767f5928461df5b8f84e0b790fa7d9088fdb7b7e6f020d4eae420155f1739307421fc3e9d4ffaffff2434f3d167d24bead3c6cedb2dd480d5c8b21c0edb06893c1fb18e9e716525f115055a84daca135d8972280324a9ffd4e636c87225c2512eb3e0fe65972c84361536e52a6ea677ffcb4bf8fac2009f24c01b7c86c203ce9093dd53b154110f033a25034752dc8561ed7bb7343e069ba1ad6f1d7437b584d2c292088d3d80e8834ae8760cc0211cb03f3ed168131eba4c8a0000000000000000000000000019c2dbe83523a58f68e66fa9fdf1d2878bf2ff524e6da7f918e87c1b1de17ff8077ba247fd5498310ae532b9bc6c583edfa97f7a4c00cce855a225dc017afc3c06e8a72b62bdb64e83cb6a319eb551345cfb24aaa02ddc4ec2daa942dc6e2332d724b11c0d9c8ff4ee94849938f5d231fdb5984d5442b564c079fce70ac620dcf7739693beca9dff66e957dd2fc03ce462da31e7f7a657118387727e8500"/5107], &(0x7f0000000100)='GPL\x00'}, 0x48) close(0xffffffffffffffff) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x8, &(0x7f0000001e40)=ANY=[@ANYRESOCT=r0, @ANYBLOB="8f104ae55a9f9c362fced0a850ab8ebdf148cfd71699f8f5c596c869bf01bf38fd0bdf0400eafd84580b6f54c6526a3de5eab93ecdac8796c518249bafe5cc6fac82399e4b116ff5e64dede5e019a545844d7421207b5a7de58f8c978e7c93eabb03234de213b3bdbf8aa3e8b4f47978614e24a8a816382b12d9f74fdf147ca9093354fdafdc53228bcf5573754f", @ANYRES64=r5, @ANYRES32, @ANYBLOB="0cc81af3d3e43def8214791945efb562133076915028790791092be6d1507e5676dc8a9b4870678e2846ad36d439f4d474609ab03f79afe15e0e9354a3ee8aa4bc535afa16b2efda194ee8b7aa2328721643d1581ec34f3fe44eb204f715ee61bdca6a63117a2b4978d9b5e3ffcb4dff1ba84bc48726d68ea9db8b91c758dfb029bf708e0b106b5f143315530c44ab011c273214862c9e429e79eae3c69b6810fc603b4edd9e4d605b4bdd75e2221cc9a6a7349393a54b6d6b7d5e5b23c13890e284aaeb9ad12c800c5fa3bd5c55fbe5a341cf58a072c5144d581629629cb4f16055541c35f9", @ANYRES16=0x0, @ANYRES32], &(0x7f0000000380)='GPL\x00', 0x0, 0xffffffffffffff2c, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000680), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x9}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r8}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x0, 0x32, 0x0, &(0x7f0000000140)="d510faffffdb674c5ae4000b0094", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000500)=ANY=[@ANYRESDEC=r4], 0x37) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00550000bfa100000000000007010000f8ffffffb702000008000000b70300006900000085000000060080009500000000000000564b"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x4000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 534.884608ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x8, 0x7fe2, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001180)={{r0}, &(0x7f0000000300), &(0x7f0000001140)='%-010d \x00'}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1800, 0x2}}, 0x10, 0x0}, 0x0) 439.750583ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30d) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x8}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000640)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0x14, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x2f, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xffffffff}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='syzkaller\x00', 0xb51, 0xde, &(0x7f0000000500)=""/222, 0x40f00, 0x7, '\x00', r3, 0x25, r1, 0x8, &(0x7f0000000940)={0x3}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x0, 0x7f, 0x1ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a80)=[r2, r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, r1, r1], &(0x7f0000000ac0)=[{0x2, 0x4, 0xc}], 0x10, 0x8001}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1f}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @generic={0x3f, 0xf, 0xa, 0x0, 0x2}, @map_fd={0x18, 0x7}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f0000000000)='GPL\x00', 0x7, 0x47, &(0x7f00000002c0)=""/71, 0x41000, 0x2, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xf, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xa, 0xa}, {0x1, 0x1, 0xa, 0x8}], 0x10, 0x4}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000600)={'pim6reg1\x00', 0x1000}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 345.917297ms ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[], 0x0, 0x2e}, 0x20) (async, rerun: 32) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) (rerun: 32) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) (async, rerun: 32) socketpair$unix(0x1, 0x47598391e78dc35, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000440)="2bd242ac4af8c61a79911cc1e2b66deb02423aa82edbf68a1df3dacf2dfe86de3d0d85f7358e018ea82aa51f84896e64af69dda7b62df0d8b98cbd8774e4c960aaa6b543e93730016a7910080d859f0c1e303ea97c33025fed51bdcca3803e4465c14c7260caa8cd1468c746a7c0558d44f991e9335b1dc284b6", 0x7a}, {&(0x7f00000004c0)="94cd7146a2fe4bef20a489aa4c7133d0810e0e571e9423fe8b2f190fcd589e7e5450b940458c1db450dcba8762cf46c81d12ba5a43d090e358c6303993a455484eb5252491c00038c87014c4059455e8bbef4a78784092f65ce12bf252a1988b25ab7c3d1034379e37e3acf548e37fe7517b83f32ed65902962180b8a6ac25c070cef3adf79046ca8b99c44f7dd9601d9dc330cac1d06487001f6ff8476d0fb8a43eee8e2662f5843d3c504e8fac22b021f3edca695eb90de367a3c6beb6494376698785095b46ec97054e649581f0dd63adda40fb3170eaaea4435a4ac9a6", 0xdf}, {&(0x7f00000005c0)="48ffa4f7dc99e9dae8763e0aa6caaf05c9cdfd9ea4150aa1c0faf2742619a6c286fb80c04a2ec68594ab5642718fde272257bcb7dd23227d3cdcfb003400556913341e86604344e2cf8711a6f5b8d2de784b1d96ca321710df20cd766caa1ab1bc08eeb57168494a980479cbb9e9bf7ebcf11f9f6e99b0901e54540ffb99ede66c9fa7", 0x83}], 0x3, 0x0, 0x0, 0xc800}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) 96.868045ms ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='mm_lru_insertion\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r4}, 0x10) 85.699767ms ago: executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRES8=r2, @ANYBLOB="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", @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r1], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000000)=0x80000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, 0xffffffffffffffff, 0x2d, 0x2010, 0x0, @link_id}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 72.039279ms ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x45, &(0x7f0000000600)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x49, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x28, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa1}}, @exit, @map_idx={0x18, 0x4, 0x5, 0x0, 0x5}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1ff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0xa0, &(0x7f0000000280)=""/160, 0x40f00, 0x20, '\x00', r2, 0x25, r3, 0x8, &(0x7f0000000900)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000940), &(0x7f0000000980)=[{0x1, 0x3, 0xc, 0x6}, {0x1, 0x2, 0xe, 0x1}, {0x5, 0x2, 0xc, 0x5}, {0x3, 0x1, 0xa, 0x7}], 0x10, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000000), 0xfffffd26) (async) write$cgroup_int(r5, &(0x7f0000000000), 0xfffffd26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000740)='ext4_fc_track_inode\x00', r4}, 0x10) 44.398443ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 0s ago: executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f0e43a4f06e"], &(0x7f0000000140)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sys_exit\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0}, 0x3b) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001240)=ANY=[@ANYBLOB="18000000101d9e800000000000000000850000001b0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000838b832ec011f986daf3a2"], &(0x7f00000001c0)='GPL\x00'}, 0x80) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r2, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0xe001}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETNOCSUM(r1, 0x400454d4, 0x0) kernel console output (not intermixed with test programs): 231.724960][T11055] should_fail+0x3c6/0x510 [ 231.729220][T11055] should_fail_usercopy+0x1a/0x20 [ 231.734074][T11055] _copy_from_user+0x20/0xd0 [ 231.738504][T11055] __se_sys_bpf+0x232/0x11cb0 [ 231.743016][T11055] ? release_firmware_map_entry+0x192/0x192 [ 231.748748][T11055] ? kvm_sched_clock_read+0x18/0x40 [ 231.753779][T11055] ? __kasan_check_read+0x11/0x20 [ 231.758636][T11055] ? preempt_schedule_irq+0xe7/0x140 [ 231.763779][T11055] ? preempt_schedule_notrace+0x140/0x140 [ 231.769322][T11055] ? __x64_sys_bpf+0x90/0x90 [ 231.773752][T11055] ? __irq_exit_rcu+0x40/0x150 [ 231.778343][T11055] ? irqentry_exit+0x4f/0x60 [ 231.782769][T11055] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 231.788424][T11055] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 231.794402][T11055] ? __fsnotify_parent+0x12f/0x6c0 [ 231.799355][T11055] ? kasan_check_range+0x7e/0x2a0 [ 231.804203][T11055] ? memset+0x35/0x40 [ 231.808024][T11055] ? __fsnotify_parent+0x4b9/0x6c0 [ 231.812990][T11055] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 231.819575][T11055] ? proc_fail_nth_write+0x20b/0x290 [ 231.824690][T11055] ? proc_fail_nth_read+0x210/0x210 [ 231.829726][T11055] ? security_file_permission+0x86/0xb0 [ 231.835105][T11055] ? rw_verify_area+0x1c3/0x360 [ 231.839792][T11055] ? preempt_count_add+0x92/0x1a0 [ 231.844651][T11055] ? vfs_write+0x854/0xe70 [ 231.848905][T11055] ? perf_pmu_sched_task+0x190/0x190 [ 231.854027][T11055] ? kvm_sched_clock_read+0x18/0x40 [ 231.859058][T11055] ? sched_clock+0x3a/0x40 [ 231.863310][T11055] ? sched_clock_cpu+0x1b/0x3b0 [ 231.868003][T11055] ? sched_clock+0x3a/0x40 [ 231.872267][T11055] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 231.878245][T11055] __x64_sys_bpf+0x7b/0x90 [ 231.882492][T11055] do_syscall_64+0x34/0x70 [ 231.886746][T11055] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 231.892620][T11055] RIP: 0033:0x7ffb672e50a9 [ 231.896883][T11055] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 231.916255][T11055] RSP: 002b:00007ffb6665f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.924495][T11055] RAX: ffffffffffffffda RBX: 00007ffb6741bf80 RCX: 00007ffb672e50a9 [ 231.932315][T11055] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 231.940115][T11055] RBP: 00007ffb6665f120 R08: 0000000000000000 R09: 0000000000000000 [ 231.948276][T11055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.956086][T11055] R13: 000000000000000b R14: 00007ffb6741bf80 R15: 00007fffa5405d88 [ 232.034114][T11060] bpf_get_probe_write_proto: 8 callbacks suppressed [ 232.034124][T11060] syz-executor.4[11060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.051711][T11060] syz-executor.4[11060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.064964][T11060] syz-executor.4[11060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.232376][T11062] ¯Ê®¸}p: renamed from pim6reg1 [ 232.248903][T11060] syz-executor.4[11060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.652788][T11106] syz-executor.4[11106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.673840][T11106] syz-executor.4[11106] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.766777][T11170] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 234.046505][T11193] syz-executor.3[11193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.046567][T11193] syz-executor.3[11193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.471862][T11206] device syzkaller0 entered promiscuous mode [ 234.535629][T11217] syz-executor.1[11217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.535663][T11217] syz-executor.1[11217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.047211][T11281] ¯Ê®¸}p: renamed from pim6reg1 [ 236.575900][T11300] device syzkaller0 entered promiscuous mode [ 236.736225][T11302] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.743588][T11302] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.751145][T11302] device bridge_slave_0 entered promiscuous mode [ 236.768029][T11302] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.774868][T11302] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.787153][T11302] device bridge_slave_1 entered promiscuous mode [ 236.838355][T11302] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.845203][T11302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.852302][T11302] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.859094][T11302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.893277][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.901500][ T3505] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.909296][ T3505] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.932745][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.941752][ T1898] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.948620][ T1898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.956857][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.965157][ T1898] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.972047][ T1898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.999168][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.007212][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.019894][T11302] device veth0_vlan entered promiscuous mode [ 237.028393][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.036362][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.044087][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.051540][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.065443][T11302] device veth1_macvtap entered promiscuous mode [ 237.073662][T11346] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 237.092698][ T3505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.106150][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.125026][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.398016][T11357] ¯Ê®¸}p: renamed from pim6reg1 [ 237.442425][T11360] bpf_get_probe_write_proto: 8 callbacks suppressed [ 237.442435][T11360] syz-executor.0[11360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.487416][T11360] syz-executor.0[11360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.594717][T11405] syz-executor.3[11405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.697864][T11408] device sit0 entered promiscuous mode [ 238.728357][T11405] syz-executor.3[11405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.131092][T11417] ¯Ê®¸}p: renamed from pim6reg1 [ 240.004629][T11458] ¯Ê®¸}p: renamed from pim6reg1 [ 240.119350][T11469] syz-executor.1[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.119392][T11469] syz-executor.1[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.350006][T11477] ¯Ê®¸}p: renamed from pim6reg1 [ 240.787522][T11497] syz-executor.3[11497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.787569][T11497] syz-executor.3[11497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.137381][T11520] syz-executor.1[11520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.149054][T11520] syz-executor.1[11520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.486246][T11516] device syzkaller0 entered promiscuous mode [ 241.519535][T11527] ¯Ê®¸}p: renamed from pim6reg1 [ 241.547552][T11539] device sit0 left promiscuous mode [ 241.613386][T11539] device sit0 entered promiscuous mode [ 242.519782][T11615] device syzkaller0 entered promiscuous mode [ 242.704590][T11633] bpf_get_probe_write_proto: 8 callbacks suppressed [ 242.704599][T11633] syz-executor.2[11633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.711595][T11633] syz-executor.2[11633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.902530][T11649] FAULT_INJECTION: forcing a failure. [ 242.902530][T11649] name failslab, interval 1, probability 0, space 0, times 0 [ 242.926914][T11649] CPU: 0 PID: 11649 Comm: syz-executor.2 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 242.938426][T11649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 242.948313][T11649] Call Trace: [ 242.951450][T11649] dump_stack_lvl+0x1e2/0x24b [ 242.955965][T11649] ? bfq_pos_tree_add_move+0x43b/0x43b [ 242.961249][T11649] ? mpage_prepare_extent_to_map+0xbf5/0xd70 [ 242.967070][T11649] dump_stack+0x15/0x17 [ 242.971056][T11649] should_fail+0x3c6/0x510 [ 242.975312][T11649] ? ext4_alloc_io_end_vec+0x2a/0x170 [ 242.980540][T11649] __should_failslab+0xa4/0xe0 [ 242.985160][T11649] should_failslab+0x9/0x20 [ 242.989553][T11649] kmem_cache_alloc+0x3d/0x2e0 [ 242.994150][T11649] ext4_alloc_io_end_vec+0x2a/0x170 [ 242.999270][T11649] ext4_writepages+0x122f/0x3c00 [ 243.004044][T11649] ? ext4_readpage+0x230/0x230 [ 243.008639][T11649] ? __kernel_text_address+0x9b/0x110 [ 243.013855][T11649] ? unwind_get_return_address+0x4d/0x90 [ 243.019312][T11649] ? arch_stack_walk+0xf3/0x140 [ 243.024000][T11649] ? stack_trace_snprint+0xf0/0xf0 [ 243.028952][T11649] ? __iomap_dio_rw+0x206/0x10f0 [ 243.033724][T11649] ? __iomap_dio_rw+0x206/0x10f0 [ 243.038491][T11649] ? ext4_readpage+0x230/0x230 [ 243.043095][T11649] do_writepages+0x12e/0x270 [ 243.047524][T11649] ? iomap_dio_rw+0x35/0x80 [ 243.051862][T11649] ? ext4_file_write_iter+0x10d2/0x1c80 [ 243.059013][T11649] ? vfs_write+0xb55/0xe70 [ 243.063266][T11649] ? __writepage+0x130/0x130 [ 243.067694][T11649] ? __kasan_check_write+0x14/0x20 [ 243.072640][T11649] ? _raw_spin_lock+0xa4/0x1b0 [ 243.077238][T11649] ? _raw_spin_unlock+0x4d/0x70 [ 243.081927][T11649] __filemap_fdatawrite_range+0x33c/0x3f0 [ 243.087478][T11649] ? filemap_check_errors+0x150/0x150 [ 243.092687][T11649] filemap_write_and_wait_range+0x64/0xe0 [ 243.098240][T11649] __iomap_dio_rw+0x648/0x10f0 [ 243.102840][T11649] ? __kasan_slab_free+0x11/0x20 [ 243.107615][T11649] ? iomap_dio_complete+0x6c0/0x6c0 [ 243.112646][T11649] ? jbd2_journal_start_reserved+0x400/0x400 [ 243.118468][T11649] ? __ext4_read_dirblock+0x8a0/0x8a0 [ 243.123667][T11649] iomap_dio_rw+0x35/0x80 [ 243.127839][T11649] ? ext4_file_write_iter+0x901/0x1c80 [ 243.133131][T11649] ? ext4_file_write_iter+0x901/0x1c80 [ 243.138441][T11649] ext4_file_write_iter+0x10d2/0x1c80 [ 243.143647][T11649] ? ext4_file_write_iter+0x901/0x1c80 [ 243.148934][T11649] ? ext4_file_read_iter+0x4d0/0x4d0 [ 243.154054][T11649] ? security_file_permission+0x86/0xb0 [ 243.159448][T11649] ? iov_iter_init+0x3f/0x120 [ 243.163951][T11649] vfs_write+0xb55/0xe70 [ 243.168025][T11649] ? kernel_write+0x3d0/0x3d0 [ 243.172538][T11649] ? mutex_trylock+0xa0/0xa0 [ 243.176968][T11649] ? __fdget_pos+0x2e7/0x3a0 [ 243.181388][T11649] ? ksys_write+0x77/0x2c0 [ 243.185640][T11649] ksys_write+0x199/0x2c0 [ 243.189806][T11649] ? __ia32_sys_read+0x90/0x90 [ 243.194407][T11649] ? debug_smp_processor_id+0x17/0x20 [ 243.199628][T11649] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 243.205533][T11649] ? debug_smp_processor_id+0x17/0x20 [ 243.210835][T11649] __x64_sys_write+0x7b/0x90 [ 243.215239][T11649] do_syscall_64+0x34/0x70 [ 243.219493][T11649] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 243.225309][T11649] RIP: 0033:0x7fec5b0720a9 [ 243.229559][T11649] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 243.249004][T11649] RSP: 002b:00007fec5a3ec0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.257245][T11649] RAX: ffffffffffffffda RBX: 00007fec5b1a8f80 RCX: 00007fec5b0720a9 [ 243.265051][T11649] RDX: 000000000000fdef RSI: 0000000020000340 RDI: 0000000000000004 [ 243.272869][T11649] RBP: 00007fec5a3ec120 R08: 0000000000000000 R09: 0000000000000000 [ 243.280678][T11649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.288486][T11649] R13: 000000000000000b R14: 00007fec5b1a8f80 R15: 00007ffcb7426b98 [ 243.339308][T11658] syz-executor.3[11658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.339339][T11658] syz-executor.3[11658] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.893403][T11708] syz-executor.1[11708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.907739][T11708] syz-executor.1[11708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.305988][T11714] device syzkaller0 entered promiscuous mode [ 246.010734][T11815] sock: sock_set_timeout: `syz-executor.0' (pid 11815) tries to set negative timeout [ 247.004606][T11864] syz-executor.1[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.004656][T11864] syz-executor.1[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.751213][T11977] syz-executor.0[11977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.777021][T11977] syz-executor.0[11977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.202713][T12009] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 249.325322][T12015] ¯Ê®¸}p: renamed from pim6reg1 [ 249.429201][T12020] syz-executor.3[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.429239][T12020] syz-executor.3[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.442531][T12020] syz-executor.3[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.462574][T12020] syz-executor.3[12020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.528266][T12018] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.567303][T12018] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.574539][T12018] device bridge_slave_0 entered promiscuous mode [ 249.647103][T12018] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.758385][T12018] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.861053][T12018] device bridge_slave_1 entered promiscuous mode [ 250.252321][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.272461][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.302684][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.310889][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.319059][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.325996][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.334285][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.342791][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.351450][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.358304][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.365787][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.374107][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.401107][T12018] device veth0_vlan entered promiscuous mode [ 250.421437][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.433232][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.441960][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.449935][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.457567][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.476434][T12018] device veth1_macvtap entered promiscuous mode [ 250.536825][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.675918][ T1035] device bridge_slave_1 left promiscuous mode [ 250.682140][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.744377][ T1035] device bridge_slave_0 left promiscuous mode [ 250.785737][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.793742][ T1035] device veth1_macvtap left promiscuous mode [ 250.799785][ T1035] device veth0_vlan left promiscuous mode [ 250.943465][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.951572][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.959703][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.962902][ T24] audit: type=1400 audit(1719035189.330:164): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.968012][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.997490][ T24] audit: type=1400 audit(1719035189.330:165): avc: denied { unlink } for pid=76 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 250.997506][ T24] audit: type=1400 audit(1719035189.330:166): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 251.236424][T12116] bridge_slave_0: mtu less than device minimum [ 251.718320][T12137] device veth1_macvtap left promiscuous mode [ 251.760841][T12131] device syzkaller0 entered promiscuous mode [ 251.767406][T12129] ¯Ê®¸}p: renamed from pim6reg1 [ 253.953647][T12204] ¯Ê®¸}p: renamed from pim6reg1 [ 254.875988][T12257] device sit0 entered promiscuous mode [ 255.289259][T12269] ¯Ê®¸}p: renamed from pim6reg1 [ 257.047190][T12348] device pim6reg1 entered promiscuous mode [ 257.667206][T12389] device pim6reg1 entered promiscuous mode [ 258.635804][T12447] device syzkaller0 entered promiscuous mode [ 259.430741][T12478] ªªªªªª: renamed from vlan0 [ 259.554262][T12486] syz-executor.0[12486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.554309][T12486] syz-executor.0[12486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.555654][T12573] ¯Ê®¸}p: renamed from pim6reg1 [ 261.815951][T12594] syz-executor.1[12594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.816001][T12594] syz-executor.1[12594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.003763][T12611] ¯Ê®¸}p: renamed from pim6reg1 [ 264.008859][T12735] syz-executor.0[12735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.013752][T12735] syz-executor.0[12735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.047643][T12746] syz-executor.0[12746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.080224][T12740] ¯Ê®¸}p: renamed from pim6reg1 [ 264.097737][T12746] syz-executor.0[12746] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.286425][T12752] ¯Ê®¸}p: renamed from pim6reg1 [ 264.863855][T12790] device sit0 left promiscuous mode [ 264.988238][T12790] device sit0 entered promiscuous mode [ 265.185566][T12793] device syzkaller0 entered promiscuous mode [ 265.387549][T12802] ¯Ê®¸}p: renamed from pim6reg1 [ 266.044782][T12857] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 268.596828][T12990] device vxcan1 entered promiscuous mode [ 268.790418][T13002] device syzkaller0 entered promiscuous mode [ 270.142262][T13080] syz-executor.2[13080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.142307][T13080] syz-executor.2[13080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.207859][T13076] ¯Ê®¸}p: renamed from pim6reg1 [ 270.316762][T13080] syz-executor.2[13080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.316814][T13080] syz-executor.2[13080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.294516][T13126] ¯Ê®¸}p: renamed from pim6reg1 [ 272.109674][T13167] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.117251][T13167] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.124485][T13167] device bridge_slave_0 entered promiscuous mode [ 272.135056][T13167] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.142604][T13167] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.149974][T13167] device bridge_slave_1 entered promiscuous mode [ 272.205029][T13167] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.211916][T13167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.219008][T13167] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.225771][T13167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.234033][ T3505] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.241465][ T3505] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.276408][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.296473][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.359049][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.404885][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.447389][ T1065] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.454268][ T1065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.515661][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.556125][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.595807][ T1065] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.602684][ T1065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.674364][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.689040][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.730401][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.768819][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.831233][T13167] device veth0_vlan entered promiscuous mode [ 272.862509][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.885176][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.947698][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.048234][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.097026][T13167] device veth1_macvtap entered promiscuous mode [ 273.116816][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.128456][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.145913][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.171339][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.189148][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.213572][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.223971][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.233751][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.245691][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.369485][T13213] syz-executor.1[13213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.369528][T13213] syz-executor.1[13213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.529010][ T1035] device bridge_slave_1 left promiscuous mode [ 273.594841][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.646739][ T1035] device bridge_slave_0 left promiscuous mode [ 273.708581][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.807400][ T1035] device veth1_macvtap left promiscuous mode [ 274.099890][T13241] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 274.161591][T13243] device sit0 entered promiscuous mode [ 275.236713][T13302] bridge0: port 3(macsec0) entered blocking state [ 275.244092][T13302] bridge0: port 3(macsec0) entered disabled state [ 275.251771][T13302] device macsec0 entered promiscuous mode [ 276.710780][T13354] syz-executor.4[13354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.710829][T13354] syz-executor.4[13354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.968761][T13364] device syzkaller0 entered promiscuous mode [ 277.054583][T13361] ¯Ê®¸}p: renamed from pim6reg1 [ 278.031381][T13428] ¯Ê®¸}p: renamed from pim6reg1 [ 278.250711][T13426] ¯Ê®¸}p: renamed from pim6reg1 [ 279.394455][T13487] syz-executor.2[13487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.394506][T13487] syz-executor.2[13487] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.543890][T13586] ¯Ê®¸}p: renamed from pim6reg1 [ 280.631645][T13603] device pim6reg1 entered promiscuous mode [ 280.886174][T13605] ¯Ê®¸}p: renamed from pim6reg1 [ 282.179135][T13661] ¯Ê®¸}p: renamed from pim6reg1 [ 282.298441][T13671] ¯Ê®¸}p: renamed from pim6reg1 [ 282.653687][T13679] device syzkaller0 entered promiscuous mode [ 284.311361][T13720] ¯Ê®¸}p: renamed from pim6reg1 [ 284.659924][T13731] FAULT_INJECTION: forcing a failure. [ 284.659924][T13731] name failslab, interval 1, probability 0, space 0, times 0 [ 284.678748][T13731] CPU: 1 PID: 13731 Comm: syz-executor.3 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 284.690274][T13731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 284.700166][T13731] Call Trace: [ 284.703397][T13731] dump_stack_lvl+0x1e2/0x24b [ 284.707909][T13731] ? bfq_pos_tree_add_move+0x43b/0x43b [ 284.713201][T13731] dump_stack+0x15/0x17 [ 284.717189][T13731] should_fail+0x3c6/0x510 [ 284.721444][T13731] ? ext4_find_extent+0x370/0xdb0 [ 284.726318][T13731] __should_failslab+0xa4/0xe0 [ 284.730903][T13731] should_failslab+0x9/0x20 [ 284.735245][T13731] __kmalloc+0x60/0x330 [ 284.739231][T13731] ? 0xffffffffa0028f6c [ 284.743226][T13731] ext4_find_extent+0x370/0xdb0 [ 284.747920][T13731] ext4_ext_map_blocks+0x26a/0x6ee0 [ 284.752956][T13731] ? stack_trace_save+0x113/0x1c0 [ 284.757808][T13731] ? stack_trace_snprint+0xf0/0xf0 [ 284.762759][T13731] ? ext4_ext_release+0x10/0x10 [ 284.767454][T13731] ? slab_post_alloc_hook+0x61/0x2f0 [ 284.772567][T13731] ? kmem_cache_alloc+0x168/0x2e0 [ 284.777425][T13731] ? ext4_alloc_io_end_vec+0x2a/0x170 [ 284.782635][T13731] ? ext4_writepages+0x122f/0x3c00 [ 284.787580][T13731] ? do_writepages+0x12e/0x270 [ 284.792180][T13731] ? __filemap_fdatawrite_range+0x33c/0x3f0 [ 284.797904][T13731] ? filemap_write_and_wait_range+0x64/0xe0 [ 284.803632][T13731] ? __iomap_dio_rw+0x648/0x10f0 [ 284.808402][T13731] ? iomap_dio_rw+0x35/0x80 [ 284.812744][T13731] ? ext4_file_write_iter+0x10d2/0x1c80 [ 284.818216][T13731] ? vfs_write+0xb55/0xe70 [ 284.822464][T13731] ? ksys_write+0x199/0x2c0 [ 284.826814][T13731] ? __x64_sys_write+0x7b/0x90 [ 284.831406][T13731] ? do_syscall_64+0x34/0x70 [ 284.835833][T13731] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 284.841746][T13731] ? _raw_read_unlock+0x25/0x40 [ 284.846420][T13731] ? ext4_es_lookup_extent+0x33b/0x940 [ 284.851719][T13731] ext4_map_blocks+0xa65/0x1d10 [ 284.856403][T13731] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 284.861522][T13731] ? ext4_inode_journal_mode+0x3ab/0x470 [ 284.866991][T13731] ext4_writepages+0x148b/0x3c00 [ 284.872035][T13731] ? ext4_readpage+0x230/0x230 [ 284.876625][T13731] ? __kernel_text_address+0x9b/0x110 [ 284.881841][T13731] ? unwind_get_return_address+0x4d/0x90 [ 284.887298][T13731] ? arch_stack_walk+0xf3/0x140 [ 284.891989][T13731] ? stack_trace_snprint+0xf0/0xf0 [ 284.896938][T13731] ? __iomap_dio_rw+0x206/0x10f0 [ 284.901705][T13731] ? __iomap_dio_rw+0x206/0x10f0 [ 284.906571][T13731] ? ext4_readpage+0x230/0x230 [ 284.911267][T13731] do_writepages+0x12e/0x270 [ 284.915689][T13731] ? iomap_dio_rw+0x35/0x80 [ 284.920029][T13731] ? ext4_file_write_iter+0x10d2/0x1c80 [ 284.925410][T13731] ? vfs_write+0xb55/0xe70 [ 284.929662][T13731] ? __writepage+0x130/0x130 [ 284.934095][T13731] ? __kasan_check_write+0x14/0x20 [ 284.939123][T13731] ? _raw_spin_lock+0xa4/0x1b0 [ 284.943725][T13731] ? _raw_spin_unlock+0x4d/0x70 [ 284.948412][T13731] __filemap_fdatawrite_range+0x33c/0x3f0 [ 284.953968][T13731] ? filemap_check_errors+0x150/0x150 [ 284.959182][T13731] filemap_write_and_wait_range+0x64/0xe0 [ 284.964738][T13731] __iomap_dio_rw+0x648/0x10f0 [ 284.969421][T13731] ? __kasan_slab_free+0x11/0x20 [ 284.974193][T13731] ? iomap_dio_complete+0x6c0/0x6c0 [ 284.979499][T13731] ? jbd2_journal_start_reserved+0x400/0x400 [ 284.985302][T13731] ? __ext4_read_dirblock+0x8a0/0x8a0 [ 284.990508][T13731] iomap_dio_rw+0x35/0x80 [ 284.994675][T13731] ? ext4_file_write_iter+0x901/0x1c80 [ 284.999965][T13731] ? ext4_file_write_iter+0x901/0x1c80 [ 285.005260][T13731] ext4_file_write_iter+0x10d2/0x1c80 [ 285.010467][T13731] ? ext4_file_write_iter+0x901/0x1c80 [ 285.015760][T13731] ? ext4_file_read_iter+0x4d0/0x4d0 [ 285.020881][T13731] ? security_file_permission+0x86/0xb0 [ 285.026260][T13731] ? iov_iter_init+0x3f/0x120 [ 285.030779][T13731] vfs_write+0xb55/0xe70 [ 285.034853][T13731] ? kernel_write+0x3d0/0x3d0 [ 285.039368][T13731] ? mutex_trylock+0xa0/0xa0 [ 285.043795][T13731] ? __fdget_pos+0x2e7/0x3a0 [ 285.048217][T13731] ? ksys_write+0x77/0x2c0 [ 285.052472][T13731] ksys_write+0x199/0x2c0 [ 285.056638][T13731] ? __ia32_sys_read+0x90/0x90 [ 285.061239][T13731] ? debug_smp_processor_id+0x17/0x20 [ 285.066447][T13731] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 285.072348][T13731] ? debug_smp_processor_id+0x17/0x20 [ 285.077556][T13731] __x64_sys_write+0x7b/0x90 [ 285.081979][T13731] do_syscall_64+0x34/0x70 [ 285.086238][T13731] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 285.091969][T13731] RIP: 0033:0x7ffb672e50a9 [ 285.096218][T13731] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 285.115659][T13731] RSP: 002b:00007ffb6665f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 285.123902][T13731] RAX: ffffffffffffffda RBX: 00007ffb6741bf80 RCX: 00007ffb672e50a9 [ 285.131710][T13731] RDX: 000000000000fdef RSI: 0000000020000340 RDI: 0000000000000004 [ 285.139523][T13731] RBP: 00007ffb6665f120 R08: 0000000000000000 R09: 0000000000000000 [ 285.147333][T13731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.155145][T13731] R13: 000000000000000b R14: 00007ffb6741bf80 R15: 00007fffa5405d88 [ 285.280039][T13756] device wg2 entered promiscuous mode [ 285.429797][T13770] ¯Ê®¸}p: renamed from pim6reg1 [ 285.957044][T13779] ¯Ê®¸}p: renamed from pim6reg1 [ 286.545170][T13820] ¯Ê®¸}p: renamed from pim6reg1 [ 286.854550][T13836] ¯Ê®¸}p: renamed from pim6reg1 [ 288.254291][T13902] FAULT_INJECTION: forcing a failure. [ 288.254291][T13902] name failslab, interval 1, probability 0, space 0, times 0 [ 288.268455][T13902] CPU: 0 PID: 13902 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 288.279968][T13902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 288.289860][T13902] Call Trace: [ 288.293086][T13902] dump_stack_lvl+0x1e2/0x24b [ 288.297599][T13902] ? bfq_pos_tree_add_move+0x43b/0x43b [ 288.302891][T13902] dump_stack+0x15/0x17 [ 288.306883][T13902] should_fail+0x3c6/0x510 [ 288.311137][T13902] ? ext4_find_extent+0x370/0xdb0 [ 288.315997][T13902] __should_failslab+0xa4/0xe0 [ 288.320602][T13902] should_failslab+0x9/0x20 [ 288.324935][T13902] __kmalloc+0x60/0x330 [ 288.328931][T13902] ? __kernel_text_address+0x9b/0x110 [ 288.334137][T13902] ext4_find_extent+0x370/0xdb0 [ 288.338826][T13902] ext4_ext_map_blocks+0x26a/0x6ee0 [ 288.343857][T13902] ? slab_free_freelist_hook+0xc0/0x190 [ 288.349239][T13902] ? kmem_cache_free+0xa9/0x1e0 [ 288.353926][T13902] ? do_syscall_64+0x34/0x70 [ 288.358353][T13902] ? _raw_read_unlock+0x25/0x40 [ 288.363039][T13902] ? start_this_handle+0x1e71/0x1ff0 [ 288.368160][T13902] ? __kasan_slab_alloc+0xc3/0xe0 [ 288.373023][T13902] ? ext4_ext_release+0x10/0x10 [ 288.377714][T13902] ? _raw_read_unlock+0x25/0x40 [ 288.382386][T13902] ? ext4_es_lookup_extent+0x33b/0x940 [ 288.387685][T13902] ext4_map_blocks+0xa65/0x1d10 [ 288.392374][T13902] ? slab_post_alloc_hook+0x80/0x2f0 [ 288.397493][T13902] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 288.402520][T13902] ? __ext4_journal_start_sb+0x249/0x4a0 [ 288.407990][T13902] ext4_alloc_file_blocks+0x3f4/0xcd0 [ 288.413197][T13902] ? trace_ext4_fallocate_enter+0x160/0x160 [ 288.418933][T13902] ? down_read_killable+0x220/0x220 [ 288.423960][T13902] ext4_zero_range+0x2f4/0x9b0 [ 288.428565][T13902] ext4_fallocate+0x520/0x1ca0 [ 288.433247][T13902] ? avc_policy_seqno+0x1b/0x70 [ 288.437936][T13902] ? ext4_ext_truncate+0x200/0x200 [ 288.442879][T13902] ? fsnotify_perm+0x67/0x4e0 [ 288.447393][T13902] ? security_file_permission+0x7b/0xb0 [ 288.452775][T13902] ? preempt_count_add+0x92/0x1a0 [ 288.457640][T13902] vfs_fallocate+0x492/0x570 [ 288.462060][T13902] do_vfs_ioctl+0x1686/0x1a30 [ 288.466574][T13902] ? ioctl_has_perm+0x3f0/0x560 [ 288.471263][T13902] ? preempt_count_add+0x92/0x1a0 [ 288.476122][T13902] ? __x32_compat_sys_ioctl+0x90/0x90 [ 288.481332][T13902] ? kernel_write+0x3d0/0x3d0 [ 288.485844][T13902] ? selinux_file_ioctl+0x3cc/0x540 [ 288.490876][T13902] ? selinux_file_alloc_security+0x120/0x120 [ 288.496847][T13902] ? __fget_files+0x31e/0x380 [ 288.501354][T13902] ? security_file_ioctl+0x84/0xb0 [ 288.506296][T13902] __se_sys_ioctl+0x99/0x190 [ 288.510728][T13902] __x64_sys_ioctl+0x7b/0x90 [ 288.515148][T13902] do_syscall_64+0x34/0x70 [ 288.519491][T13902] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 288.525215][T13902] RIP: 0033:0x7f27c423a0a9 [ 288.529469][T13902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 288.548911][T13902] RSP: 002b:00007f27c35b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.557161][T13902] RAX: ffffffffffffffda RBX: 00007f27c4370f80 RCX: 00007f27c423a0a9 [ 288.564966][T13902] RDX: 0000000020000040 RSI: 0000000040305839 RDI: 0000000000000008 [ 288.572779][T13902] RBP: 00007f27c35b4120 R08: 0000000000000000 R09: 0000000000000000 [ 288.580589][T13902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.588574][T13902] R13: 000000000000000b R14: 00007f27c4370f80 R15: 00007ffff9796a58 [ 290.718208][T14009] device sit0 left promiscuous mode [ 290.887807][T14009] device sit0 entered promiscuous mode [ 291.288426][T14029] ¯Ê®¸}p: renamed from pim6reg1 [ 292.084669][T14054] syz-executor.4[14054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.084721][T14054] syz-executor.4[14054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.121055][T14051] syz-executor.2[14051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.132685][T14051] syz-executor.2[14051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.145036][T14051] syz-executor.2[14051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.157064][T14051] syz-executor.2[14051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.671958][T14104] syz-executor.3[14104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.685413][T14104] syz-executor.3[14104] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.934831][T14125] ¯Ê®¸}p: renamed from pim6reg1 [ 294.147791][T14183] ¯Ê®¸}p: renamed from pim6reg1 [ 295.673319][T14340] ¯Ê®¸}p: renamed from pim6reg1 [ 295.842209][T14342] device syzkaller0 entered promiscuous mode [ 296.234698][T14382] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 296.251396][T14383] syz-executor.2[14383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.251442][T14383] syz-executor.2[14383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.726226][T14388] ¯Ê®¸}p: renamed from pim6reg1 [ 296.923158][T14410] device syzkaller0 entered promiscuous mode [ 297.287591][T14424] device pim6reg1 entered promiscuous mode [ 297.758068][T14470] device wg2 entered promiscuous mode [ 297.764886][T14470] tun0: tun_chr_ioctl cmd 2148553947 [ 298.099140][T14495] bpf_get_probe_write_proto: 2 callbacks suppressed [ 298.099149][T14495] syz-executor.1[14495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.105678][T14495] syz-executor.1[14495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.534973][T14518] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.553440][T14518] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.560776][T14518] device bridge_slave_0 entered promiscuous mode [ 298.577599][T14518] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.584430][T14518] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.597333][T14518] device bridge_slave_1 entered promiscuous mode [ 298.734189][T14518] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.741045][T14518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.748157][T14518] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.754925][T14518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.867158][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.874773][ T336] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.885201][ T336] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.920545][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.928553][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.935378][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.942860][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.951323][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.958178][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.006326][T14530] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.018322][T14530] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.025528][T14530] device bridge_slave_0 entered promiscuous mode [ 299.041250][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.049371][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.065719][T14518] device veth0_vlan entered promiscuous mode [ 299.072036][T14530] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.080557][T14530] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.088381][T14530] device bridge_slave_1 entered promiscuous mode [ 299.095180][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.103905][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.111833][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.119588][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.187511][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.214405][T14518] device veth1_macvtap entered promiscuous mode [ 299.303744][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.343709][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.444487][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.495596][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.574983][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 299.582549][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 299.635142][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 299.715187][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 299.723311][ T1898] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.730179][ T1898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 299.788874][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 299.843538][T14578] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 299.858550][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 299.866524][ T1898] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.873360][ T1898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 299.880565][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.890310][ T1898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.957680][ T1035] device macsec0 left promiscuous mode [ 299.963035][ T1035] bridge0: port 3(macsec0) entered disabled state [ 299.990145][ T1035] device bridge_slave_1 left promiscuous mode [ 300.010492][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.037581][ T1035] device bridge_slave_0 left promiscuous mode [ 300.057711][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.087154][ T1035] device veth0_vlan left promiscuous mode [ 300.332978][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 300.372473][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 300.380696][ T454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 300.436613][T14530] device veth0_vlan entered promiscuous mode [ 300.445341][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 300.528960][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 300.628603][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 300.652272][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 300.660256][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 300.668624][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 300.715142][T14530] device veth1_macvtap entered promiscuous mode [ 300.740529][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 300.749164][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.759978][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.841611][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.851143][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 300.934792][T14607] Â: renamed from pim6reg1 [ 301.233056][T14618] device lo entered promiscuous mode [ 302.516477][T14703] syz-executor.0[14703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.516526][T14703] syz-executor.0[14703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.248198][T14791] device sit0 entered promiscuous mode [ 304.327678][T14797] device syzkaller0 entered promiscuous mode [ 304.417574][T14807] device bridge0 entered promiscuous mode [ 304.901793][T14850] FAULT_INJECTION: forcing a failure. [ 304.901793][T14850] name failslab, interval 1, probability 0, space 0, times 0 [ 304.932898][T14850] CPU: 0 PID: 14850 Comm: syz-executor.2 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 304.944428][T14850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 304.954314][T14850] Call Trace: [ 304.957454][T14850] dump_stack_lvl+0x1e2/0x24b [ 304.961965][T14850] ? bfq_pos_tree_add_move+0x43b/0x43b [ 304.967257][T14850] ? __dquot_alloc_space+0x267/0xc10 [ 304.972377][T14850] ? vfs_fallocate+0x492/0x570 [ 304.977077][T14850] dump_stack+0x15/0x17 [ 304.981063][T14850] should_fail+0x3c6/0x510 [ 304.985317][T14850] ? ext4_mb_new_blocks+0x5bc/0x43f0 [ 304.990438][T14850] __should_failslab+0xa4/0xe0 [ 304.995033][T14850] should_failslab+0x9/0x20 [ 304.999376][T14850] kmem_cache_alloc+0x3d/0x2e0 [ 305.004073][T14850] ext4_mb_new_blocks+0x5bc/0x43f0 [ 305.009013][T14850] ? __es_insert_extent+0x17c0/0x17c0 [ 305.014217][T14850] ? __kasan_kmalloc+0x9/0x10 [ 305.018737][T14850] ? memset+0x35/0x40 [ 305.022548][T14850] ? ext4_mb_pa_callback+0xd0/0xd0 [ 305.027583][T14850] ? ext4_ext_search_right+0x3e4/0x900 [ 305.032876][T14850] ? ext4_ext_check_overlap+0x38f/0x5d0 [ 305.038357][T14850] ? ext4_ext_find_goal+0x105/0x200 [ 305.043388][T14850] ext4_ext_map_blocks+0x1a00/0x6ee0 [ 305.048526][T14850] ? slab_free_freelist_hook+0xc0/0x190 [ 305.053892][T14850] ? kmem_cache_free+0xa9/0x1e0 [ 305.058580][T14850] ? _raw_read_unlock+0x25/0x40 [ 305.063264][T14850] ? start_this_handle+0x1e71/0x1ff0 [ 305.068558][T14850] ? __kasan_slab_alloc+0xc3/0xe0 [ 305.073409][T14850] ? ext4_ext_release+0x10/0x10 [ 305.078117][T14850] ? _raw_read_unlock+0x25/0x40 [ 305.082781][T14850] ? ext4_es_lookup_extent+0x33b/0x940 [ 305.088075][T14850] ext4_map_blocks+0xa65/0x1d10 [ 305.092758][T14850] ? slab_post_alloc_hook+0x80/0x2f0 [ 305.097879][T14850] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 305.102909][T14850] ? __ext4_journal_start_sb+0x249/0x4a0 [ 305.108378][T14850] ext4_alloc_file_blocks+0x3f4/0xcd0 [ 305.113589][T14850] ? trace_ext4_fallocate_enter+0x160/0x160 [ 305.119315][T14850] ? down_read_killable+0x220/0x220 [ 305.124346][T14850] ext4_zero_range+0x2f4/0x9b0 [ 305.128949][T14850] ext4_fallocate+0x520/0x1ca0 [ 305.133548][T14850] ? avc_policy_seqno+0x1b/0x70 [ 305.138233][T14850] ? ext4_ext_truncate+0x200/0x200 [ 305.143189][T14850] ? fsnotify_perm+0x67/0x4e0 [ 305.147695][T14850] ? security_file_permission+0x7b/0xb0 [ 305.153081][T14850] ? preempt_count_add+0x92/0x1a0 [ 305.157936][T14850] vfs_fallocate+0x492/0x570 [ 305.162362][T14850] do_vfs_ioctl+0x1686/0x1a30 [ 305.166874][T14850] ? ioctl_has_perm+0x3f0/0x560 [ 305.171561][T14850] ? preempt_count_add+0x92/0x1a0 [ 305.176421][T14850] ? __x32_compat_sys_ioctl+0x90/0x90 [ 305.181632][T14850] ? kernel_write+0x3d0/0x3d0 [ 305.186144][T14850] ? selinux_file_ioctl+0x3cc/0x540 [ 305.191178][T14850] ? selinux_file_alloc_security+0x120/0x120 [ 305.196993][T14850] ? __fget_files+0x31e/0x380 [ 305.201523][T14850] ? security_file_ioctl+0x84/0xb0 [ 305.206452][T14850] __se_sys_ioctl+0x99/0x190 [ 305.210887][T14850] __x64_sys_ioctl+0x7b/0x90 [ 305.215311][T14850] do_syscall_64+0x34/0x70 [ 305.219576][T14850] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 305.225295][T14850] RIP: 0033:0x7f84a36d50a9 [ 305.229549][T14850] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 305.248984][T14850] RSP: 002b:00007f84a2a4f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.257226][T14850] RAX: ffffffffffffffda RBX: 00007f84a380bf80 RCX: 00007f84a36d50a9 [ 305.265037][T14850] RDX: 0000000020000040 RSI: 0000000040305839 RDI: 0000000000000008 [ 305.272847][T14850] RBP: 00007f84a2a4f120 R08: 0000000000000000 R09: 0000000000000000 [ 305.280659][T14850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 305.288479][T14850] R13: 000000000000000b R14: 00007f84a380bf80 R15: 00007ffff9e90fd8 [ 305.968001][T14890] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 306.227994][T14909] ¯Ê®¸}p: renamed from pim6reg1 [ 306.435690][T14919] ¯Ê®¸}p: renamed from pim6reg1 [ 306.667995][ T24] audit: type=1400 audit(1719035245.040:167): avc: denied { create } for pid=14942 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 306.790198][T14955] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.797317][T14955] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.123236][T14965] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.130108][T14965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.137225][T14965] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.143970][T14965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.277853][T14965] device bridge0 entered promiscuous mode [ 307.412909][T14987] ¯Ê®¸}p: renamed from pim6reg1 [ 307.462198][T15001] syz-executor.1[15001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.462242][T15001] syz-executor.1[15001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.037088][T15019] device syzkaller0 entered promiscuous mode [ 308.419612][T15035] ¯Ê®¸}p: renamed from pim6reg1 [ 308.506441][T15039] ¯Ê®¸}p: renamed from pim6reg1 [ 308.918928][T15084] EXT4-fs warning (device sda1): ext4_group_extend:1813: need to use ext2online to resize further [ 308.969181][T15085] ¯Ê®¸}p: renamed from pim6reg1 [ 309.709876][T15119] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 309.716267][T15119] pim6reg0: linktype set to 773 [ 309.828216][T15140] syz-executor.2[15140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.828267][T15140] syz-executor.2[15140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.960350][T15140] device syzkaller0 entered promiscuous mode [ 310.344322][T15155] ¯Ê®¸}p: renamed from pim6reg1 [ 310.373175][T15157] ¯Ê®¸}p: renamed from pim6reg1 [ 311.308799][ T24] audit: type=1400 audit(1719035249.680:168): avc: denied { setattr } for pid=15211 comm="syz-executor.2" path="/dev/net/tun" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 311.411108][ T24] audit: type=1400 audit(1719035249.780:169): avc: denied { ioctl } for pid=15224 comm="syz-executor.3" path="net:[4026532415]" dev="nsfs" ino=4026532415 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 311.541032][T15234] ¯Ê®¸}p: renamed from pim6reg1 [ 312.270801][T15263] device wg2 left promiscuous mode [ 312.293167][T15264] device syzkaller0 entered promiscuous mode [ 312.441409][T15280] device pim6reg1 entered promiscuous mode [ 312.492630][T15285] ¯Ê®¸}p: renamed from pim6reg1 [ 313.628734][T15333] device pim6reg1 entered promiscuous mode [ 314.009711][T15346] ¯Ê®¸}p: renamed from pim6reg1 [ 314.391616][T15361] device sit0 left promiscuous mode [ 314.445283][T15361] device sit0 entered promiscuous mode [ 314.933495][T15391] ¯Ê®¸}p: renamed from pim6reg1 [ 316.404764][T15448] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.412031][T15448] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.425633][T15448] device bridge_slave_0 entered promiscuous mode [ 316.441282][T15448] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.448446][T15448] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.455992][T15448] device bridge_slave_1 entered promiscuous mode [ 316.499542][T15448] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.506402][T15448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.513476][T15448] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.520355][T15448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.549610][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.557787][ T1010] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.564912][ T1010] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.604073][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.613635][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.624528][ T1010] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.631390][ T1010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.638980][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.658989][ T1010] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.665815][ T1010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.704916][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.755150][ T1010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.771056][T15448] device veth0_vlan entered promiscuous mode [ 316.850120][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 316.858050][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.981349][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.996315][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.017266][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.041624][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.066024][T15448] device veth1_macvtap entered promiscuous mode [ 317.088551][ T1035] device bridge_slave_1 left promiscuous mode [ 317.104833][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.122610][ T1035] device bridge_slave_0 left promiscuous mode [ 317.165357][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.227888][ T1035] device veth1_macvtap left promiscuous mode [ 317.257198][ T1035] device veth0_vlan left promiscuous mode [ 317.616256][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.625957][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.647663][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.662392][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.678271][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.790537][T15549] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 318.230894][T15575] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 318.500416][T15592] ¯Ê®¸}p: renamed from pim6reg1 [ 318.531599][T15601] syz-executor.1[15601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.531653][T15601] syz-executor.1[15601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.869311][T15611] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 319.112847][T15630] syz-executor.0[15630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.112897][T15630] syz-executor.0[15630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.137548][T15630] syz-executor.0[15630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.153619][T15630] syz-executor.0[15630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.390995][T15651] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 153 (only 8 groups) [ 319.517797][T15654] ¯Ê®¸}p: renamed from pim6reg1 [ 319.698988][T15665] syz-executor.3[15665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.699036][T15665] syz-executor.3[15665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.924388][T15665] syz-executor.3[15665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.947381][T15665] syz-executor.3[15665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.035675][T15673] ¯Ê®¸}p: renamed from pim6reg1 [ 320.526060][T15687] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.533022][T15687] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.540654][T15687] device bridge_slave_0 entered promiscuous mode [ 320.547518][T15687] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.554458][T15687] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.561800][T15687] device bridge_slave_1 entered promiscuous mode [ 320.838927][T15687] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.845793][T15687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.852878][T15687] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.859671][T15687] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.916255][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.924810][ T1876] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.935194][ T1876] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.954313][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.962454][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.970701][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.977558][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.984950][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.993529][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.006777][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.013648][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.028002][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 321.036667][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.045047][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 321.065478][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 321.180464][T15739] FAULT_INJECTION: forcing a failure. [ 321.180464][T15739] name failslab, interval 1, probability 0, space 0, times 0 [ 321.192926][T15739] CPU: 1 PID: 15739 Comm: syz-executor.1 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 321.204522][T15739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 321.214411][T15739] Call Trace: [ 321.217548][T15739] dump_stack_lvl+0x1e2/0x24b [ 321.222052][T15739] ? bfq_pos_tree_add_move+0x43b/0x43b [ 321.227349][T15739] ? __es_remove_extent+0x14a0/0x1dd0 [ 321.232557][T15739] dump_stack+0x15/0x17 [ 321.236551][T15739] should_fail+0x3c6/0x510 [ 321.240798][T15739] ? __es_insert_extent+0x72a/0x17c0 [ 321.245913][T15739] __should_failslab+0xa4/0xe0 [ 321.250514][T15739] should_failslab+0x9/0x20 [ 321.254865][T15739] kmem_cache_alloc+0x3d/0x2e0 [ 321.259456][T15739] __es_insert_extent+0x72a/0x17c0 [ 321.264400][T15739] ? _raw_write_lock+0xa4/0x170 [ 321.269091][T15739] ext4_es_insert_extent+0x576/0x2d80 [ 321.274293][T15739] ? __es_find_extent_range+0x357/0x5e0 [ 321.279678][T15739] ? ext4_es_scan_clu+0x340/0x340 [ 321.284539][T15739] ? _raw_read_unlock+0x25/0x40 [ 321.289225][T15739] ? ext4_es_lookup_extent+0x33b/0x940 [ 321.294518][T15739] ext4_map_blocks+0xede/0x1d10 [ 321.299204][T15739] ? slab_post_alloc_hook+0x80/0x2f0 [ 321.304326][T15739] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 321.309360][T15739] ? __ext4_journal_start_sb+0x249/0x4a0 [ 321.314825][T15739] ext4_alloc_file_blocks+0x3f4/0xcd0 [ 321.320038][T15739] ? trace_ext4_fallocate_enter+0x160/0x160 [ 321.325870][T15739] ? down_read_killable+0x220/0x220 [ 321.330891][T15739] ext4_zero_range+0x2f4/0x9b0 [ 321.335493][T15739] ext4_fallocate+0x520/0x1ca0 [ 321.340092][T15739] ? avc_policy_seqno+0x1b/0x70 [ 321.344774][T15739] ? ext4_ext_truncate+0x200/0x200 [ 321.349721][T15739] ? fsnotify_perm+0x67/0x4e0 [ 321.354232][T15739] ? security_file_permission+0x7b/0xb0 [ 321.359616][T15739] ? preempt_count_add+0x92/0x1a0 [ 321.364474][T15739] vfs_fallocate+0x492/0x570 [ 321.368902][T15739] do_vfs_ioctl+0x1686/0x1a30 [ 321.373411][T15739] ? ioctl_has_perm+0x3f0/0x560 [ 321.378100][T15739] ? preempt_count_add+0x92/0x1a0 [ 321.382957][T15739] ? __x32_compat_sys_ioctl+0x90/0x90 [ 321.388189][T15739] ? kernel_write+0x3d0/0x3d0 [ 321.392692][T15739] ? selinux_file_ioctl+0x3cc/0x540 [ 321.397724][T15739] ? selinux_file_alloc_security+0x120/0x120 [ 321.403533][T15739] ? __fget_files+0x31e/0x380 [ 321.408049][T15739] ? security_file_ioctl+0x84/0xb0 [ 321.413002][T15739] __se_sys_ioctl+0x99/0x190 [ 321.417421][T15739] __x64_sys_ioctl+0x7b/0x90 [ 321.421843][T15739] do_syscall_64+0x34/0x70 [ 321.426097][T15739] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 321.431825][T15739] RIP: 0033:0x7ff81f75f0a9 [ 321.436079][T15739] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 321.455516][T15739] RSP: 002b:00007ff81ead90c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.463763][T15739] RAX: ffffffffffffffda RBX: 00007ff81f895f80 RCX: 00007ff81f75f0a9 [ 321.471575][T15739] RDX: 0000000020000040 RSI: 0000000040305839 RDI: 0000000000000008 [ 321.479388][T15739] RBP: 00007ff81ead9120 R08: 0000000000000000 R09: 0000000000000000 [ 321.487202][T15739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 321.495007][T15739] R13: 000000000000000b R14: 00007ff81f895f80 R15: 00007fff63787e98 [ 321.523640][T15687] device veth0_vlan entered promiscuous mode [ 321.547934][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 321.568079][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 321.576256][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 321.657744][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 321.672993][T15687] device veth1_macvtap entered promiscuous mode [ 321.692264][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.741869][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.749062][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 321.756900][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 321.808908][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.861426][T15763] device syzkaller0 entered promiscuous mode [ 321.883792][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.906834][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.916104][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.924117][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 322.111283][ T1035] device bridge_slave_1 left promiscuous mode [ 322.127612][ T1035] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.181800][ T1035] device bridge_slave_0 left promiscuous mode [ 322.260699][ T1035] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.513701][ T1035] device veth1_macvtap left promiscuous mode [ 322.525334][ T1035] device veth0_vlan left promiscuous mode [ 322.727317][T15791] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4294967295 (only 8 groups) [ 323.427389][T15833] FAULT_INJECTION: forcing a failure. [ 323.427389][T15833] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 323.469535][T15833] CPU: 1 PID: 15833 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 323.481058][T15833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 323.490950][T15833] Call Trace: [ 323.494086][T15833] dump_stack_lvl+0x1e2/0x24b [ 323.498598][T15833] ? bfq_pos_tree_add_move+0x43b/0x43b [ 323.503888][T15833] ? kmem_cache_free+0x90/0x1e0 [ 323.508576][T15833] dump_stack+0x15/0x17 [ 323.512567][T15833] should_fail+0x3c6/0x510 [ 323.516828][T15833] should_fail_alloc_page+0x52/0x60 [ 323.521855][T15833] __alloc_pages_nodemask+0x1b3/0xaf0 [ 323.527158][T15833] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 323.532529][T15833] ? page_cache_prev_miss+0x410/0x410 [ 323.537736][T15833] ? can_reuse_spf_vma+0xe0/0xe0 [ 323.542507][T15833] ? bpf_get_current_comm+0x45/0xa0 [ 323.547543][T15833] pagecache_get_page+0x669/0x950 [ 323.552403][T15833] grab_cache_page_write_begin+0x5d/0xa0 [ 323.557869][T15833] ext4_da_write_begin+0x587/0xf60 [ 323.562816][T15833] ? vmacache_update+0xb7/0x120 [ 323.567507][T15833] ? exc_page_fault+0x33d/0x5b0 [ 323.572189][T15833] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 323.577315][T15833] ? asm_exc_page_fault+0x1e/0x30 [ 323.582174][T15833] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 323.587902][T15833] ? __get_user_nocheck_1+0x6/0x10 [ 323.592849][T15833] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 323.598577][T15833] ? uuid_parse+0x470/0x470 [ 323.602918][T15833] ? trace_writeback_dirty_inode_enqueue+0x1b/0x110 [ 323.609338][T15833] ? __mark_inode_dirty+0x63e/0x9d0 [ 323.614372][T15833] generic_perform_write+0x2cd/0x570 [ 323.619494][T15833] ? __mnt_drop_write_file+0x84/0xa0 [ 323.624614][T15833] ? file_remove_privs+0x570/0x570 [ 323.629564][T15833] ? grab_cache_page_write_begin+0xa0/0xa0 [ 323.635210][T15833] ? down_write+0xd7/0x150 [ 323.639454][T15833] ? down_read_killable+0x220/0x220 [ 323.645792][T15833] ? generic_write_checks+0x393/0x470 [ 323.651001][T15833] ext4_buffered_write_iter+0x482/0x610 [ 323.656380][T15833] ext4_file_write_iter+0x193/0x1c80 [ 323.661503][T15833] ? kstrtol_from_user+0x310/0x310 [ 323.666535][T15833] ? memset+0x35/0x40 [ 323.670447][T15833] ? avc_policy_seqno+0x1b/0x70 [ 323.675127][T15833] ? selinux_file_permission+0x2bb/0x560 [ 323.680597][T15833] ? fsnotify_perm+0x67/0x4e0 [ 323.685109][T15833] ? ext4_file_read_iter+0x4d0/0x4d0 [ 323.690317][T15833] ? security_file_permission+0x86/0xb0 [ 323.695696][T15833] ? iov_iter_init+0x3f/0x120 [ 323.700210][T15833] vfs_write+0xb55/0xe70 [ 323.704291][T15833] ? kernel_write+0x3d0/0x3d0 [ 323.708806][T15833] ? mutex_trylock+0xa0/0xa0 [ 323.713231][T15833] ? __fdget_pos+0x2e7/0x3a0 [ 323.717655][T15833] ? ksys_write+0x77/0x2c0 [ 323.721907][T15833] ksys_write+0x199/0x2c0 [ 323.726073][T15833] ? __ia32_sys_read+0x90/0x90 [ 323.730675][T15833] ? debug_smp_processor_id+0x17/0x20 [ 323.735884][T15833] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 323.741788][T15833] ? debug_smp_processor_id+0x17/0x20 [ 323.746991][T15833] __x64_sys_write+0x7b/0x90 [ 323.751418][T15833] do_syscall_64+0x34/0x70 [ 323.755670][T15833] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 323.761401][T15833] RIP: 0033:0x7f27c423a0a9 [ 323.765655][T15833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 323.785095][T15833] RSP: 002b:00007f27c35b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.793338][T15833] RAX: ffffffffffffffda RBX: 00007f27c4370f80 RCX: 00007f27c423a0a9 [ 323.801152][T15833] RDX: 00000000fffffdef RSI: 00000000200013c0 RDI: 0000000000000003 [ 323.808961][T15833] RBP: 00007f27c35b4120 R08: 0000000000000000 R09: 0000000000000000 [ 323.816770][T15833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.824585][T15833] R13: 000000000000000b R14: 00007f27c4370f80 R15: 00007ffff9796a58 [ 323.920785][T15858] syz-executor.0[15858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.920840][T15858] syz-executor.0[15858] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.135388][T15894] syz-executor.2[15894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.242359][T15894] syz-executor.2[15894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.274493][T15906] syz-executor.1[15906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.446915][T15906] syz-executor.1[15906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.547836][T15894] syz-executor.2[15894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.924114][T15894] syz-executor.2[15894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.085581][T15925] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 325.111393][T15927] syz-executor.2[15927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.111493][T15927] syz-executor.2[15927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.169558][T15935] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 325.220712][T15941] device pim6reg1 entered promiscuous mode [ 326.754014][T16007] device syzkaller0 entered promiscuous mode [ 327.275336][ T24] audit: type=1400 audit(1719035265.640:170): avc: denied { create } for pid=16046 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 327.428165][T16062] tap0: tun_chr_ioctl cmd 1074025692 [ 327.456590][T16058] €Â: renamed from pim6reg1 [ 328.518205][T16111] ¯Ê®¸}p: renamed from pim6reg1 [ 330.224976][T16176] ¯Ê®¸}p: renamed from pim6reg1 [ 330.794767][T16250] device syzkaller0 entered promiscuous mode [ 331.060955][T16262] device sit0 entered promiscuous mode [ 331.383516][T16290] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.394100][T16290] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.401708][T16290] device bridge_slave_0 entered promiscuous mode [ 331.432196][T16290] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.440097][T16290] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.450995][T16290] device bridge_slave_1 entered promiscuous mode [ 331.548676][T16298] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.561399][T16298] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.569287][T16298] device bridge_slave_0 entered promiscuous mode [ 331.587969][T16298] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.595313][T16298] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.603150][T16298] device bridge_slave_1 entered promiscuous mode [ 331.778339][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.794114][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.857955][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.896414][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.957227][ T1874] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.964081][ T1874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.032170][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.076615][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.093517][ T1874] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.100391][ T1874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.137021][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.152505][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.195685][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.269623][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.331625][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.362661][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.381409][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.457039][T16290] device veth0_vlan entered promiscuous mode [ 332.465024][ T9] device bridge_slave_1 left promiscuous mode [ 332.474958][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.505965][ T9] device bridge_slave_0 left promiscuous mode [ 332.512965][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.521920][ T9] device veth1_macvtap left promiscuous mode [ 332.633110][T16290] device veth1_macvtap entered promiscuous mode [ 332.672414][T16345] ¯Ê®¸}p: renamed from pim6reg1 [ 332.681886][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 332.696377][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.707186][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.782703][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.818120][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.879144][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.887753][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.896492][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.905154][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.949650][T16298] device veth0_vlan entered promiscuous mode [ 332.961558][T16298] device veth1_macvtap entered promiscuous mode [ 333.024681][T16362] ¯Ê®¸}p: renamed from pim6reg1 [ 333.030558][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.049147][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.057535][T15545] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.064388][T15545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.071835][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.080011][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.088247][T15545] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.095071][T15545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.102517][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.110417][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.118455][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.126326][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.134341][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.143549][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.151911][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.159824][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.167895][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.176253][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.184616][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.192305][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.199900][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.207361][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.303375][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.317465][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.334376][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.345455][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 333.808307][T16401] syz-executor.1[16401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.808350][T16401] syz-executor.1[16401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.849772][T16407] device lo entered promiscuous mode [ 334.069584][T16410] syz-executor.1[16410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.069634][T16410] syz-executor.1[16410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.345844][ T9] device bridge_slave_1 left promiscuous mode [ 334.364258][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.371806][ T9] device bridge_slave_0 left promiscuous mode [ 334.389185][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.397854][ T9] device veth1_macvtap left promiscuous mode [ 334.403681][ T9] device veth0_vlan left promiscuous mode [ 334.762966][T16475] device syzkaller0 entered promiscuous mode [ 336.076395][T16546] device syzkaller0 entered promiscuous mode [ 336.648422][T16620] syz-executor.1[16620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.648466][T16620] syz-executor.1[16620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.724417][T16632] device syzkaller0 entered promiscuous mode [ 336.835476][T16650] device syzkaller0 entered promiscuous mode [ 336.909580][T16660] syz-executor.2[16660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.909637][T16660] syz-executor.2[16660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.946339][T16660] syz-executor.2[16660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.011325][T16660] syz-executor.2[16660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.067332][T16670] device syzkaller0 entered promiscuous mode [ 337.813005][T16705] FAULT_INJECTION: forcing a failure. [ 337.813005][T16705] name failslab, interval 1, probability 0, space 0, times 0 [ 337.832307][T16705] CPU: 1 PID: 16705 Comm: syz-executor.3 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 337.843831][T16705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 337.853720][T16705] Call Trace: [ 337.856858][T16705] dump_stack_lvl+0x1e2/0x24b [ 337.861363][T16705] ? panic+0x812/0x812 [ 337.865268][T16705] ? bfq_pos_tree_add_move+0x43b/0x43b [ 337.870567][T16705] ? __bpf_trace_kmem_free+0x6f/0x90 [ 337.875685][T16705] dump_stack+0x15/0x17 [ 337.879674][T16705] should_fail+0x3c6/0x510 [ 337.883929][T16705] ? jbd2__journal_start+0x150/0x710 [ 337.889051][T16705] __should_failslab+0xa4/0xe0 [ 337.893650][T16705] should_failslab+0x9/0x20 [ 337.897996][T16705] kmem_cache_alloc+0x3d/0x2e0 [ 337.902596][T16705] jbd2__journal_start+0x150/0x710 [ 337.907539][T16705] __ext4_journal_start_sb+0x249/0x4a0 [ 337.912830][T16705] ext4_alloc_file_blocks+0x3c9/0xcd0 [ 337.918049][T16705] ? trace_ext4_fallocate_enter+0x160/0x160 [ 337.923767][T16705] ? down_read_killable+0x220/0x220 [ 337.928800][T16705] ext4_zero_range+0x2f4/0x9b0 [ 337.933413][T16705] ext4_fallocate+0x520/0x1ca0 [ 337.938005][T16705] ? avc_policy_seqno+0x1b/0x70 [ 337.942691][T16705] ? ext4_ext_truncate+0x200/0x200 [ 337.947637][T16705] ? fsnotify_perm+0x67/0x4e0 [ 337.952153][T16705] ? security_file_permission+0x7b/0xb0 [ 337.957537][T16705] ? preempt_count_add+0x92/0x1a0 [ 337.962392][T16705] vfs_fallocate+0x492/0x570 [ 337.966816][T16705] do_vfs_ioctl+0x1686/0x1a30 [ 337.971329][T16705] ? ioctl_has_perm+0x3f0/0x560 [ 337.976015][T16705] ? preempt_count_add+0x92/0x1a0 [ 337.980878][T16705] ? __x32_compat_sys_ioctl+0x90/0x90 [ 337.986090][T16705] ? kernel_write+0x3d0/0x3d0 [ 337.990604][T16705] ? selinux_file_ioctl+0x3cc/0x540 [ 337.995636][T16705] ? selinux_file_alloc_security+0x120/0x120 [ 338.001459][T16705] ? __fget_files+0x31e/0x380 [ 338.005970][T16705] ? security_file_ioctl+0x84/0xb0 [ 338.010908][T16705] __se_sys_ioctl+0x99/0x190 [ 338.015332][T16705] __x64_sys_ioctl+0x7b/0x90 [ 338.019760][T16705] do_syscall_64+0x34/0x70 [ 338.024014][T16705] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 338.029740][T16705] RIP: 0033:0x7ffb672e50a9 [ 338.033998][T16705] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 338.053441][T16705] RSP: 002b:00007ffb6665f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.061684][T16705] RAX: ffffffffffffffda RBX: 00007ffb6741bf80 RCX: 00007ffb672e50a9 [ 338.069493][T16705] RDX: 0000000020000040 RSI: 0000000040305839 RDI: 0000000000000008 [ 338.077302][T16705] RBP: 00007ffb6665f120 R08: 0000000000000000 R09: 0000000000000000 [ 338.085113][T16705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 338.092937][T16705] R13: 000000000000000b R14: 00007ffb6741bf80 R15: 00007fffa5405d88 [ 339.479127][T16814] FAULT_INJECTION: forcing a failure. [ 339.479127][T16814] name failslab, interval 1, probability 0, space 0, times 0 [ 339.491743][T16814] CPU: 0 PID: 16814 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 339.503257][T16814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 339.513319][T16814] Call Trace: [ 339.516456][T16814] dump_stack_lvl+0x1e2/0x24b [ 339.520961][T16814] ? bfq_pos_tree_add_move+0x43b/0x43b [ 339.526256][T16814] dump_stack+0x15/0x17 [ 339.530248][T16814] should_fail+0x3c6/0x510 [ 339.534503][T16814] ? ext4_find_extent+0x370/0xdb0 [ 339.539364][T16814] __should_failslab+0xa4/0xe0 [ 339.543969][T16814] should_failslab+0x9/0x20 [ 339.548309][T16814] __kmalloc+0x60/0x330 [ 339.552298][T16814] ? unwind_get_return_address+0x4d/0x90 [ 339.557762][T16814] ext4_find_extent+0x370/0xdb0 [ 339.562448][T16814] ext4_ext_map_blocks+0x26a/0x6ee0 [ 339.567486][T16814] ? __kasan_slab_alloc+0xc3/0xe0 [ 339.572342][T16814] ? slab_post_alloc_hook+0x61/0x2f0 [ 339.577462][T16814] ? kmem_cache_alloc+0x168/0x2e0 [ 339.582326][T16814] ? alloc_buffer_head+0x26/0x110 [ 339.587190][T16814] ? alloc_page_buffers+0x129/0x4b0 [ 339.592219][T16814] ? create_empty_buffers+0x3d/0x4b0 [ 339.597363][T16814] ? ext4_block_write_begin+0x281/0x13b0 [ 339.602898][T16814] ? ext4_da_write_begin+0x815/0xf60 [ 339.608022][T16814] ? generic_perform_write+0x2cd/0x570 [ 339.613323][T16814] ? ext4_buffered_write_iter+0x482/0x610 [ 339.618874][T16814] ? ext4_file_write_iter+0x193/0x1c80 [ 339.624173][T16814] ? vfs_write+0xb55/0xe70 [ 339.628418][T16814] ? ksys_write+0x199/0x2c0 [ 339.632774][T16814] ? ext4_ext_release+0x10/0x10 [ 339.637535][T16814] ? __kasan_check_write+0x14/0x20 [ 339.642564][T16814] ? down_read+0xf0/0x210 [ 339.646733][T16814] ? _raw_read_unlock+0x25/0x40 [ 339.651418][T16814] ? ext4_es_lookup_extent+0x33b/0x940 [ 339.656716][T16814] ext4_da_get_block_prep+0x7be/0x1460 [ 339.662014][T16814] ? ext4_da_release_space+0x430/0x430 [ 339.667303][T16814] ? _raw_spin_lock+0xa4/0x1b0 [ 339.671901][T16814] ? alloc_page_buffers+0x364/0x4b0 [ 339.676938][T16814] ? _raw_spin_unlock+0x4d/0x70 [ 339.681622][T16814] ? create_empty_buffers+0x470/0x4b0 [ 339.686831][T16814] ext4_block_write_begin+0x61e/0x13b0 [ 339.692130][T16814] ? ext4_da_release_space+0x430/0x430 [ 339.697507][T16814] ? ext4_print_free_blocks+0x2b0/0x2b0 [ 339.702887][T16814] ? __ext4_journal_start_sb+0x249/0x4a0 [ 339.708356][T16814] ext4_da_write_begin+0x815/0xf60 [ 339.713305][T16814] ? vmacache_update+0xb7/0x120 [ 339.717989][T16814] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 339.723111][T16814] ? asm_exc_page_fault+0x1e/0x30 [ 339.727974][T16814] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 339.733701][T16814] ? __get_user_nocheck_1+0x6/0x10 [ 339.738649][T16814] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 339.744380][T16814] ? uuid_parse+0x470/0x470 [ 339.748713][T16814] ? current_time+0x1af/0x2f0 [ 339.753230][T16814] generic_perform_write+0x2cd/0x570 [ 339.758349][T16814] ? file_remove_privs+0x570/0x570 [ 339.763383][T16814] ? grab_cache_page_write_begin+0xa0/0xa0 [ 339.769021][T16814] ? down_write+0xd7/0x150 [ 339.773275][T16814] ? down_read_killable+0x220/0x220 [ 339.778310][T16814] ? generic_write_checks+0x393/0x470 [ 339.783518][T16814] ext4_buffered_write_iter+0x482/0x610 [ 339.788991][T16814] ext4_file_write_iter+0x193/0x1c80 [ 339.794109][T16814] ? kstrtol_from_user+0x310/0x310 [ 339.799058][T16814] ? memset+0x35/0x40 [ 339.802879][T16814] ? avc_policy_seqno+0x1b/0x70 [ 339.807563][T16814] ? selinux_file_permission+0x2bb/0x560 [ 339.813037][T16814] ? fsnotify_perm+0x67/0x4e0 [ 339.817544][T16814] ? ext4_file_read_iter+0x4d0/0x4d0 [ 339.822664][T16814] ? security_file_permission+0x86/0xb0 [ 339.828051][T16814] ? iov_iter_init+0x3f/0x120 [ 339.832558][T16814] vfs_write+0xb55/0xe70 [ 339.836638][T16814] ? kernel_write+0x3d0/0x3d0 [ 339.841150][T16814] ? mutex_trylock+0xa0/0xa0 [ 339.845576][T16814] ? __fdget_pos+0x2e7/0x3a0 [ 339.849998][T16814] ? ksys_write+0x77/0x2c0 [ 339.854427][T16814] ksys_write+0x199/0x2c0 [ 339.858597][T16814] ? __ia32_sys_read+0x90/0x90 [ 339.863197][T16814] ? debug_smp_processor_id+0x17/0x20 [ 339.868407][T16814] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 339.874303][T16814] ? debug_smp_processor_id+0x17/0x20 [ 339.879510][T16814] __x64_sys_write+0x7b/0x90 [ 339.883937][T16814] do_syscall_64+0x34/0x70 [ 339.888196][T16814] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 339.893923][T16814] RIP: 0033:0x7f27c423a0a9 [ 339.898176][T16814] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 339.917613][T16814] RSP: 002b:00007f27c35b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.925857][T16814] RAX: ffffffffffffffda RBX: 00007f27c4370f80 RCX: 00007f27c423a0a9 [ 339.933693][T16814] RDX: 00000000fffffdef RSI: 00000000200013c0 RDI: 0000000000000003 [ 339.941480][T16814] RBP: 00007f27c35b4120 R08: 0000000000000000 R09: 0000000000000000 [ 339.949289][T16814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.957106][T16814] R13: 000000000000000b R14: 00007f27c4370f80 R15: 00007ffff9796a58 [ 342.658560][T16959] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.680992][T16959] O3ãc¤±: renamed from bridge_slave_0 [ 344.149495][T17040] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 344.247438][T17051] bpf_get_probe_write_proto: 2 callbacks suppressed [ 344.247447][T17051] syz-executor.2[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.254020][T17051] syz-executor.2[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.750080][T17123] device syzkaller0 entered promiscuous mode [ 345.961171][T17188] device syzkaller0 entered promiscuous mode [ 347.035402][T17250] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 347.060552][T17250] device pim6reg1 entered promiscuous mode [ 349.400407][T17444] ¯Ê®¸}p: renamed from pim6reg1 [ 350.243935][T17475] device pim6reg1 entered promiscuous mode [ 350.290891][T17486] ¯Ê®¸}p: renamed from pim6reg1 [ 350.794019][T17527] ¯Ê®¸}p: renamed from pim6reg1 [ 351.491744][T17587] ¯Ê®¸}p: renamed from pim6reg1 [ 352.372273][T17609] device syzkaller0 entered promiscuous mode [ 352.494762][T17622] device syzkaller0 entered promiscuous mode [ 353.963143][T17696] device pim6reg1 entered promiscuous mode [ 354.078779][T17701] syz-executor.4[17701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.078831][T17701] syz-executor.4[17701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.244393][T17721] FAULT_INJECTION: forcing a failure. [ 354.244393][T17721] name failslab, interval 1, probability 0, space 0, times 0 [ 354.268478][T17721] CPU: 1 PID: 17721 Comm: syz-executor.2 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 354.279990][T17721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 354.289883][T17721] Call Trace: [ 354.293016][T17721] dump_stack_lvl+0x1e2/0x24b [ 354.297525][T17721] ? bfq_pos_tree_add_move+0x43b/0x43b [ 354.302819][T17721] ? __es_remove_extent+0x310/0x1dd0 [ 354.307934][T17721] ? send_signal+0x4c1/0x5e0 [ 354.312362][T17721] dump_stack+0x15/0x17 [ 354.316438][T17721] should_fail+0x3c6/0x510 [ 354.320696][T17721] ? __es_insert_extent+0x72a/0x17c0 [ 354.325815][T17721] __should_failslab+0xa4/0xe0 [ 354.330419][T17721] should_failslab+0x9/0x20 [ 354.334759][T17721] kmem_cache_alloc+0x3d/0x2e0 [ 354.339354][T17721] __es_insert_extent+0x72a/0x17c0 [ 354.344306][T17721] ? _raw_write_lock+0xa4/0x170 [ 354.349005][T17721] ? _raw_write_trylock+0x1a0/0x1a0 [ 354.354025][T17721] ? bpf_do_trace_printk+0x270/0x270 [ 354.359148][T17721] ext4_es_insert_extent+0x576/0x2d80 [ 354.364353][T17721] ? bpf_trace_run2+0xf4/0x280 [ 354.368951][T17721] ? ext4_es_scan_clu+0x340/0x340 [ 354.373814][T17721] ? __bpf_trace_ext4_es_find_extent_range_exit+0x25/0x30 [ 354.380755][T17721] ? ext4_es_find_extent_range+0x2f3/0x320 [ 354.386396][T17721] ? trace_ext4_ext_convert_to_initialized_fastpath+0x160/0x160 [ 354.393861][T17721] ext4_ext_map_blocks+0x25c8/0x6ee0 [ 354.398987][T17721] ? __kasan_slab_alloc+0xc3/0xe0 [ 354.403842][T17721] ? slab_post_alloc_hook+0x61/0x2f0 [ 354.408965][T17721] ? kmem_cache_alloc+0x168/0x2e0 [ 354.413822][T17721] ? alloc_buffer_head+0x26/0x110 [ 354.418772][T17721] ? alloc_page_buffers+0x129/0x4b0 [ 354.423808][T17721] ? create_empty_buffers+0x3d/0x4b0 [ 354.428928][T17721] ? ext4_block_write_begin+0x281/0x13b0 [ 354.434398][T17721] ? ext4_da_write_begin+0x815/0xf60 [ 354.439521][T17721] ? generic_perform_write+0x2cd/0x570 [ 354.444809][T17721] ? ext4_buffered_write_iter+0x482/0x610 [ 354.450365][T17721] ? ext4_file_write_iter+0x193/0x1c80 [ 354.455658][T17721] ? vfs_write+0xb55/0xe70 [ 354.459909][T17721] ? ksys_write+0x199/0x2c0 [ 354.464253][T17721] ? ext4_ext_release+0x10/0x10 [ 354.468946][T17721] ? __kasan_check_write+0x14/0x20 [ 354.473886][T17721] ? down_read+0xf0/0x210 [ 354.478048][T17721] ? _raw_read_unlock+0x25/0x40 [ 354.482735][T17721] ? ext4_es_lookup_extent+0x33b/0x940 [ 354.488033][T17721] ext4_da_get_block_prep+0x7be/0x1460 [ 354.493328][T17721] ? ext4_da_release_space+0x430/0x430 [ 354.498626][T17721] ? _raw_spin_lock+0xa4/0x1b0 [ 354.503230][T17721] ? alloc_page_buffers+0x364/0x4b0 [ 354.508261][T17721] ? _raw_spin_unlock+0x4d/0x70 [ 354.512939][T17721] ? create_empty_buffers+0x470/0x4b0 [ 354.518151][T17721] ext4_block_write_begin+0x61e/0x13b0 [ 354.523447][T17721] ? ext4_da_release_space+0x430/0x430 [ 354.528742][T17721] ? ext4_print_free_blocks+0x2b0/0x2b0 [ 354.534171][T17721] ? __ext4_journal_start_sb+0x249/0x4a0 [ 354.539594][T17721] ext4_da_write_begin+0x815/0xf60 [ 354.544536][T17721] ? vmacache_update+0xb7/0x120 [ 354.549309][T17721] ? ext4_set_page_dirty+0x1a0/0x1a0 [ 354.554437][T17721] ? asm_exc_page_fault+0x1e/0x30 [ 354.559381][T17721] ? iov_iter_fault_in_readable+0x270/0x4f0 [ 354.565106][T17721] ? __get_user_nocheck_1+0x6/0x10 [ 354.570051][T17721] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 354.575782][T17721] ? uuid_parse+0x470/0x470 [ 354.580120][T17721] ? current_time+0x1af/0x2f0 [ 354.584638][T17721] generic_perform_write+0x2cd/0x570 [ 354.589757][T17721] ? file_remove_privs+0x570/0x570 [ 354.594703][T17721] ? grab_cache_page_write_begin+0xa0/0xa0 [ 354.600342][T17721] ? down_write+0xd7/0x150 [ 354.604592][T17721] ? down_read_killable+0x220/0x220 [ 354.609630][T17721] ? generic_write_checks+0x393/0x470 [ 354.614837][T17721] ext4_buffered_write_iter+0x482/0x610 [ 354.620305][T17721] ext4_file_write_iter+0x193/0x1c80 [ 354.625426][T17721] ? kstrtol_from_user+0x310/0x310 [ 354.630461][T17721] ? memset+0x35/0x40 [ 354.634277][T17721] ? avc_policy_seqno+0x1b/0x70 [ 354.638965][T17721] ? selinux_file_permission+0x2bb/0x560 [ 354.644438][T17721] ? fsnotify_perm+0x67/0x4e0 [ 354.648952][T17721] ? ext4_file_read_iter+0x4d0/0x4d0 [ 354.654072][T17721] ? security_file_permission+0x86/0xb0 [ 354.659452][T17721] ? iov_iter_init+0x3f/0x120 [ 354.663966][T17721] vfs_write+0xb55/0xe70 [ 354.668045][T17721] ? kernel_write+0x3d0/0x3d0 [ 354.672555][T17721] ? mutex_trylock+0xa0/0xa0 [ 354.676985][T17721] ? __fdget_pos+0x2e7/0x3a0 [ 354.681407][T17721] ? ksys_write+0x77/0x2c0 [ 354.685671][T17721] ksys_write+0x199/0x2c0 [ 354.689826][T17721] ? __ia32_sys_read+0x90/0x90 [ 354.694429][T17721] ? debug_smp_processor_id+0x17/0x20 [ 354.699637][T17721] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 354.705536][T17721] ? debug_smp_processor_id+0x17/0x20 [ 354.710741][T17721] __x64_sys_write+0x7b/0x90 [ 354.715170][T17721] do_syscall_64+0x34/0x70 [ 354.719424][T17721] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 354.725150][T17721] RIP: 0033:0x7f661f99d0a9 [ 354.729408][T17721] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 354.748842][T17721] RSP: 002b:00007f661ed170c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.757088][T17721] RAX: ffffffffffffffda RBX: 00007f661fad3f80 RCX: 00007f661f99d0a9 [ 354.764899][T17721] RDX: 00000000fffffdef RSI: 00000000200013c0 RDI: 0000000000000003 [ 354.772709][T17721] RBP: 00007f661ed17120 R08: 0000000000000000 R09: 0000000000000000 [ 354.780521][T17721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.788336][T17721] R13: 000000000000000b R14: 00007f661fad3f80 R15: 00007ffc00aabe58 [ 354.878501][T17728] device syzkaller0 entered promiscuous mode [ 355.730445][T17785] device vxcan1 entered promiscuous mode [ 358.433096][T17949] device sit0 entered promiscuous mode [ 358.501191][T17955] syz-executor.4[17955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.501233][T17955] syz-executor.4[17955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.570194][T17966] device pim6reg1 entered promiscuous mode [ 358.670166][T17971] device syzkaller0 entered promiscuous mode [ 358.716464][T17979] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 358.966313][T18029] FAULT_INJECTION: forcing a failure. [ 358.966313][T18029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.983183][T18029] CPU: 1 PID: 18029 Comm: syz-executor.1 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 358.994700][T18029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 359.004621][T18029] Call Trace: [ 359.007729][T18029] dump_stack_lvl+0x1e2/0x24b [ 359.012237][T18029] ? bfq_pos_tree_add_move+0x43b/0x43b [ 359.017534][T18029] ? __memcg_kmem_uncharge+0x40/0x40 [ 359.022653][T18029] dump_stack+0x15/0x17 [ 359.026641][T18029] should_fail+0x3c6/0x510 [ 359.030895][T18029] should_fail_usercopy+0x1a/0x20 [ 359.035752][T18029] _copy_from_user+0x20/0xd0 [ 359.040182][T18029] __se_sys_bpf+0x232/0x11cb0 [ 359.044696][T18029] ? terminate_walk+0x407/0x4f0 [ 359.049383][T18029] ? __kasan_check_read+0x11/0x20 [ 359.054239][T18029] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 359.059970][T18029] ? rotate_reclaimable_page+0x530/0x530 [ 359.065435][T18029] ? __mod_memcg_lruvec_state+0x131/0x310 [ 359.070991][T18029] ? __x64_sys_bpf+0x90/0x90 [ 359.075421][T18029] ? __mod_node_page_state+0xac/0xf0 [ 359.080541][T18029] ? _kstrtoull+0x3a0/0x4a0 [ 359.084878][T18029] ? kstrtouint_from_user+0x20a/0x2a0 [ 359.090088][T18029] ? _raw_spin_unlock+0x4d/0x70 [ 359.094773][T18029] ? kstrtol_from_user+0x310/0x310 [ 359.099719][T18029] ? memset+0x35/0x40 [ 359.103539][T18029] ? __fsnotify_parent+0x4b9/0x6c0 [ 359.108487][T18029] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 359.115082][T18029] ? proc_fail_nth_write+0x20b/0x290 [ 359.120202][T18029] ? proc_fail_nth_read+0x210/0x210 [ 359.125238][T18029] ? security_file_permission+0x86/0xb0 [ 359.130618][T18029] ? rw_verify_area+0x1c3/0x360 [ 359.135327][T18029] ? preempt_count_add+0x92/0x1a0 [ 359.140164][T18029] ? vfs_write+0x854/0xe70 [ 359.144418][T18029] ? kernel_write+0x3d0/0x3d0 [ 359.148934][T18029] ? __kasan_check_write+0x14/0x20 [ 359.153876][T18029] ? mutex_lock+0xa5/0x110 [ 359.158135][T18029] ? mutex_trylock+0xa0/0xa0 [ 359.162562][T18029] ? __kasan_check_write+0x14/0x20 [ 359.167503][T18029] ? fput_many+0x160/0x1b0 [ 359.171761][T18029] ? debug_smp_processor_id+0x17/0x20 [ 359.176969][T18029] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 359.182867][T18029] ? debug_smp_processor_id+0x17/0x20 [ 359.188075][T18029] __x64_sys_bpf+0x7b/0x90 [ 359.192326][T18029] do_syscall_64+0x34/0x70 [ 359.196584][T18029] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 359.202307][T18029] RIP: 0033:0x7fb2967060a9 [ 359.206563][T18029] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 359.226003][T18029] RSP: 002b:00007fb295a800c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 359.234246][T18029] RAX: ffffffffffffffda RBX: 00007fb29683cf80 RCX: 00007fb2967060a9 [ 359.242059][T18029] RDX: 0000000000000080 RSI: 0000000020000580 RDI: 0000000000000005 [ 359.249869][T18029] RBP: 00007fb295a80120 R08: 0000000000000000 R09: 0000000000000000 [ 359.257677][T18029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.265492][T18029] R13: 000000000000000b R14: 00007fb29683cf80 R15: 00007ffe66a801e8 [ 359.390072][T18046] device syzkaller0 entered promiscuous mode [ 359.567527][T18064] device syzkaller0 entered promiscuous mode [ 361.106352][T18153] device syzkaller0 entered promiscuous mode [ 361.132324][T18153] device syzkaller0 left promiscuous mode [ 362.335814][T18200] syz-executor.2[18200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.335846][T18200] syz-executor.2[18200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.673628][T18244] ¯Ê®¸}p: renamed from pim6reg1 [ 364.785665][T18276] ¯Ê®¸}p: renamed from pim6reg1 [ 366.325445][T18321] ¯Ê®¸}p: renamed from pim6reg1 [ 366.726722][T18332] syz-executor.1[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.726769][T18332] syz-executor.1[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.769975][T18332] syz-executor.1[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.809816][T18332] syz-executor.1[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.354210][T18351] device syzkaller0 entered promiscuous mode [ 368.036727][T18399] device vxcan1 entered promiscuous mode [ 368.423059][T18400] ¯Ê®¸}p: renamed from pim6reg1 [ 368.540510][T18411] FAULT_INJECTION: forcing a failure. [ 368.540510][T18411] name failslab, interval 1, probability 0, space 0, times 0 [ 368.554777][T18415] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 231 (only 8 groups) [ 368.566573][T18411] CPU: 1 PID: 18411 Comm: syz-executor.1 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 368.578092][T18411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 368.587983][T18411] Call Trace: [ 368.591117][T18411] dump_stack_lvl+0x1e2/0x24b [ 368.595628][T18411] ? bfq_pos_tree_add_move+0x43b/0x43b [ 368.600949][T18411] ? __dquot_alloc_space+0x267/0xc10 [ 368.606043][T18411] dump_stack+0x15/0x17 [ 368.610032][T18411] should_fail+0x3c6/0x510 [ 368.614288][T18411] ? ext4_mb_new_blocks+0x5bc/0x43f0 [ 368.619413][T18411] __should_failslab+0xa4/0xe0 [ 368.624009][T18411] should_failslab+0x9/0x20 [ 368.628352][T18411] kmem_cache_alloc+0x3d/0x2e0 [ 368.632952][T18411] ext4_mb_new_blocks+0x5bc/0x43f0 [ 368.637898][T18411] ? __es_insert_extent+0x17c0/0x17c0 [ 368.643107][T18411] ? __kasan_kmalloc+0x9/0x10 [ 368.647614][T18411] ? memset+0x35/0x40 [ 368.651430][T18411] ? ext4_mb_pa_callback+0xd0/0xd0 [ 368.656377][T18411] ? ext4_ext_search_right+0x3e4/0x900 [ 368.661685][T18411] ? ext4_ext_check_overlap+0x38f/0x5d0 [ 368.667059][T18411] ? ext4_ext_find_goal+0x105/0x200 [ 368.672093][T18411] ext4_ext_map_blocks+0x1a00/0x6ee0 [ 368.677209][T18411] ? slab_free_freelist_hook+0xc0/0x190 [ 368.682593][T18411] ? kmem_cache_free+0xa9/0x1e0 [ 368.687285][T18411] ? _raw_read_unlock+0x25/0x40 [ 368.691973][T18411] ? start_this_handle+0x1e71/0x1ff0 [ 368.697088][T18411] ? __kasan_slab_alloc+0xc3/0xe0 [ 368.701948][T18411] ? ext4_ext_release+0x10/0x10 [ 368.706643][T18411] ? _raw_read_unlock+0x25/0x40 [ 368.711328][T18411] ? ext4_es_lookup_extent+0x33b/0x940 [ 368.716624][T18411] ext4_map_blocks+0xa65/0x1d10 [ 368.721308][T18411] ? slab_post_alloc_hook+0x80/0x2f0 [ 368.726426][T18411] ? ext4_issue_zeroout+0x1b0/0x1b0 [ 368.731461][T18411] ? __ext4_journal_start_sb+0x249/0x4a0 [ 368.736926][T18411] ext4_alloc_file_blocks+0x3f4/0xcd0 [ 368.742148][T18411] ? trace_ext4_fallocate_enter+0x160/0x160 [ 368.747892][T18411] ? down_read_killable+0x220/0x220 [ 368.752900][T18411] ext4_zero_range+0x2f4/0x9b0 [ 368.757585][T18411] ext4_fallocate+0x520/0x1ca0 [ 368.762187][T18411] ? avc_policy_seqno+0x1b/0x70 [ 368.766868][T18411] ? ext4_ext_truncate+0x200/0x200 [ 368.771818][T18411] ? fsnotify_perm+0x67/0x4e0 [ 368.776330][T18411] ? security_file_permission+0x7b/0xb0 [ 368.781711][T18411] ? preempt_count_add+0x92/0x1a0 [ 368.786577][T18411] vfs_fallocate+0x492/0x570 [ 368.790997][T18411] do_vfs_ioctl+0x1686/0x1a30 [ 368.795513][T18411] ? ioctl_has_perm+0x3f0/0x560 [ 368.800202][T18411] ? preempt_count_add+0x92/0x1a0 [ 368.805063][T18411] ? __x32_compat_sys_ioctl+0x90/0x90 [ 368.810269][T18411] ? kernel_write+0x3d0/0x3d0 [ 368.814783][T18411] ? selinux_file_ioctl+0x3cc/0x540 [ 368.819902][T18411] ? selinux_file_alloc_security+0x120/0x120 [ 368.825719][T18411] ? __fget_files+0x31e/0x380 [ 368.830236][T18411] ? security_file_ioctl+0x84/0xb0 [ 368.835177][T18411] __se_sys_ioctl+0x99/0x190 [ 368.839619][T18411] __x64_sys_ioctl+0x7b/0x90 [ 368.844028][T18411] do_syscall_64+0x34/0x70 [ 368.848282][T18411] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 368.854009][T18411] RIP: 0033:0x7fb2967060a9 [ 368.858260][T18411] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 368.877705][T18411] RSP: 002b:00007fb295a800c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.885951][T18411] RAX: ffffffffffffffda RBX: 00007fb29683cf80 RCX: 00007fb2967060a9 [ 368.893757][T18411] RDX: 0000000020000040 RSI: 0000000040305839 RDI: 0000000000000008 [ 368.901656][T18411] RBP: 00007fb295a80120 R08: 0000000000000000 R09: 0000000000000000 [ 368.909466][T18411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 368.917280][T18411] R13: 000000000000000b R14: 00007fb29683cf80 R15: 00007ffe66a801e8 [ 368.981282][T18430] syz-executor.1[18430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.981326][T18430] syz-executor.1[18430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.008479][T18472] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 370.908796][T18501] device syzkaller0 entered promiscuous mode [ 371.981759][T18571] device syzkaller0 entered promiscuous mode [ 372.257986][T18598] ªªªªªª: renamed from vlan0 [ 372.404420][T18620] syz-executor.1[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.404464][T18620] syz-executor.1[18620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.209231][T18654] ¯Ê®¸}p: renamed from pim6reg1 [ 374.124126][T18710] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 374.271285][ T24] audit: type=1400 audit(1719035312.640:171): avc: denied { create } for pid=18713 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 375.016651][T18750] ¯Ê®¸}p: renamed from pim6reg1 [ 375.317529][T18765] device wg1 entered promiscuous mode [ 375.348961][T18767] device syzkaller0 entered promiscuous mode [ 375.355727][T18771] FAULT_INJECTION: forcing a failure. [ 375.355727][T18771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.368713][T18771] CPU: 0 PID: 18771 Comm: syz-executor.1 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 375.368771][T18765] device veth0_vlan left promiscuous mode [ 375.380220][T18771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 375.380224][T18771] Call Trace: [ 375.380246][T18771] dump_stack_lvl+0x1e2/0x24b [ 375.380256][T18771] ? bfq_pos_tree_add_move+0x43b/0x43b [ 375.380263][T18771] ? 0xffffffffa002e000 [ 375.380273][T18771] ? is_bpf_text_address+0x172/0x190 [ 375.380290][T18771] dump_stack+0x15/0x17 [ 375.421713][T18771] should_fail+0x3c6/0x510 [ 375.425960][T18771] should_fail_usercopy+0x1a/0x20 [ 375.430816][T18771] strncpy_from_user+0x24/0x2d0 [ 375.435504][T18771] __se_sys_bpf+0x1389/0x11cb0 [ 375.440109][T18771] ? terminate_walk+0x407/0x4f0 [ 375.444794][T18771] ? __kasan_check_read+0x11/0x20 [ 375.449652][T18771] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 375.455393][T18771] ? rotate_reclaimable_page+0x530/0x530 [ 375.460848][T18771] ? __mod_memcg_lruvec_state+0x131/0x310 [ 375.466403][T18771] ? __x64_sys_bpf+0x90/0x90 [ 375.470828][T18771] ? _kstrtoull+0x3a0/0x4a0 [ 375.475170][T18771] ? memset+0x35/0x40 [ 375.478988][T18771] ? __fsnotify_parent+0x4b9/0x6c0 [ 375.483936][T18771] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 375.490532][T18771] ? proc_fail_nth_write+0x20b/0x290 [ 375.495651][T18771] ? proc_fail_nth_read+0x210/0x210 [ 375.500705][T18771] ? security_file_permission+0x86/0xb0 [ 375.506077][T18771] ? rw_verify_area+0x1c3/0x360 [ 375.510768][T18771] ? preempt_count_add+0x92/0x1a0 [ 375.515623][T18771] ? vfs_write+0x854/0xe70 [ 375.519875][T18771] ? kernel_write+0x3d0/0x3d0 [ 375.524387][T18771] ? __kasan_check_write+0x14/0x20 [ 375.529337][T18771] ? mutex_lock+0xa5/0x110 [ 375.533587][T18771] ? mutex_trylock+0xa0/0xa0 [ 375.538014][T18771] ? __kasan_check_write+0x14/0x20 [ 375.542956][T18771] ? fput_many+0x160/0x1b0 [ 375.547210][T18771] ? debug_smp_processor_id+0x17/0x20 [ 375.552418][T18771] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 375.558321][T18771] ? debug_smp_processor_id+0x17/0x20 [ 375.563536][T18771] __x64_sys_bpf+0x7b/0x90 [ 375.567795][T18771] do_syscall_64+0x34/0x70 [ 375.572036][T18771] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 375.577763][T18771] RIP: 0033:0x7fb2967060a9 [ 375.582016][T18771] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 375.601456][T18771] RSP: 002b:00007fb295a800c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.609700][T18771] RAX: ffffffffffffffda RBX: 00007fb29683cf80 RCX: 00007fb2967060a9 [ 375.617511][T18771] RDX: 0000000000000080 RSI: 0000000020000580 RDI: 0000000000000005 [ 375.625320][T18771] RBP: 00007fb295a80120 R08: 0000000000000000 R09: 0000000000000000 [ 375.633131][T18771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 375.640947][T18771] R13: 000000000000000b R14: 00007fb29683cf80 R15: 00007ffe66a801e8 [ 375.652196][T18765] device veth0_vlan entered promiscuous mode [ 375.712930][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.721602][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 375.728988][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.962488][T18783] ¯Ê®¸}p: renamed from pim6reg1 [ 376.063352][T18775] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.174288][T18775] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.238186][T18775] device bridge_slave_0 entered promiscuous mode [ 376.314235][T18775] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.394910][T18775] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.485837][T18775] device bridge_slave_1 entered promiscuous mode [ 376.537675][T18811] FAULT_INJECTION: forcing a failure. [ 376.537675][T18811] name failslab, interval 1, probability 0, space 0, times 0 [ 376.716012][T18811] CPU: 1 PID: 18811 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 376.727570][T18811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 376.737426][T18811] Call Trace: [ 376.740564][T18811] dump_stack_lvl+0x1e2/0x24b [ 376.745082][T18811] ? panic+0x812/0x812 [ 376.748981][T18811] ? bfq_pos_tree_add_move+0x43b/0x43b [ 376.754273][T18811] ? finish_task_switch+0x130/0x5a0 [ 376.759307][T18811] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 376.764340][T18811] ? avc_has_perm_noaudit+0x117/0x240 [ 376.769548][T18811] dump_stack+0x15/0x17 [ 376.773538][T18811] should_fail+0x3c6/0x510 [ 376.777795][T18811] ? __get_vm_area_node+0x116/0x470 [ 376.782829][T18811] __should_failslab+0xa4/0xe0 [ 376.787427][T18811] should_failslab+0x9/0x20 [ 376.791768][T18811] kmem_cache_alloc_trace+0x3a/0x2e0 [ 376.796889][T18811] __get_vm_area_node+0x116/0x470 [ 376.801757][T18811] __vmalloc_node_range+0xdc/0x7c0 [ 376.806694][T18811] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 376.812077][T18811] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 376.817459][T18811] __vmalloc+0x7a/0x90 [ 376.821362][T18811] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 376.826744][T18811] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 376.831949][T18811] bpf_prog_alloc+0x21/0x1e0 [ 376.836377][T18811] __se_sys_bpf+0x9856/0x11cb0 [ 376.840979][T18811] ? ktime_get+0x10e/0x140 [ 376.845232][T18811] ? lapic_next_event+0x5f/0x70 [ 376.849919][T18811] ? clockevents_program_event+0x214/0x2c0 [ 376.855565][T18811] ? __x64_sys_bpf+0x90/0x90 [ 376.859994][T18811] ? visit_groups_merge+0x2434/0x24b0 [ 376.865201][T18811] ? ctx_flexible_sched_in+0xa8/0x100 [ 376.870401][T18811] ? ctx_pinned_sched_in+0x100/0x100 [ 376.875524][T18811] ? kvm_sched_clock_read+0x18/0x40 [ 376.880555][T18811] ? sched_clock+0x3a/0x40 [ 376.884810][T18811] ? sched_clock_cpu+0x1b/0x3b0 [ 376.889495][T18811] ? _raw_spin_lock+0xa4/0x1b0 [ 376.894095][T18811] ? _raw_spin_trylock_bh+0x190/0x190 [ 376.899305][T18811] ? ctx_sched_in+0x276/0x310 [ 376.903819][T18811] ? _raw_spin_unlock+0x4d/0x70 [ 376.908507][T18811] ? perf_event_context_sched_in+0x48f/0x580 [ 376.914321][T18811] ? __this_cpu_preempt_check+0x13/0x20 [ 376.919703][T18811] ? __perf_event_task_sched_in+0x219/0x2a0 [ 376.925428][T18811] ? perf_pmu_sched_task+0x190/0x190 [ 376.930552][T18811] ? perf_sched_cb_inc+0x260/0x260 [ 376.935498][T18811] ? _raw_spin_unlock_irq+0x4e/0x70 [ 376.940529][T18811] ? finish_task_switch+0x130/0x5a0 [ 376.945570][T18811] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 376.950606][T18811] ? __switch_to_asm+0x34/0x60 [ 376.955197][T18811] ? __schedule+0xbee/0x1330 [ 376.959636][T18811] ? __kasan_check_read+0x11/0x20 [ 376.964489][T18811] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 376.970391][T18811] __x64_sys_bpf+0x7b/0x90 [ 376.974652][T18811] do_syscall_64+0x34/0x70 [ 376.978897][T18811] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 376.984626][T18811] RIP: 0033:0x7f27c423a0a9 [ 376.988879][T18811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 377.008501][T18811] RSP: 002b:00007f27c35b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 377.016739][T18811] RAX: ffffffffffffffda RBX: 00007f27c4370f80 RCX: 00007f27c423a0a9 [ 377.024554][T18811] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 377.032365][T18811] RBP: 00007f27c35b4120 R08: 0000000000000000 R09: 0000000000000000 [ 377.040174][T18811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.047990][T18811] R13: 000000000000000b R14: 00007f27c4370f80 R15: 00007ffff9796a58 [ 377.120471][T18811] syz-executor.4: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 377.141707][T18811] CPU: 0 PID: 18811 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 377.153231][T18811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 377.163120][T18811] Call Trace: [ 377.166250][T18811] dump_stack_lvl+0x1e2/0x24b [ 377.170758][T18811] ? wake_up_klogd+0xb8/0xf0 [ 377.175183][T18811] ? bfq_pos_tree_add_move+0x43b/0x43b [ 377.180478][T18811] ? pr_cont_kernfs_name+0xf0/0x100 [ 377.185512][T18811] dump_stack+0x15/0x17 [ 377.189504][T18811] warn_alloc+0x21a/0x390 [ 377.193672][T18811] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 377.199050][T18811] ? irq_exit_rcu+0x9/0x10 [ 377.203301][T18811] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 377.208947][T18811] __vmalloc_node_range+0x287/0x7c0 [ 377.213984][T18811] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 377.219359][T18811] __vmalloc+0x7a/0x90 [ 377.223276][T18811] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 377.228646][T18811] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 377.233852][T18811] bpf_prog_alloc+0x21/0x1e0 [ 377.238282][T18811] __se_sys_bpf+0x9856/0x11cb0 [ 377.242981][T18811] ? ktime_get+0x10e/0x140 [ 377.247234][T18811] ? lapic_next_event+0x5f/0x70 [ 377.251917][T18811] ? clockevents_program_event+0x214/0x2c0 [ 377.257561][T18811] ? __x64_sys_bpf+0x90/0x90 [ 377.261985][T18811] ? visit_groups_merge+0x2434/0x24b0 [ 377.267197][T18811] ? ctx_flexible_sched_in+0xa8/0x100 [ 377.272402][T18811] ? ctx_pinned_sched_in+0x100/0x100 [ 377.277523][T18811] ? kvm_sched_clock_read+0x18/0x40 [ 377.282555][T18811] ? sched_clock+0x3a/0x40 [ 377.286807][T18811] ? sched_clock_cpu+0x1b/0x3b0 [ 377.291496][T18811] ? _raw_spin_lock+0xa4/0x1b0 [ 377.296095][T18811] ? _raw_spin_trylock_bh+0x190/0x190 [ 377.301302][T18811] ? ctx_sched_in+0x276/0x310 [ 377.305816][T18811] ? _raw_spin_unlock+0x4d/0x70 [ 377.310527][T18811] ? perf_event_context_sched_in+0x48f/0x580 [ 377.316319][T18811] ? __this_cpu_preempt_check+0x13/0x20 [ 377.321716][T18811] ? __perf_event_task_sched_in+0x219/0x2a0 [ 377.327434][T18811] ? perf_pmu_sched_task+0x190/0x190 [ 377.332553][T18811] ? perf_sched_cb_inc+0x260/0x260 [ 377.337498][T18811] ? _raw_spin_unlock_irq+0x4e/0x70 [ 377.342533][T18811] ? finish_task_switch+0x130/0x5a0 [ 377.347566][T18811] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 377.352602][T18811] ? __switch_to_asm+0x34/0x60 [ 377.357199][T18811] ? __schedule+0xbee/0x1330 [ 377.361629][T18811] ? __kasan_check_read+0x11/0x20 [ 377.366486][T18811] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 377.372389][T18811] __x64_sys_bpf+0x7b/0x90 [ 377.376643][T18811] do_syscall_64+0x34/0x70 [ 377.380899][T18811] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 377.386649][T18811] RIP: 0033:0x7f27c423a0a9 [ 377.390877][T18811] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 377.410318][T18811] RSP: 002b:00007f27c35b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 377.418559][T18811] RAX: ffffffffffffffda RBX: 00007f27c4370f80 RCX: 00007f27c423a0a9 [ 377.426371][T18811] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 377.434183][T18811] RBP: 00007f27c35b4120 R08: 0000000000000000 R09: 0000000000000000 [ 377.441994][T18811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.449805][T18811] R13: 000000000000000b R14: 00007f27c4370f80 R15: 00007ffff9796a58 [ 377.464586][T18811] Mem-Info: [ 377.470933][T18811] active_anon:366 inactive_anon:20434 isolated_anon:0 [ 377.470933][T18811] active_file:6728 inactive_file:10570 isolated_file:0 [ 377.470933][T18811] unevictable:0 dirty:66 writeback:0 [ 377.470933][T18811] slab_reclaimable:9127 slab_unreclaimable:81144 [ 377.470933][T18811] mapped:24441 shmem:444 pagetables:496 bounce:0 [ 377.470933][T18811] free:1563826 free_pcp:1099 free_cma:0 [ 377.507903][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.507998][T18811] Node 0 active_anon:1464kB inactive_anon:81736kB active_file:26912kB inactive_file:42280kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:97764kB dirty:264kB writeback:0kB shmem:1776kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7392kB all_unreclaimable? no [ 377.515110][ T1065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.551861][T18811] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984788kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2948kB local_pcp:1444kB free_cma:0kB [ 377.559031][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.589820][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.598217][T15543] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.600068][T18811] lowmem_reserve[]: [ 377.605065][T15543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.608705][T18811] 0 3941 3941 [ 377.619934][T18811] Normal free:3272672kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:1464kB inactive_anon:81736kB active_file:26912kB inactive_file:42280kB unevictable:0kB writepending:264kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:1984kB bounce:0kB free_pcp:1700kB local_pcp:1292kB free_cma:0kB [ 377.651194][T18811] lowmem_reserve[]: 0 0 0 [ 377.660790][T18811] DMA32: 8*4kB (UM) 4*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 377.676830][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.676968][T18811] Normal: 624*4kB (UME) 482*8kB (UME) 466*16kB (UME) 450*32kB (UME) 117*64kB (UME) 36*128kB (UME) 6*256kB (ME) 4*512kB (ME) 5*1024kB (UME) 2*2048kB (UM) 786*4096kB (M) = 3272560kB [ 377.702753][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.712196][T15543] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.713924][T18811] 17742 total pagecache pages [ 377.719059][T15543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.731241][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.731427][T18811] 0 pages in swap cache [ 377.743054][T18811] Swap cache stats: add 0, delete 0, find 0/0 [ 377.748942][T18811] Free swap = 124996kB [ 377.753112][T18811] Total swap = 124996kB [ 377.757097][T18811] 2097051 pages RAM [ 377.760965][T18811] 0 pages HighMem/MovableOnly [ 377.765813][T18811] 341890 pages reserved [ 377.769932][T18811] 0 pages cma reserved [ 377.802998][T15544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 377.811007][T15544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.826262][T18775] device veth0_vlan entered promiscuous mode [ 377.835364][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 377.844231][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.852304][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.862202][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.887492][T18775] device veth1_macvtap entered promiscuous mode [ 377.899699][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.910178][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.918951][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.933111][T15542] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.941712][T15542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.031645][T18844] ¯Ê®¸}p: renamed from pim6reg1 [ 379.564426][T18923] syz-executor.1[18923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.564480][T18923] syz-executor.1[18923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.305778][T18988] ¯Ê®¸}p: renamed from pim6reg1 [ 381.930995][T19029] device syzkaller0 entered promiscuous mode [ 382.714913][T19048] device syzkaller0 entered promiscuous mode [ 383.617420][T19114] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 384.072157][T19123] EXT4-fs warning (device sda1): ext4_group_extend:1805: can't shrink FS - resize aborted [ 384.596343][T19155] device wlan0 entered promiscuous mode [ 385.411811][T19203] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.431091][T19203] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.438705][T19203] device bridge_slave_0 entered promiscuous mode [ 385.445698][T19203] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.452787][T19203] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.461096][T19203] device bridge_slave_1 entered promiscuous mode [ 385.512811][T19203] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.519686][T19203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.526785][T19203] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.533573][T19203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.556741][ T3510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.565154][ T3510] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.573573][ T3510] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.588615][ T3510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 385.596788][ T3510] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.603648][ T3510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.717658][ T3510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 385.725893][ T3510] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.732751][ T3510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.764779][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 385.773100][T15545] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 385.805415][ T3510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 385.833123][T19203] device veth0_vlan entered promiscuous mode [ 385.856023][T15544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.876706][T15544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.897556][T15544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.935677][T19203] device veth1_macvtap entered promiscuous mode [ 385.953275][T15543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 385.983017][T15542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 386.052966][T15542] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 386.317650][T19254] device vxcan1 entered promiscuous mode [ 386.640624][ T9] device bridge_slave_1 left promiscuous mode [ 386.653640][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.793980][ T9] device bridge_slave_0 left promiscuous mode [ 386.830197][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.867857][ T9] device veth0_vlan left promiscuous mode [ 388.112274][T19363] syz-executor.0[19363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.112323][T19363] syz-executor.0[19363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.046930][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 489.065248][ C0] (detected by 0, t=10003 jiffies, g=68397, q=507) [ 489.071657][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 10002 (4294986126-4294976124), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 489.084850][ C0] rcu: rcu_preempt kthread starved for 10003 jiffies! g68397 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 489.095865][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 489.105673][ C0] rcu: RCU grace-period kthread stack dump: [ 489.111404][ C0] task:rcu_preempt state:R running task stack: 0 pid: 13 ppid: 2 flags:0x00004000 [ 489.121989][ C0] Call Trace: [ 489.125130][ C0] __schedule+0xbe6/0x1330 [ 489.129374][ C0] ? release_firmware_map_entry+0x192/0x192 [ 489.135099][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 489.140395][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 489.145080][ C0] schedule+0x13d/0x1d0 [ 489.149074][ C0] schedule_timeout+0x18c/0x360 [ 489.153765][ C0] ? prepare_to_swait_event+0x39f/0x3e0 [ 489.159143][ C0] ? console_conditional_schedule+0x10/0x10 [ 489.164871][ C0] ? run_local_timers+0x160/0x160 [ 489.169734][ C0] rcu_gp_kthread+0xefc/0x23a0 [ 489.174334][ C0] ? dump_blkd_tasks+0x7e0/0x7e0 [ 489.179107][ C0] ? rcu_barrier_callback+0x50/0x50 [ 489.184137][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 489.188847][ C0] ? __kasan_check_read+0x11/0x20 [ 489.193693][ C0] ? __kthread_parkme+0xb9/0x1c0 [ 489.198469][ C0] kthread+0x34b/0x3d0 [ 489.202371][ C0] ? rcu_barrier_callback+0x50/0x50 [ 489.207405][ C0] ? kthread_blkcg+0xd0/0xd0 [ 489.211826][ C0] ret_from_fork+0x1f/0x30 [ 528.913958][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz-executor.4:19368] [ 528.922445][ C1] Modules linked in: [ 528.926176][ C1] CPU: 1 PID: 19368 Comm: syz-executor.4 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 528.937712][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 528.947618][ C1] RIP: 0010:kmem_cache_alloc+0x127/0x2e0 [ 528.953079][ C1] Code: a7 00 00 00 41 8b 44 24 28 48 8d 0c 07 49 8b 9c 24 d8 00 00 00 48 0f c9 48 33 1c 07 48 31 cb 48 89 d1 48 83 c1 08 4d 8b 04 24 <48> 89 f8 65 49 0f c7 08 0f 94 c0 a8 01 74 99 48 89 7d c8 0f 1f 44 [ 528.973127][ C1] RSP: 0018:ffffc90000170478 EFLAGS: 00000212 [ 528.979029][ C1] RAX: 0000000000000078 RBX: ffff88810df91c80 RCX: 00000000000c0b01 [ 528.986839][ C1] RDX: 00000000000c0af9 RSI: 00000000000000f8 RDI: ffff88810df91000 [ 528.994652][ C1] RBP: ffffc900001704c0 R08: 000000000005c5a0 R09: fffffbfff0da7f5b [ 529.002462][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888107d9c300 [ 529.010272][ C1] R13: ffffffff83bda960 R14: 0000000000000a20 R15: 0000000000000a20 [ 529.018087][ C1] FS: 00007f27c35936c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 529.026853][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 529.033276][ C1] CR2: 0000001b33425000 CR3: 0000000130419000 CR4: 00000000003506a0 [ 529.041088][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 529.048898][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 529.056704][ C1] Call Trace: [ 529.059830][ C1] [ 529.062536][ C1] ? show_regs+0x58/0x60 [ 529.066608][ C1] ? watchdog_timer_fn+0x471/0x590 [ 529.071553][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 529.076674][ C1] ? __hrtimer_run_queues+0x3d7/0xa50 [ 529.081883][ C1] ? hrtimer_interrupt+0x8b0/0x8b0 [ 529.086829][ C1] ? clockevents_program_event+0x21b/0x2c0 [ 529.092472][ C1] ? ktime_get_update_offsets_now+0x266/0x280 [ 529.098374][ C1] ? hrtimer_interrupt+0x39a/0x8b0 [ 529.103324][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 529.109225][ C1] ? sysvec_apic_timer_interrupt+0xba/0xe0 [ 529.114867][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 529.120866][ C1] ? __alloc_skb+0x80/0x510 [ 529.125198][ C1] ? kmem_cache_alloc+0x127/0x2e0 [ 529.130067][ C1] ? kmem_cache_alloc+0x3d/0x2e0 [ 529.134831][ C1] ? debug_smp_processor_id+0x17/0x20 [ 529.140044][ C1] ? __alloc_skb+0x80/0x510 [ 529.144379][ C1] __alloc_skb+0x80/0x510 [ 529.148544][ C1] ? __kasan_check_write+0x14/0x20 [ 529.153491][ C1] ? _raw_write_lock+0xa4/0x170 [ 529.158179][ C1] __neigh_notify+0x7d/0x120 [ 529.162602][ C1] neigh_cleanup_and_release+0x2c/0x1b0 [ 529.167984][ C1] neigh_remove_one+0x36b/0x3d0 [ 529.172672][ C1] ___neigh_create+0x484/0x1a10 [ 529.177360][ C1] __neigh_create+0x32/0x40 [ 529.181700][ C1] ip6_finish_output2+0x957/0x1850 [ 529.186647][ C1] ? __ip6_finish_output+0x780/0x780 [ 529.191763][ C1] ? cgroup_bpf_prog_query+0x1e0/0x1e0 [ 529.197060][ C1] __ip6_finish_output+0x5ec/0x780 [ 529.202007][ C1] ip6_finish_output+0x34/0x1e0 [ 529.206696][ C1] ip6_output+0x1f7/0x4d0 [ 529.210859][ C1] ? ac6_seq_show+0xf0/0xf0 [ 529.215198][ C1] ? ip6_output+0x4d0/0x4d0 [ 529.219538][ C1] ? nf_hook_slow+0xd1/0x200 [ 529.223966][ C1] ndisc_send_skb+0x6e9/0xc00 [ 529.228483][ C1] ? ndisc_alloc_skb+0x2d0/0x2d0 [ 529.233249][ C1] ? ndisc_error_report+0xc0/0xc0 [ 529.238113][ C1] ? __kmalloc_track_caller+0x184/0x320 [ 529.243492][ C1] ? __kasan_check_write+0x14/0x20 [ 529.248441][ C1] ? skb_set_owner_w+0x1fa/0x350 [ 529.253215][ C1] ? ndisc_send_rs+0x457/0x6a0 [ 529.257816][ C1] ndisc_send_rs+0x532/0x6a0 [ 529.262244][ C1] addrconf_rs_timer+0x2d1/0x600 [ 529.267017][ C1] ? addrconf_disable_policy_idev+0x350/0x350 [ 529.272916][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 529.277873][ C1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 529.283244][ C1] ? addrconf_disable_policy_idev+0x350/0x350 [ 529.289144][ C1] call_timer_fn+0x3b/0x2d0 [ 529.293488][ C1] ? addrconf_disable_policy_idev+0x350/0x350 [ 529.299389][ C1] __run_timers+0x72a/0xa10 [ 529.303730][ C1] ? calc_index+0x270/0x270 [ 529.308067][ C1] ? asm_sysvec_irq_work+0x12/0x20 [ 529.313030][ C1] run_timer_softirq+0x69/0xf0 [ 529.317618][ C1] __do_softirq+0x268/0x5bb [ 529.321961][ C1] asm_call_irq_on_stack+0xf/0x20 [ 529.326814][ C1] [ 529.329596][ C1] do_softirq_own_stack+0x60/0x80 [ 529.334461][ C1] __irq_exit_rcu+0x128/0x150 [ 529.338969][ C1] irq_exit_rcu+0x9/0x10 [ 529.343046][ C1] sysvec_apic_timer_interrupt+0xbf/0xe0 [ 529.348516][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 529.354331][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x36/0x60 [ 529.360316][ C1] Code: 10 c0 97 7e 65 8b 15 15 c0 97 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 dc 0a 00 00 00 74 2c 8b 91 b8 0a 00 00 <83> fa 02 75 21 48 8b 91 c0 0a 00 00 48 8b 32 48 8d 7e 01 8b 89 bc [ 529.379922][ C1] RSP: 0018:ffffc900013d6d20 EFLAGS: 00000246 [ 529.385817][ C1] RAX: ffffffff81a2717a RBX: ffff8881234f0e18 RCX: ffff888114a362c0 [ 529.393626][ C1] RDX: 0000000000000002 RSI: 0000000000000004 RDI: ffff88810e45d790 [ 529.401440][ C1] RBP: ffffc900013d6d20 R08: dffffc0000000000 R09: 0000000000000003 [ 529.409252][ C1] R10: fffff5200027ad94 R11: dffffc0000000001 R12: ffff88810e45d788 [ 529.417063][ C1] R13: ffff88810e45d780 R14: 0000000000000080 R15: ffff88810e45d7b8 [ 529.424893][ C1] ? __get_vm_area_node+0x2aa/0x470 [ 529.429916][ C1] __get_vm_area_node+0x2aa/0x470 [ 529.434772][ C1] __vmalloc_node_range+0xdc/0x7c0 [ 529.439724][ C1] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.444578][ C1] ? kvmalloc_node+0x82/0x130 [ 529.449091][ C1] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.453950][ C1] vmalloc+0x78/0x90 [ 529.457684][ C1] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.462547][ C1] bpf_prog_calc_tag+0xd7/0x8f0 [ 529.467230][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 529.473241][ C1] ? __bpf_prog_free+0xe0/0xe0 [ 529.477829][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 529.482853][ C1] ? sched_clock+0x3a/0x40 [ 529.487107][ C1] ? add_subprog+0x370/0x370 [ 529.491552][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 529.496223][ C1] ? sched_clock+0x3a/0x40 [ 529.500571][ C1] resolve_pseudo_ldimm64+0xd7/0x1020 [ 529.505888][ C1] ? add_subprog+0x370/0x370 [ 529.510291][ C1] ? sort+0x37/0x50 [ 529.513936][ C1] ? add_subprog+0x255/0x370 [ 529.518362][ C1] ? bpf_check+0xf2b0/0xf2b0 [ 529.522789][ C1] bpf_check+0xaf21/0xf2b0 [ 529.527039][ C1] ? perf_event_context_sched_in+0x48f/0x580 [ 529.532863][ C1] ? ctx_flexible_sched_in+0x100/0x100 [ 529.538148][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 529.543185][ C1] ? ctx_flexible_sched_in+0xa8/0x100 [ 529.548392][ C1] ? ctx_pinned_sched_in+0x100/0x100 [ 529.553512][ C1] ? bpf_get_btf_vmlinux+0x60/0x60 [ 529.558458][ C1] ? sched_clock+0x3a/0x40 [ 529.562799][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 529.567487][ C1] ? _raw_spin_lock+0xa4/0x1b0 [ 529.572085][ C1] ? _raw_spin_trylock_bh+0x190/0x190 [ 529.577293][ C1] ? ctx_sched_in+0x276/0x310 [ 529.581807][ C1] ? _raw_spin_unlock+0x4d/0x70 [ 529.586492][ C1] ? perf_event_context_sched_in+0x48f/0x580 [ 529.592309][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.597689][ C1] ? __perf_event_task_sched_in+0x219/0x2a0 [ 529.603419][ C1] ? perf_pmu_sched_task+0x190/0x190 [ 529.608563][ C1] ? native_set_ldt+0x360/0x360 [ 529.613226][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.618607][ C1] ? perf_sched_cb_inc+0x260/0x260 [ 529.623554][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 529.628589][ C1] ? finish_task_switch+0x130/0x5a0 [ 529.633622][ C1] ? switch_mm_irqs_off+0x71b/0x9a0 [ 529.638663][ C1] ? __switch_to_asm+0x34/0x60 [ 529.643259][ C1] ? __schedule+0xbee/0x1330 [ 529.647685][ C1] ? release_firmware_map_entry+0x192/0x192 [ 529.653412][ C1] ? _raw_write_unlock_irq+0x20/0x60 [ 529.658534][ C1] ? __kasan_check_read+0x11/0x20 [ 529.663389][ C1] ? preempt_schedule_irq+0xe7/0x140 [ 529.668514][ C1] ? preempt_schedule_notrace+0x140/0x140 [ 529.674071][ C1] ? __irq_exit_rcu+0x40/0x150 [ 529.678670][ C1] ? irqentry_exit+0x4f/0x60 [ 529.683093][ C1] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 529.688741][ C1] __se_sys_bpf+0x107a2/0x11cb0 [ 529.693430][ C1] ? __kasan_check_write+0x14/0x20 [ 529.698371][ C1] ? __x64_sys_bpf+0x90/0x90 [ 529.702797][ C1] ? futex_wake+0x630/0x790 [ 529.707247][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 529.712280][ C1] ? sched_clock_cpu+0x1b/0x3b0 [ 529.716973][ C1] ? do_futex+0x13c5/0x17b0 [ 529.721306][ C1] ? native_set_ldt+0x360/0x360 [ 529.725998][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 529.731378][ C1] ? perf_sched_cb_inc+0x260/0x260 [ 529.736322][ C1] ? _raw_spin_unlock_irq+0x4e/0x70 [ 529.741356][ C1] ? finish_task_switch+0x130/0x5a0 [ 529.746389][ C1] ? switch_mm_irqs_off+0x71b/0x9a0 [ 529.751423][ C1] ? __switch_to_asm+0x34/0x60 [ 529.756024][ C1] ? futex_exit_release+0x1e0/0x1e0 [ 529.761055][ C1] ? __schedule+0xbee/0x1330 [ 529.765485][ C1] ? release_firmware_map_entry+0x192/0x192 [ 529.771215][ C1] ? _raw_write_unlock_irq+0x20/0x60 [ 529.776335][ C1] ? __kasan_check_read+0x11/0x20 [ 529.781192][ C1] ? preempt_schedule_irq+0xe7/0x140 [ 529.786316][ C1] ? __se_sys_futex+0x355/0x470 [ 529.791003][ C1] ? fpu__clear_all+0x20/0x20 [ 529.795518][ C1] ? __kasan_check_read+0x11/0x20 [ 529.800374][ C1] __x64_sys_bpf+0x7b/0x90 [ 529.804628][ C1] do_syscall_64+0x34/0x70 [ 529.808886][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 529.814608][ C1] RIP: 0033:0x7f27c423a0a9 [ 529.818864][ C1] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 529.838301][ C1] RSP: 002b:00007f27c35930c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 529.846548][ C1] RAX: ffffffffffffffda RBX: 00007f27c4371050 RCX: 00007f27c423a0a9 [ 529.854420][ C1] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 529.862169][ C1] RBP: 00007f27c42a9074 R08: 0000000000000000 R09: 0000000000000000 [ 529.869987][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.877887][ C1] R13: 000000000000006e R14: 00007f27c4371050 R15: 00007ffff9796a58 [ 529.885709][ C1] Sending NMI from CPU 1 to CPUs 0: [ 529.891571][ C0] NMI backtrace for cpu 0 [ 529.891579][ C0] CPU: 0 PID: 19390 Comm: syz-executor.3 Tainted: G W 5.10.215-syzkaller-00370-gb58b8f9dad93 #0 [ 529.891585][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 529.891589][ C0] RIP: 0010:__pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891599][ C0] Code: 85 ba 01 00 00 c6 03 00 48 8b 44 24 28 42 0f b6 04 30 84 c0 0f 85 bf 01 00 00 48 8b 04 24 c6 00 01 bb 00 80 ff ff eb 06 f3 90 c3 74 50 43 0f b6 44 35 00 84 c0 75 32 41 80 3c 24 00 75 e9 4c [ 529.891603][ C0] RSP: 0018:ffffc900014bea20 EFLAGS: 00000206 [ 529.891611][ C0] RAX: 0000000000000004 RBX: 00000000ffffc597 RCX: 00000000870ba400 [ 529.891616][ C0] RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffc900014be9a0 [ 529.891621][ C0] RBP: ffffc900014beb10 R08: dffffc0000000000 R09: 0000000000000000 [ 529.891631][ C0] R10: fffffbfff0e17490 R11: dffffc0000000001 R12: ffffffff870ba480 [ 529.891636][ C0] R13: 1ffffffff0e17490 R14: dffffc0000000000 R15: ffff88823ff52e40 [ 529.891641][ C0] FS: 00007ffb6665f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 529.891645][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 529.891650][ C0] CR2: 0000000020003ff6 CR3: 000000010efc7000 CR4: 00000000003506b0 [ 529.891655][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 529.891660][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 529.891662][ C0] Call Trace: [ 529.891665][ C0] [ 529.891668][ C0] ? show_regs+0x58/0x60 [ 529.891671][ C0] ? nmi_cpu_backtrace+0x133/0x160 [ 529.891676][ C0] ? __pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891679][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 529.891683][ C0] ? nmi_handle+0xa8/0x280 [ 529.891686][ C0] ? __pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891690][ C0] ? default_do_nmi+0x69/0x160 [ 529.891693][ C0] ? exc_nmi+0xad/0x100 [ 529.891696][ C0] ? end_repeat_nmi+0x16/0x31 [ 529.891700][ C0] ? __pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891704][ C0] ? __pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891708][ C0] ? __pv_queued_spin_lock_slowpath+0x5a1/0xc70 [ 529.891711][ C0] [ 529.891714][ C0] ? __pv_queued_spin_unlock_slowpath+0x280/0x280 [ 529.891718][ C0] _raw_spin_lock+0x139/0x1b0 [ 529.891722][ C0] ? _raw_spin_trylock_bh+0x190/0x190 [ 529.891725][ C0] ? alloc_vmap_area+0x16f/0x1a90 [ 529.891728][ C0] alloc_vmap_area+0x1899/0x1a90 [ 529.891731][ C0] ? vm_map_ram+0x9d0/0x9d0 [ 529.891733][ C0] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 529.891736][ C0] ? __get_vm_area_node+0x116/0x470 [ 529.891739][ C0] __get_vm_area_node+0x156/0x470 [ 529.891742][ C0] __vmalloc_node_range+0xdc/0x7c0 [ 529.891745][ C0] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.891747][ C0] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.891750][ C0] vmalloc+0x78/0x90 [ 529.891753][ C0] ? bpf_prog_calc_tag+0xd7/0x8f0 [ 529.891755][ C0] bpf_prog_calc_tag+0xd7/0x8f0 [ 529.891758][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 529.891761][ C0] ? sched_clock_cpu+0x1b/0x3b0 [ 529.891764][ C0] ? __bpf_prog_free+0xe0/0xe0 [ 529.891766][ C0] ? __irq_exit_rcu+0x40/0x150 [ 529.891769][ C0] ? add_subprog+0x370/0x370 [ 529.891771][ C0] ? irq_exit_rcu+0x9/0x10 [ 529.891775][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 529.891777][ C0] resolve_pseudo_ldimm64+0xd7/0x1020 [ 529.891780][ C0] ? add_subprog+0x370/0x370 [ 529.891782][ C0] ? sort+0x37/0x50 [ 529.891785][ C0] ? add_subprog+0x255/0x370 [ 529.891788][ C0] ? bpf_check+0xf2b0/0xf2b0 [ 529.891790][ C0] ? kvmalloc_node+0x82/0x130 [ 529.891793][ C0] bpf_check+0xaf21/0xf2b0 [ 529.891796][ C0] ? stack_depot_save+0xe/0x10 [ 529.891798][ C0] ? __se_sys_bpf+0x9856/0x11cb0 [ 529.891801][ C0] ? sched_clock+0x3a/0x40 [ 529.891803][ C0] ? 0xffffffffa002e000 [ 529.891806][ C0] ? bpf_get_btf_vmlinux+0x60/0x60 [ 529.891809][ C0] ? __kernel_text_address+0x9b/0x110 [ 529.891813][ C0] ? unwind_get_return_address+0x4d/0x90 [ 529.891815][ C0] ? arch_stack_walk+0xf3/0x140 [ 529.891818][ C0] ? stack_trace_save+0x113/0x1c0 [ 529.891821][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 529.891824][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 529.891826][ C0] ? selinux_bpf_prog_alloc+0x51/0x140 [ 529.891829][ C0] ? kvm_sched_clock_read+0x18/0x40 [ 529.891831][ C0] ? sched_clock+0x3a/0x40 [ 529.891834][ C0] ? sched_clock_cpu+0x1b/0x3b0 [ 529.891836][ C0] ? sched_clock+0x3a/0x40 [ 529.891839][ C0] ? __irq_exit_rcu+0x40/0x150 [ 529.891841][ C0] ? irq_exit_rcu+0x9/0x10 [ 529.891844][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 529.891848][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 529.891850][ C0] ? __check_object_size+0x73/0x3c0 [ 529.891853][ C0] ? __virt_addr_valid+0x98/0x2d0 [ 529.891856][ C0] ? __virt_addr_valid+0xa2/0x2d0 [ 529.891859][ C0] __se_sys_bpf+0x107a2/0x11cb0 [ 529.891861][ C0] ? __kasan_check_write+0x14/0x20 [ 529.891864][ C0] ? __x64_sys_bpf+0x90/0x90 [ 529.891866][ C0] ? futex_wake+0x630/0x790 [ 529.891870][ C0] ? __sanitizer_cov_trace_switch+0x7f/0xe0 [ 529.891872][ C0] ? do_futex+0x13c5/0x17b0 [ 529.891875][ C0] ? perf_event_alloc+0xff2/0x1970 [ 529.891878][ C0] ? kfree+0xc3/0x270 [ 529.891881][ C0] ? __kasan_check_write+0x14/0x20 [ 529.891884][ C0] ? _raw_spin_lock+0xa4/0x1b0 [ 529.891886][ C0] ? _raw_spin_trylock_bh+0x190/0x190 [ 529.891889][ C0] ? perf_event_alloc+0xff2/0x1970 [ 529.891892][ C0] ? futex_exit_release+0x1e0/0x1e0 [ 529.891894][ C0] ? _raw_spin_unlock+0x4d/0x70 [ 529.891897][ C0] ? put_unused_fd+0x16c/0x1b0 [ 529.891900][ C0] ? __se_sys_perf_event_open+0x264d/0x3c30 [ 529.891903][ C0] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 529.891905][ C0] ? __se_sys_futex+0x355/0x470 [ 529.891908][ C0] ? fpu__clear_all+0x20/0x20 [ 529.891910][ C0] ? __kasan_check_read+0x11/0x20 [ 529.891913][ C0] __x64_sys_bpf+0x7b/0x90 [ 529.891915][ C0] do_syscall_64+0x34/0x70 [ 529.891918][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 529.891921][ C0] RIP: 0033:0x7ffb672e50a9 [ 529.891929][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 529.891932][ C0] RSP: 002b:00007ffb6665f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 529.891938][ C0] RAX: ffffffffffffffda RBX: 00007ffb6741bf80 RCX: 00007ffb672e50a9 [ 529.891942][ C0] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 529.891946][ C0] RBP: 00007ffb67354074 R08: 0000000000000000 R09: 0000000000000000 [ 529.891949][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.891953][ C0] R13: 000000000000000b R14: 00007ffb6741bf80 R15: 00007fffa5405d88 2024/06/22 05:51:08 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF