last executing test programs: 31.608890126s ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x118) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) syz_open_procfs$namespace(0x0, 0x0) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000540)) 31.381527071s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x80, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000003c0)='jbd2_handle_stats\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x7, &(0x7f0000000080)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r3}, 0x10) (async) unlink(&(0x7f0000000000)='./cgroup\x00') (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r2, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x9e, '\x00', r5, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c}, 0x48) 31.278134657s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000380000009500000000000000a52ffa7a2738d25241e27f772adfab406e682d5c56eb69b20286527eb944ff52ffad697d04081bd06d461e922b8b0c454b645b1dac0a09c4bfd6761b83159158145381b097e5a105d910f3adab6357686724791ace507a8b952cf14f595d52d85fc19738c5de632755c2ca8c1a9784078413a4616a1134c801c77561a6e944ad7f315f9885e6da2469d185f97fed0f06ebd0bf"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000800)='syzkaller\x00') gettid() perf_event_open(&(0x7f0000000440)={0x7, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2081, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x84, 0x7}, 0x22d, 0x5, 0x0, 0x7, 0x4, 0x1, 0x9, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x4004, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000200), 0x5}, 0x20, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb01001800000000000000010000108e0948dc826ce8ade53cd90d0000000000d29bc132000000010000000000000c0100000000616100"], &(0x7f0000000940)=""/222, 0x3c, 0xde, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffffff, 0x58, &(0x7f0000000c00)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000cc0)={r5, 0x6, 0x10}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, &(0x7f0000000ec0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x102b, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 31.19398335s ago: executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) close(r0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x20, 0xff, 0x5, 0x0, 0x8, 0x40500, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xff, 0x3, @perf_config_ext={0x2, 0x40}, 0x1, 0x8000000000000001, 0x5, 0x2, 0x0, 0x5, 0x0, 0x0, 0x9f5, 0x0, 0x8000000000000000}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000080), &(0x7f00000001c0)=r5}, 0x20) 31.142717797s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 31.107507513s ago: executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@typedef={0x9, 0x0, 0x0, 0x8, 0x2}, @var={0x9, 0x0, 0x0, 0xe, 0x5, 0x1}]}, {0x0, [0x2e, 0x5f, 0x30]}}, &(0x7f00000022c0)=""/4096, 0x39, 0x1000, 0x0, 0x4}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'veth0\x00', 0x800}) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000100)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000180)=r1) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 31.055117902s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000beff7db30000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) (async) close(r2) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) close(r1) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xe1c42, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) write$cgroup_subtree(r7, 0x0, 0xfdef) 30.923670611s ago: executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x3, 0x8000, 0x1f, 0x8ad5add7d2fe0132, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x100004}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_blocks\x00', r5}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680)=0xffffffffffffffff, 0x4) 30.898721935s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000005c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000000)=0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xf, 0x1c, &(0x7f0000000480)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x70000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9}, {0x6, 0x0, 0x7, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x6, 0x0, 0xa, 0x9}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 30.889373967s ago: executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031000fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 30.863703331s ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0xf00000000000000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 30.851949053s ago: executing program 3: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000828dec9c8500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa3230b0"], 0xfdef) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000180), 0x12) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730107000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_type(r7, &(0x7f0000000240), 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x3a, 0x42, 0x0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880bd320d98a61a90021", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0xbb7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000200)=ANY=[], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6}, 0x0, 0x0}, 0x20) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r12) 30.829136276s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480), 0x4) (async, rerun: 64) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x401, 0x8}, 0xc) (async, rerun: 64) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x9}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r3}, &(0x7f00000005c0), &(0x7f0000000600)='%ps \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f0000000240), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x15, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x0, 0x8, 0xb, 0x7, 0x0, 0x10}, @jmp={0x5, 0x0, 0xd, 0x8, 0x4, 0xffffffffffffffc0, 0x4}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ldst={0x3, 0x3, 0x1, 0x5, 0x1, 0x18, 0xfffffffffffffffc}, @cb_func={0x18, 0xf8e1160a27174c71, 0x4, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0x0, 0x5c6}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x7}, @exit]}, &(0x7f0000000380)='GPL\x00', 0xc68, 0x9d, &(0x7f00000003c0)=""/157, 0x41100, 0x4, '\x00', 0x0, 0x3, r1, 0x8, &(0x7f0000000580)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0x3, 0xfffffffc, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r0, r0, r2, r0, r3, r0], 0x0, 0x10, 0x1797720c}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {0x85, 0x0, 0x0, 0x31}, {0x4}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x154b, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x7fff}, [@alu={0x4, 0x1, 0x8, 0x6, 0xb, 0x10, 0xfffffffffffffff0}, @generic={0x1f, 0x6, 0x6, 0x80, 0x7fffffff}]}, &(0x7f0000000140)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x61, '\x00', r7, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x6, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000340)=[r8, r9, 0x1]}, 0x90) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00), &(0x7f0000000cc0), 0x0, 0x27, &(0x7f0000000680)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x92, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) (async, rerun: 64) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r11, &(0x7f0000000200), 0x43451) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000008c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x48) (async) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0x0, 0x9, 0x18}, 0xc) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x2}, 0xc) (async) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x16, 0x1b, &(0x7f0000000300)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x626e}, @jmp={0x5, 0x1, 0xd, 0x2, 0x6, 0x8, 0x8}, @generic={0x7, 0xb, 0x7, 0x2, 0x40}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x9, 0xd, 0x1, 0x400, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @call={0x85, 0x0, 0x0, 0x90}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}], &(0x7f0000000200)='GPL\x00', 0x3ff, 0x95, &(0x7f0000000400)=""/149, 0x41100, 0x4a, '\x00', r7, 0x35, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0xd, 0x1ff, 0x4c8}, 0x10, r10, 0xffffffffffffffff, 0x4, &(0x7f0000000a40)=[r11, r12, r13, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, r14, r15, r16], &(0x7f0000000a80)=[{0x5, 0x4, 0x6, 0x3}, {0x0, 0x2, 0xa, 0x9}, {0x1, 0x5, 0x9, 0x4}, {0x4, 0x1, 0x2, 0x8}], 0x10, 0x7a}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x1, &(0x7f0000000740)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000780)='syzkaller\x00', 0x10001, 0x34, &(0x7f00000007c0)=""/52, 0x47e2cc53bfa5d562, 0x4, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x5}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x1, 0x8, 0xcf}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000900)=[r0], &(0x7f0000000940)=[{0x4, 0x4, 0xc, 0x6}, {0x2, 0x5, 0xe, 0x8}, {0x3, 0x2, 0x4, 0x4}, {0x4, 0x1, 0xb, 0x9}, {0x3, 0x3, 0x3, 0x1}, {0x5, 0xfffffffd, 0xd, 0x3}], 0x10, 0x200}, 0x90) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) (async, rerun: 64) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000000)="261a96ebea60dc974ebbfd75f5bd9530efdccaaf8efa3d291eacf313180d9f7266728aa2abbcc852a980dc43de34019fb92db995fa688bff0d4fef84cc56d47e86c65183c87c2c9cc9803759"}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) 30.817103808s ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0x19, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 30.80057556s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r3, &(0x7f0000000200)=0x6, 0x12) 30.74346816s ago: executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f854ffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_mballoc_prealloc\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x9) 30.730959812s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x17, 0x0, 0x8400, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r2, 0x0, 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair(0x19, 0x6, 0xd75, &(0x7f0000000e40)={0xffffffffffffffff}) sendmsg(r6, &(0x7f0000001040)={&(0x7f0000000e80)=@l2tp6={0xa, 0x0, 0xe98, @loopback, 0x8, 0x2}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000f00)="8c9114811b1a4237cc611ba6aa7ea74a1901771bacee156af0cdd99d5e34a1fbdeef479fcea7781a65aee38d5621a7ce05ffcad86b98276759d3870b1e7c06419c8d6bcb04763cfa37ab51e32787f5c52c2cdf2feb8f25f7d2b7414e", 0x5c}, {&(0x7f0000000f80)="9c5f3b0b216a60aade53844d2b4871a85f0103b87d46d75549ba1e4713a4ffcccd0b27b7370f608490c60ceea235598922b6b8d665ca174e02c51af5907ea5b149de168e468160935a19", 0x4a}], 0x2}, 0x800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r4, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f00000008c0)=[0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0], 0x0, 0xec, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x5, 0x11, &(0x7f0000001100)=ANY=[@ANYBLOB="1800000001000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7000083000000bf090000000000005509010000000000950000000000000018220000000000000000000000000000000000001254a394873f4d51b9a829e364f77930cc4ef6fa70dfc76eb3f2ddc53f6f334af043abf55c7f134f81", @ANYRES32=r5, @ANYBLOB="000000004dc90000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0x401, 0x15, &(0x7f0000000840)=""/21, 0x40f00, 0x4, '\x00', r7, 0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000cc0)={0x2, 0x4, 0x80}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000d00)=[r0, r3, r5, r2, r0, r0], &(0x7f0000000d40)=[{0x5, 0x2, 0x10}, {0x3, 0x5, 0xf, 0x6}, {0x4, 0x4, 0x3, 0x6}], 0x10, 0x3f}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b0000000000000001"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2d}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x9, 0x0, r3, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200)=0x10000000000000, 0x12) write$cgroup_int(r10, &(0x7f0000000240), 0x1001) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, r9, 0x2, '\x00', 0x0, r10, 0x3, 0x3, 0x4}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x13, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7020000000000008500000017000000bf91000000000073b7020000000000008500090000000000b70000000000000095000000000000004126b163625f711c24fa78b298e6b7f316"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f00000005c0)='./file0\x00', 0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='ext4_mark_inode_dirty\x00', r4}, 0x10) 30.678198179s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x498, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x513dd04df041b218}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x8000000000000000, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000200), &(0x7f0000000280)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00'}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000000)) socketpair(0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000005000000030000000000000800000000000000000000000203000000000000000000000d020000000000002e"], 0x0, 0x41}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r4, r5, 0x0, 0x0, 0x0, @prog_id}, 0x20) 30.665501661s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x8, &(0x7f00000005c0)=ANY=[@ANYBLOB="180800000000000000000000000000008510000003000000180000000000000000000000000000009500000000000000ddaa000000"], 0x0}, 0x90) bpf$PROG_LOAD(0xd, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 30.639590746s ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'wlan1\x00', @random="0f9626e0fc89"}) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, r0}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f0000000300)=""/254, 0xfe, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000001b40)='workqueue_queue_work\x00', r2}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40049409, &(0x7f0000000080)) 30.627996067s ago: executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8912, &(0x7f0000000040)={'bridge_slave_0\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc028660f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x0, 0x3, &(0x7f0000000580)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) 30.515583565s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000007000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f0000000380)=r3}, 0x20) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) (async, rerun: 64) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r7, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r8}, 0x10) (async) unlink(&(0x7f0000000140)='./cgroup\x00') 30.443321386s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000605222327b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x1, 0x8008, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_da_write_pages_extent\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='ext4_da_write_pages_extent\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000700), 0x12) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 30.398190073s ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6tnl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r3}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x38}}]}, &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[], 0xfdef) 30.011119312s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xe, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x5, '\x00', r2, r0, 0x1, 0x5, 0x3}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) write$cgroup_type(r3, &(0x7f00000006c0), 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f0000000040)=0x3e) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x1, 0x2, 0x1, 0x5, 0x1031c5d76c8a16c5, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x6f}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @generic={0xc3, 0xe, 0x7, 0x2, 0x81}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x80000000, 0x8f, &(0x7f00000000c0)=""/143, 0x40f00, 0x82, '\x00', r2, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0xe, 0x8, 0xfff}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000500)=[r4, r5], &(0x7f0000000540)=[{0x2, 0x2, 0xa, 0xa}, {0x4, 0x3, 0x3, 0x4}, {0x0, 0x4, 0x10, 0x5}], 0x10, 0x7ff}, 0x90) 658.507948ms ago: executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000605222327b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)=r1}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'macvlan0\x00', 0x2}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x7fff, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r5, 0x40086607, 0x20001419) ioctl$TUNSETVNETHDRSZ(r2, 0x8927, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1a, 0xa, 0xfffffffb, &(0x7f0000000040)) write$cgroup_type(r9, &(0x7f0000000000), 0x248800) 505.685592ms ago: executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c27", 0x39}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb791977c45604d412c586dd630080fc00082c00db5b6861589bcfe8875a060310000023000000000000000000000000ac1414aa"], 0xfdef) 432.698883ms ago: executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x1c, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f854ffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='ext4_mballoc_prealloc\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='ext4_mballoc_prealloc\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x9) 378.476341ms ago: executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) write$cgroup_pressure(r2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x2af, 0x400, 0x1624, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='jbd2_update_log_tail\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40086607, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x4000041) close(0xffffffffffffffff) 0s ago: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000002700)=ANY=[@ANYBLOB="18000000000000000000000000000000181100001026c47b4abb8babc67d40134d3680aee36061e944cc5eaf60173bfd18896c503e0ac8948267ba26c27cf8e9dffd97b2a8002dee53016bf5b1b0e26bc1361405b48781460bd8638f13cd6fb11a7c45dffb0b8f38a11836db4b2a8ab9dd549cbf485a52c968fbd4d7bd49dc6492a3d1a2d3f900dd6f4224f7c91f1595d7de66457cb95b7c5ebdc87e122c50e49216c44c871500f460581de4a558ca7f18e8fb591eefd20837861e04ce6e97d1aecb90464ebcce11e6b9737a08f0ad2fb1981f745e124a881a25c8135b44a13a4c89e1774f1a0dd9c118", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000001180)='erofs_fill_inode\x00', r1}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fc0)}}, 0x0, 0xfffffdffffffffff, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0x1b, 0xd, &(0x7f0000001080)=ANY=[@ANYBLOB="18000000010000000000000008000000950000000000000018", @ANYRES32=r3, @ANYBLOB="00000000000000003484400000000000290089d3e1cf0200fcffffff185900000f00000000000000000000008082000801000000186700000100000000d100000000000095000000"], &(0x7f0000001100)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, 0x2b, r0, 0x8, &(0x7f0000001540)={0xfff, 0x3}, 0x8, 0x10, &(0x7f00000026c0)={0x0, 0x10, 0x53, 0x70000}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000002900)=[r3], &(0x7f0000002940)=[{0x0, 0x3, 0xb, 0xa}, {0x0, 0x2, 0xc, 0x9}, {0x5, 0x2, 0xa, 0xc}, {0x5, 0x2, 0x1, 0x4}, {0x5, 0x0, 0x1, 0x8}, {0x0, 0x2, 0x2, 0xa}], 0x10, 0x1}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x7, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe4c, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000000006c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000b49b008500000006000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x81, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='jbd2_handle_stats\x00', r8}, 0x10) unlink(&(0x7f0000000080)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0xe8b, 0x80000000, 0xb, 0x801, r4, 0x5, '\x00', 0x0, r5, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r9}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @remote}}}], 0x20}, 0x0) recvmsg$unix(r11, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) kernel console output (not intermixed with test programs): 1][ T1446] vfs_write+0xb55/0xe70 [ 1350.977224][ T1446] ? kernel_write+0x3d0/0x3d0 [ 1350.981736][ T1446] ? mutex_trylock+0xa0/0xa0 [ 1350.986162][ T1446] ? __fdget_pos+0x2e7/0x3a0 [ 1350.990591][ T1446] ? ksys_write+0x77/0x2c0 [ 1350.994839][ T1446] ksys_write+0x199/0x2c0 [ 1350.999010][ T1446] ? __ia32_sys_read+0x90/0x90 [ 1351.003606][ T1446] ? debug_smp_processor_id+0x17/0x20 [ 1351.008816][ T1446] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1351.014713][ T1446] ? debug_smp_processor_id+0x17/0x20 [ 1351.019935][ T1446] __x64_sys_write+0x7b/0x90 [ 1351.024521][ T1446] do_syscall_64+0x34/0x70 [ 1351.028771][ T1446] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1351.034495][ T1446] RIP: 0033:0x7fba59b8cf69 [ 1351.038757][ T1446] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1351.058193][ T1446] RSP: 002b:00007fba58f070c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1351.066525][ T1446] RAX: ffffffffffffffda RBX: 00007fba59cc3f80 RCX: 00007fba59b8cf69 [ 1351.074339][ T1446] RDX: 0000000000000007 RSI: 0000000020000240 RDI: 0000000000000007 [ 1351.082153][ T1446] RBP: 00007fba58f07120 R08: 0000000000000000 R09: 0000000000000000 [ 1351.089956][ T1446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1351.097773][ T1446] R13: 000000000000000b R14: 00007fba59cc3f80 R15: 00007ffc99153118 [ 1352.725744][ T1494] device pim6reg1 entered promiscuous mode [ 1353.964877][ T1539] EXT4-fs warning (device sda1): verify_group_input:176: Cannot read last block (524287) [ 1354.184024][ T1550] device pim6reg1 entered promiscuous mode [ 1354.401640][ T1570] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1354.515659][ T1575] device syzkaller0 entered promiscuous mode [ 1354.880009][ T1600] device pim6reg1 entered promiscuous mode [ 1355.388048][ T1631] device pim6reg1 entered promiscuous mode [ 1355.619836][ T1675] gretap0: refused to change device tx_queue_len [ 1355.726789][ T1684] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1355.877623][ T1710] device veth1_macvtap left promiscuous mode [ 1355.906780][ T1710] device veth1_macvtap entered promiscuous mode [ 1355.924163][ T1710] device macsec0 entered promiscuous mode [ 1356.722815][ T1756] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 1357.619263][ T1817] device pim6reg1 entered promiscuous mode [ 1357.847668][ T1842] syz-executor.4[1842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1357.847719][ T1842] syz-executor.4[1842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.258057][ T1874] syz-executor.0[1874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.270578][ T1874] syz-executor.0[1874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.286545][ T1874] syz-executor.0[1874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.311173][ T1874] syz-executor.0[1874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1358.407622][ T1881] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1358.604801][ T1924] device pim6reg1 entered promiscuous mode [ 1358.653169][ T1935] device syzkaller0 entered promiscuous mode [ 1358.774412][ T1956] device wlan0 entered promiscuous mode [ 1358.850380][ T1965] device syzkaller0 entered promiscuous mode [ 1360.144470][ T2064] device pim6reg1 entered promiscuous mode [ 1360.639651][ T2097] device vxcan1 entered promiscuous mode [ 1363.612819][ T2253] device syzkaller0 entered promiscuous mode [ 1363.987153][ T2275] device vxcan1 entered promiscuous mode [ 1364.318677][ T2292] device pim6reg1 entered promiscuous mode [ 1366.240231][ T2350] device syzkaller0 entered promiscuous mode [ 1366.329986][ T2365] device syzkaller0 entered promiscuous mode [ 1367.519439][ T2418] device pim6reg1 entered promiscuous mode [ 1367.671109][ T2412] device syzkaller0 entered promiscuous mode [ 1368.553149][ T2453] device pim6reg1 entered promiscuous mode [ 1368.836204][ T2486] syz-executor.1[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1368.836263][ T2486] syz-executor.1[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1369.764083][ T2465] device syzkaller0 entered promiscuous mode [ 1369.801293][ T2501] device syzkaller0 entered promiscuous mode [ 1369.816593][ T2508] device pim6reg1 entered promiscuous mode [ 1369.939622][ T2530] device pim6reg1 entered promiscuous mode [ 1370.103384][ T2546] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.110707][ T2546] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.118269][ T2546] device bridge_slave_0 entered promiscuous mode [ 1370.125264][ T2546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.132953][ T2546] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.141182][ T2546] device bridge_slave_1 entered promiscuous mode [ 1370.386502][ T2567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.393498][ T2567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.412969][ T2546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.419842][ T2546] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.426951][ T2546] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.433794][ T2546] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.463400][T10749] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1370.471589][T10749] bridge0: port 1(bridge_slave_0) entered disabled state [ 1370.479018][T10749] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.496534][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1370.504757][T18168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.511617][T18168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.519854][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1370.527859][T18168] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.534720][T18168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.561378][ T2579] device pim6reg1 entered promiscuous mode [ 1370.588924][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1370.597778][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1370.648338][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1370.688036][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1370.695998][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1370.746758][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1370.754162][ T2546] device veth0_vlan entered promiscuous mode [ 1370.775896][ T2546] device veth1_macvtap entered promiscuous mode [ 1370.821101][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1370.841117][T12673] device bridge_slave_1 left promiscuous mode [ 1370.874915][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1370.896848][T12673] device bridge_slave_0 left promiscuous mode [ 1370.906500][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1371.323729][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1371.332557][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1371.495788][ T2628] device pim6reg1 entered promiscuous mode [ 1371.535841][ T2633] device pim6reg1 entered promiscuous mode [ 1371.733105][ T2641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1371.762558][ T2641] bridge0: port 1(bridge_slave_0) entered disabled state [ 1371.770090][ T2641] device bridge_slave_0 entered promiscuous mode [ 1371.784167][ T2641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1371.793716][ T2641] bridge0: port 2(bridge_slave_1) entered disabled state [ 1371.804250][ T2641] device bridge_slave_1 entered promiscuous mode [ 1372.031260][ T2641] bridge0: port 2(bridge_slave_1) entered blocking state [ 1372.038252][ T2641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1372.045387][ T2641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1372.052183][ T2641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1372.080098][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1372.088781][T18168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1372.096101][T18168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1372.123188][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1372.132353][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1372.139315][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1372.157539][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1372.165555][ T6691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1372.172406][ T6691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1372.179618][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1372.188270][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1372.206178][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1372.216466][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1372.224307][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1372.232633][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1372.246795][ T2641] device veth0_vlan entered promiscuous mode [ 1372.260162][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1372.276989][ T2641] device veth1_macvtap entered promiscuous mode [ 1372.290268][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1372.305035][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1372.635748][ T2712] device pim6reg1 entered promiscuous mode [ 1372.748419][T12673] device bridge_slave_1 left promiscuous mode [ 1372.755542][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1372.789429][T12673] device bridge_slave_0 left promiscuous mode [ 1372.813685][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1372.843458][T12673] device veth1_macvtap left promiscuous mode [ 1372.859289][T12673] device veth0_vlan left promiscuous mode [ 1373.095573][ T2739] device syzkaller0 entered promiscuous mode [ 1374.936096][ T2817] device syzkaller0 entered promiscuous mode [ 1374.993982][ T2821] syz-executor.2[2821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1374.994046][ T2821] syz-executor.2[2821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1375.627085][ T2844] device veth0_vlan left promiscuous mode [ 1375.730066][ T2844] device veth0_vlan entered promiscuous mode [ 1375.798674][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1375.814314][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1375.866741][ T6691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1376.128427][ T2865] device pim6reg1 entered promiscuous mode [ 1376.177480][ T2868] device pim6reg1 entered promiscuous mode [ 1376.197288][ T2874] syz-executor.3[2874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1376.197343][ T2874] syz-executor.3[2874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1377.313650][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1377.412533][ T2929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.419971][ T2929] device bridge_slave_0 entered promiscuous mode [ 1377.433267][ T2929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1377.440196][ T2929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1377.454826][ T2929] device bridge_slave_1 entered promiscuous mode [ 1377.524941][ T2929] bridge0: port 2(bridge_slave_1) entered blocking state [ 1377.531918][ T2929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1377.539019][ T2929] bridge0: port 1(bridge_slave_0) entered blocking state [ 1377.545876][ T2929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1377.596530][ T674] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.605924][ T674] bridge0: port 2(bridge_slave_1) entered disabled state [ 1377.672083][ T2953] device syzkaller0 entered promiscuous mode [ 1377.729563][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1377.738405][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1377.748431][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1377.757221][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1377.765549][ T837] bridge0: port 1(bridge_slave_0) entered blocking state [ 1377.772428][ T837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1377.780246][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1377.789056][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1377.797368][ T837] bridge0: port 2(bridge_slave_1) entered blocking state [ 1377.804230][ T837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1377.839567][ T2952] device pim6reg1 entered promiscuous mode [ 1377.856996][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1377.864911][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1377.873199][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1377.881491][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1377.891505][T12673] device bridge_slave_1 left promiscuous mode [ 1377.897509][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1377.904870][T12673] device bridge_slave_0 left promiscuous mode [ 1377.911038][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1377.919096][T12673] device veth1_macvtap left promiscuous mode [ 1377.924959][T12673] device veth0_vlan left promiscuous mode [ 1378.058807][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1378.067411][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1378.083386][ T2929] device veth0_vlan entered promiscuous mode [ 1378.091190][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1378.099580][ T674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1378.115932][ T2929] device veth1_macvtap entered promiscuous mode [ 1378.127423][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1378.137783][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1378.150939][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1378.161907][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1378.170560][ T847] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1378.187480][ T2964] syz-executor.2[2964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1378.187540][ T2964] syz-executor.2[2964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1378.201647][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1378.221971][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1378.230308][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1378.238960][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1378.422609][ T2986] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1378.854603][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 1378.861652][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 1379.207799][ T3020] device vxcan1 entered promiscuous mode [ 1379.805392][ T3057] device vxcan1 entered promiscuous mode [ 1380.127301][ T3083] syz-executor.2[3083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.127350][ T3083] syz-executor.2[3083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.165542][ T3083] syz-executor.2[3083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.177835][ T3083] syz-executor.2[3083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.305077][ T3095] syz-executor.2[3095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.316979][ T3095] syz-executor.2[3095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1380.417176][ T3110] device wg2 entered promiscuous mode [ 1380.805541][ T3124] device pim6reg1 entered promiscuous mode [ 1381.002923][ T3140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1381.009954][ T3140] bridge0: port 1(bridge_slave_0) entered disabled state [ 1381.141804][ T3143] device pim6reg1 entered promiscuous mode [ 1381.441809][ T3188] syz-executor.3[3188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1381.441864][ T3188] syz-executor.3[3188] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1381.442531][ T3187] syz-executor.3[3187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1381.465413][ T3187] syz-executor.3[3187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1381.535451][ T3194] device veth1_macvtap left promiscuous mode [ 1381.632689][ T3199] device pim6reg1 entered promiscuous mode [ 1381.735072][ T3212] device dummy0 entered promiscuous mode [ 1382.124814][ T3227] device pim6reg1 entered promiscuous mode [ 1382.881288][ T3261] device pim6reg1 entered promiscuous mode [ 1383.281191][ T3291] device pim6reg1 entered promiscuous mode [ 1384.962742][ T3383] device syzkaller0 entered promiscuous mode [ 1385.369239][ T3398] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1387.268868][ T3558] device pim6reg1 entered promiscuous mode [ 1387.682621][ T3591] device syzkaller0 entered promiscuous mode [ 1390.077539][ T3728] bpf_get_probe_write_proto: 167 callbacks suppressed [ 1390.077549][ T3728] syz-executor.0[3728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1390.091875][ T3728] syz-executor.0[3728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1390.139035][ T3734] geneve1: tun_chr_ioctl cmd 1074025681 [ 1390.481336][ T3750] device syzkaller0 entered promiscuous mode [ 1391.595123][ T3845] syz-executor.4[3845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1391.599611][ T3845] syz-executor.4[3845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1392.490604][ T3908] device syzkaller0 entered promiscuous mode [ 1393.712761][ T3969] device pim6reg1 entered promiscuous mode [ 1394.348443][ T4027] syz-executor.1[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1394.348503][ T4027] syz-executor.1[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1394.437103][ T4027] syz-executor.1[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1394.448736][ T4027] syz-executor.1[4027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1395.319520][ T4048] device syzkaller0 entered promiscuous mode [ 1395.409476][ T4060] syz-executor.2[4060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1395.409539][ T4060] syz-executor.2[4060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1395.499152][ T4069] device vxcan1 entered promiscuous mode [ 1396.589259][ T4156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.596274][ T4156] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.726280][ T4185] device syzkaller0 entered promiscuous mode [ 1397.480316][ T4261] EXT4-fs warning (device sda1): ext4_group_extend:1812: need to use ext2online to resize further [ 1397.592973][ T4271] syz-executor.2[4271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1397.593034][ T4271] syz-executor.2[4271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1398.075125][ T4300] device veth0_vlan left promiscuous mode [ 1398.093540][ T4300] device veth0_vlan entered promiscuous mode [ 1398.100677][T26728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1398.109383][T26728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1398.117199][T26728] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1398.540740][ T4324] device syzkaller0 entered promiscuous mode [ 1399.965097][ T4386] device syzkaller0 entered promiscuous mode [ 1399.981116][ T3472] syzkaller0: tun_net_xmit 48 [ 1399.989015][ T4386] syzkaller0: create flow: hash 329017442 index 2 [ 1399.997969][ T4386] syzkaller0: delete flow: hash 329017442 index 2 [ 1400.243038][ T4425] syz-executor.3[4425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1400.243091][ T4425] syz-executor.3[4425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1400.255268][ T4426] syz-executor.3[4426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1400.267134][ T4426] syz-executor.3[4426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1400.474812][ T4455] device pim6reg1 entered promiscuous mode [ 1400.525135][ T4458] device pim6reg1 entered promiscuous mode [ 1400.762544][ T4498] device pim6reg1 entered promiscuous mode [ 1401.140186][ T4550] device pim6reg1 entered promiscuous mode [ 1401.158602][ T4556] syz-executor.4[4556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1401.158653][ T4556] syz-executor.4[4556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1401.252939][ T4576] device veth0_vlan left promiscuous mode [ 1401.270691][ T4576] device veth0_vlan entered promiscuous mode [ 1401.277442][ T4576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1401.291704][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1401.303507][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1401.313395][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1401.445450][ T4590] device syzkaller0 entered promiscuous mode [ 1401.506493][ T4599] device pim6reg1 entered promiscuous mode [ 1402.459436][ T4658] device pim6reg1 entered promiscuous mode [ 1402.520229][ T4661] device pim6reg1 entered promiscuous mode [ 1402.932745][ T4689] device pim6reg1 entered promiscuous mode [ 1402.962115][ T4691] syz-executor.4[4691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1402.962157][ T4691] syz-executor.4[4691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.014701][ T4697] device pim6reg1 entered promiscuous mode [ 1403.172775][ T4713] device veth1_macvtap left promiscuous mode [ 1403.181250][ T4713] device macsec0 entered promiscuous mode [ 1403.338105][ T4725] syz-executor.4[4725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.338155][ T4725] syz-executor.4[4725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1403.379742][ T4732] device pim6reg1 entered promiscuous mode [ 1403.435113][ T4741] device wg2 left promiscuous mode [ 1403.550692][ T4747] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1404.258527][ T4770] syz-executor.2[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.258587][ T4770] syz-executor.2[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.545962][ T4799] device syzkaller0 entered promiscuous mode [ 1404.584217][ T4811] device macsec0 left promiscuous mode [ 1404.592086][ T4814] device wg2 left promiscuous mode [ 1404.675684][ T4822] syz-executor.1[4822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.675731][ T4822] syz-executor.1[4822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1404.900394][ T4833] FAULT_INJECTION: forcing a failure. [ 1404.900394][ T4833] name failslab, interval 1, probability 0, space 0, times 0 [ 1404.953251][ T4833] CPU: 1 PID: 4833 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1404.964805][ T4833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1404.974702][ T4833] Call Trace: [ 1404.977825][ T4833] dump_stack_lvl+0x1e2/0x24b [ 1404.982342][ T4833] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1404.987634][ T4833] dump_stack+0x15/0x17 [ 1404.991622][ T4833] should_fail+0x3c6/0x510 [ 1404.995878][ T4833] ? kvmalloc_node+0x82/0x130 [ 1405.000567][ T4833] __should_failslab+0xa4/0xe0 [ 1405.005140][ T4833] should_failslab+0x9/0x20 [ 1405.009563][ T4833] __kmalloc+0x60/0x330 [ 1405.013559][ T4833] ? kvmalloc_node+0x82/0x130 [ 1405.018057][ T4833] kvmalloc_node+0x82/0x130 [ 1405.022414][ T4833] pfifo_fast_init+0x25e/0x7a0 [ 1405.027000][ T4833] qdisc_create_dflt+0x138/0x3d0 [ 1405.031784][ T4833] mq_init+0x2c8/0x6b0 [ 1405.035684][ T4833] ? local_bh_enable+0x30/0x30 [ 1405.040280][ T4833] ? __kasan_check_write+0x14/0x20 [ 1405.045226][ T4833] ? qdisc_alloc+0x586/0x750 [ 1405.049649][ T4833] ? mutex_lock+0xa5/0x110 [ 1405.053900][ T4833] qdisc_create_dflt+0x138/0x3d0 [ 1405.058683][ T4833] ? _raw_spin_lock+0xa4/0x1b0 [ 1405.063280][ T4833] dev_activate+0x123/0x1310 [ 1405.067705][ T4833] ? bpf_prog_run_clear_cb+0x220/0x220 [ 1405.073001][ T4833] ? dev_set_rx_mode+0x245/0x2e0 [ 1405.077775][ T4833] __dev_open+0x3bf/0x4e0 [ 1405.081938][ T4833] ? dev_open+0x260/0x260 [ 1405.086106][ T4833] ? _raw_spin_unlock_bh+0x51/0x60 [ 1405.091060][ T4833] ? dev_set_rx_mode+0x245/0x2e0 [ 1405.095827][ T4833] ? __kasan_check_read+0x11/0x20 [ 1405.100684][ T4833] __dev_change_flags+0x1db/0x6e0 [ 1405.105547][ T4833] ? dev_get_flags+0x1e0/0x1e0 [ 1405.110147][ T4833] ? selinux_capable+0x2f1/0x430 [ 1405.114925][ T4833] ? selinux_capset+0xf0/0xf0 [ 1405.119439][ T4833] dev_change_flags+0x8c/0x1a0 [ 1405.124032][ T4833] dev_ifsioc+0x115/0xae0 [ 1405.128194][ T4833] ? dev_ioctl+0xb40/0xb40 [ 1405.132447][ T4833] ? dev_get_by_name_rcu+0xc5/0xf0 [ 1405.137396][ T4833] dev_ioctl+0x526/0xb40 [ 1405.141475][ T4833] sock_do_ioctl+0x295/0x3a0 [ 1405.145988][ T4833] ? sock_show_fdinfo+0xa0/0xa0 [ 1405.150674][ T4833] ? kernel_write+0x3d0/0x3d0 [ 1405.155189][ T4833] ? selinux_file_ioctl+0x3cc/0x540 [ 1405.160220][ T4833] sock_ioctl+0x4a6/0x760 [ 1405.164391][ T4833] ? sock_poll+0x340/0x340 [ 1405.168643][ T4833] ? security_file_ioctl+0x84/0xb0 [ 1405.173585][ T4833] ? sock_poll+0x340/0x340 [ 1405.177836][ T4833] __se_sys_ioctl+0x114/0x190 [ 1405.182350][ T4833] __x64_sys_ioctl+0x7b/0x90 [ 1405.186779][ T4833] do_syscall_64+0x34/0x70 [ 1405.191031][ T4833] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1405.196758][ T4833] RIP: 0033:0x7fb1584d6f69 [ 1405.201013][ T4833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1405.220455][ T4833] RSP: 002b:00007fb1578510c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1405.228697][ T4833] RAX: ffffffffffffffda RBX: 00007fb15860df80 RCX: 00007fb1584d6f69 [ 1405.236505][ T4833] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000007 [ 1405.244402][ T4833] RBP: 00007fb157851120 R08: 0000000000000000 R09: 0000000000000000 [ 1405.252311][ T4833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1405.260127][ T4833] R13: 000000000000000b R14: 00007fb15860df80 R15: 00007ffcf5f3d558 [ 1405.295834][ T4833] device syzkaller0 entered promiscuous mode [ 1406.128855][ T4906] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1407.111127][ T5011] device syzkaller0 entered promiscuous mode [ 1407.232819][ T5028] bpf_get_probe_write_proto: 4 callbacks suppressed [ 1407.232829][ T5028] syz-executor.0[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1407.239757][ T5028] syz-executor.0[5028] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1407.264266][ T5026] device wlan0 entered promiscuous mode [ 1407.302971][ T5028] device syzkaller0 entered promiscuous mode [ 1409.063255][ T5161] syz-executor.0[5161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1409.063303][ T5161] syz-executor.0[5161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1409.506662][ T5186] device pim6reg1 entered promiscuous mode [ 1410.622145][ T5232] device pim6reg1 entered promiscuous mode [ 1411.317612][ T5277] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1412.608426][ T5317] device syzkaller0 entered promiscuous mode [ 1412.953515][ T5333] device syzkaller0 entered promiscuous mode [ 1413.204892][ T5356] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1413.266192][ T5362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.273120][ T5362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1413.280790][ T5362] device bridge_slave_0 entered promiscuous mode [ 1413.287641][ T5362] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.294587][ T5362] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.301939][ T5362] device bridge_slave_1 entered promiscuous mode [ 1413.353884][ T5362] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.360769][ T5362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1413.367840][ T5362] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.374621][ T5362] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.401078][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1413.408989][ T830] bridge0: port 1(bridge_slave_0) entered disabled state [ 1413.416042][ T830] bridge0: port 2(bridge_slave_1) entered disabled state [ 1413.442514][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1413.460416][ T830] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.467394][ T830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.491514][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1413.506525][ T830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1413.513380][ T830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1413.548296][T26719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1413.556053][T26719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1413.634888][ T5362] device veth0_vlan entered promiscuous mode [ 1413.649277][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1413.663189][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1413.673021][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1413.681495][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1413.695541][ T5362] device veth1_macvtap entered promiscuous mode [ 1413.711551][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1413.721279][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1413.729564][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1413.757932][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1413.765909][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1413.774292][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1413.782531][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1414.168474][ T1078] device bridge_slave_1 left promiscuous mode [ 1414.174447][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1414.245943][ T1078] device bridge_slave_0 left promiscuous mode [ 1414.303148][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1414.367173][ T1078] device veth0_vlan left promiscuous mode [ 1415.627485][ T5451] syz-executor.3[5451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1415.627535][ T5451] syz-executor.3[5451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1415.645586][ T5451] syz-executor.3[5451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1415.659218][ T5451] syz-executor.3[5451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1415.807408][ T5472] device pim6reg1 entered promiscuous mode [ 1416.026023][ T5492] syz-executor.0[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1416.026080][ T5492] syz-executor.0[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1416.077072][ T5496] syz-executor.0[5496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1416.109634][ T5496] syz-executor.0[5496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.027989][ T5526] syz-executor.2[5526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.045766][ T5526] syz-executor.2[5526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1417.249128][ T5543] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.267851][ T5543] bridge0: port 1(bridge_slave_0) entered disabled state [ 1417.276135][ T5543] device bridge_slave_0 entered promiscuous mode [ 1417.283073][ T5557] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 4 (only 8 groups) [ 1417.304329][ T5543] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.311188][ T5543] bridge0: port 2(bridge_slave_1) entered disabled state [ 1417.318476][ T5543] device bridge_slave_1 entered promiscuous mode [ 1417.362217][ T5543] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.369065][ T5543] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1417.376129][ T5543] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.382955][ T5543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1417.409945][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1417.418742][ T53] bridge0: port 1(bridge_slave_0) entered disabled state [ 1417.425969][ T53] bridge0: port 2(bridge_slave_1) entered disabled state [ 1417.447317][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1417.455279][ T830] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.462132][ T830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1417.469610][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1417.478486][ T830] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.485325][ T830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1417.492562][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1417.505571][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1417.525307][ T5543] device veth0_vlan entered promiscuous mode [ 1417.546209][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1417.557166][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1417.621313][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1417.628667][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1417.644105][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1417.653497][ T5543] device veth1_macvtap entered promiscuous mode [ 1417.665188][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1417.690853][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1418.037796][T12673] device bridge_slave_1 left promiscuous mode [ 1418.043815][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.072545][T12673] device bridge_slave_0 left promiscuous mode [ 1418.081135][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1418.095099][T12673] device veth1_macvtap left promiscuous mode [ 1418.111234][T12673] device veth0_vlan left promiscuous mode [ 1419.385615][ T5703] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.392747][ T5703] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.400216][ T5703] device bridge_slave_0 entered promiscuous mode [ 1419.410963][ T5703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.420217][ T5703] bridge0: port 2(bridge_slave_1) entered disabled state [ 1419.427570][ T5703] device bridge_slave_1 entered promiscuous mode [ 1419.484310][ T5703] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.491271][ T5703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1419.498348][ T5703] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.505133][ T5703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1419.556295][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.564867][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 1419.573457][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1419.582125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1419.597136][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1419.605410][ T849] bridge0: port 1(bridge_slave_0) entered blocking state [ 1419.612367][ T849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1419.621505][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1419.630257][ T849] bridge0: port 2(bridge_slave_1) entered blocking state [ 1419.637105][ T849] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1419.655102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1419.664096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1419.694712][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1419.708567][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1419.725858][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1419.733591][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1419.742168][ T5703] device veth0_vlan entered promiscuous mode [ 1419.769198][ T5721] device syzkaller0 entered promiscuous mode [ 1419.798731][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1419.808088][ T5703] device veth1_macvtap entered promiscuous mode [ 1419.816706][ T5727] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1419.838679][T11395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1419.849096][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1420.008370][T12673] device bridge_slave_1 left promiscuous mode [ 1420.015858][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1420.023520][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1420.031303][T12673] device veth1_macvtap left promiscuous mode [ 1420.733556][ T5809] bpf_get_probe_write_proto: 12 callbacks suppressed [ 1420.733566][ T5809] syz-executor.2[5809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.740587][ T5809] syz-executor.2[5809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.787450][ T5815] syz-executor.1[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.799631][ T5815] syz-executor.1[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.799680][ T5817] syz-executor.2[5817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.822983][ T5817] syz-executor.2[5817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.837294][ T5815] syz-executor.1[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1420.848880][ T5815] syz-executor.1[5815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1421.613187][ T5849] syz-executor.3[5849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1421.625052][ T5849] syz-executor.3[5849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1422.009976][ T5902] device pim6reg1 entered promiscuous mode [ 1422.227377][ T5925] device syzkaller0 entered promiscuous mode [ 1423.429336][ T6008] device syzkaller0 entered promiscuous mode [ 1424.699125][ T6064] device pim6reg1 entered promiscuous mode [ 1426.092737][ T6155] device syzkaller0 entered promiscuous mode [ 1426.578646][ T6181] bridge0: port 1(bridge_slave_0) entered blocking state [ 1426.585560][ T6181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1426.593023][ T6181] device bridge_slave_0 entered promiscuous mode [ 1426.601269][ T6181] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.608354][ T6181] bridge0: port 2(bridge_slave_1) entered disabled state [ 1426.616127][ T6181] device bridge_slave_1 entered promiscuous mode [ 1426.672434][ T6181] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.679316][ T6181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1426.686406][ T6181] bridge0: port 1(bridge_slave_0) entered blocking state [ 1426.693175][ T6181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1426.719871][ T6544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1426.727413][ T6544] bridge0: port 1(bridge_slave_0) entered disabled state [ 1426.734741][ T6544] bridge0: port 2(bridge_slave_1) entered disabled state [ 1426.747515][ T3466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1426.755582][ T3466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1426.763840][ T3466] bridge0: port 1(bridge_slave_0) entered blocking state [ 1426.770711][ T3466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1426.777936][ T3466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1426.786986][ T3466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1426.794994][ T3466] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.801837][ T3466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1426.817861][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1426.825984][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1426.843047][ T6181] device veth0_vlan entered promiscuous mode [ 1426.849797][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1426.857804][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1426.865558][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1426.874499][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1426.882723][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1426.890586][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1426.899491][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1426.906763][T18168] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1426.922550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1426.930676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1426.940173][ T6181] device veth1_macvtap entered promiscuous mode [ 1426.960663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1426.969819][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1426.981714][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1427.002911][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1427.011260][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1427.067529][ T6226] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 9 (only 8 groups) [ 1427.269401][T12673] device bridge_slave_1 left promiscuous mode [ 1427.275370][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1427.285811][T12673] device bridge_slave_0 left promiscuous mode [ 1427.292138][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1427.303282][T12673] device veth1_macvtap left promiscuous mode [ 1427.310180][T12673] device veth0_vlan left promiscuous mode [ 1427.562602][ T6246] bpf_get_probe_write_proto: 8 callbacks suppressed [ 1427.562629][ T6246] syz-executor.1[6246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1427.575614][ T6246] syz-executor.1[6246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1428.326819][ T6299] syz-executor.1[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1428.338778][ T6299] syz-executor.1[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1429.515585][ T6382] device syzkaller0 entered promiscuous mode [ 1429.954907][ T6409] bridge0: port 1(bridge_slave_0) entered blocking state [ 1429.972010][ T6409] bridge0: port 1(bridge_slave_0) entered disabled state [ 1429.979354][ T6409] device bridge_slave_0 entered promiscuous mode [ 1429.986296][ T6409] bridge0: port 2(bridge_slave_1) entered blocking state [ 1429.993174][ T6409] bridge0: port 2(bridge_slave_1) entered disabled state [ 1430.000635][ T6409] device bridge_slave_1 entered promiscuous mode [ 1430.062960][ T6409] bridge0: port 2(bridge_slave_1) entered blocking state [ 1430.069846][ T6409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1430.077108][ T6409] bridge0: port 1(bridge_slave_0) entered blocking state [ 1430.083869][ T6409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1430.112046][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1430.120902][ T6686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1430.128066][ T6686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1430.146059][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1430.155493][ T6686] bridge0: port 1(bridge_slave_0) entered blocking state [ 1430.162363][ T6686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1430.172186][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1430.185795][ T6686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1430.192655][ T6686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1430.210133][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1430.218390][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1430.235675][ T6409] device veth0_vlan entered promiscuous mode [ 1430.248745][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1430.257917][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1430.265774][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1430.273093][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1430.288240][ T6409] device veth1_macvtap entered promiscuous mode [ 1430.297123][ T6686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1430.316443][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1430.326078][ T848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1430.549007][T12673] device bridge_slave_1 left promiscuous mode [ 1430.555091][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1430.572033][T12673] device bridge_slave_0 left promiscuous mode [ 1430.582760][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1430.592066][T12673] device veth1_macvtap left promiscuous mode [ 1430.597924][T12673] device veth0_vlan left promiscuous mode [ 1430.824204][ T6448] device veth0_vlan left promiscuous mode [ 1430.847909][ T6448] device veth0_vlan entered promiscuous mode [ 1430.901027][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1430.909887][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1430.918459][ T849] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1431.210628][ T6485] device syzkaller0 entered promiscuous mode [ 1431.403619][ T6499] device syzkaller0 entered promiscuous mode [ 1431.437828][ T6501] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 29696 (only 8 groups) [ 1433.187944][ T6575] device syzkaller0 entered promiscuous mode [ 1435.112888][ T6738] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1435.124277][ T6742] syz-executor.3[6742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.124320][ T6742] syz-executor.3[6742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1435.389686][ T6766] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1436.237290][ T6784] device pim6reg1 entered promiscuous mode [ 1436.368621][ T6796] device vxcan1 entered promiscuous mode [ 1436.899450][ T6843] syz-executor.2[6843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1436.899532][ T6843] syz-executor.2[6843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1438.709959][ T6927] device vxcan1 entered promiscuous mode [ 1439.196054][ T6965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.203136][ T6965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.211839][ T6965] device bridge_slave_1 left promiscuous mode [ 1439.217979][ T6965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.225087][ T6965] device bridge_slave_0 left promiscuous mode [ 1439.231026][ T6965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.830087][ T7021] device wlan0 entered promiscuous mode [ 1440.344105][ T7080] device veth1_macvtap entered promiscuous mode [ 1440.350267][ T7080] device macsec0 entered promiscuous mode [ 1440.356281][T15881] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1440.560552][ T7105] syz-executor.2[7105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.560601][ T7105] syz-executor.2[7105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1440.707821][ T7122] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1440.849145][ T7138] ªªªªªª: renamed from veth0_vlan [ 1440.889124][ T7136] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.895961][ T7136] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.903837][ T7136] device bridge_slave_0 entered promiscuous mode [ 1440.910568][ T7136] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.917443][ T7136] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.924684][ T7136] device bridge_slave_1 entered promiscuous mode [ 1440.978875][ T7136] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.985710][ T7136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.992839][ T7136] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.999813][ T7136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1441.019667][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1441.027067][T18811] bridge0: port 1(bridge_slave_0) entered disabled state [ 1441.034175][T18811] bridge0: port 2(bridge_slave_1) entered disabled state [ 1441.047516][T15882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1441.055498][T15882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1441.062364][T15882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1441.077585][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1441.085549][T18811] bridge0: port 2(bridge_slave_1) entered blocking state [ 1441.092412][T18811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1441.108287][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1441.116066][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1441.127338][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1441.139690][ T7136] device veth0_vlan entered promiscuous mode [ 1441.147197][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1441.155132][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1441.162816][T18811] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1441.181229][ T7155] device syzkaller0 entered promiscuous mode [ 1441.193538][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1441.205586][ T7136] device veth1_macvtap entered promiscuous mode [ 1441.219043][T15882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1441.232759][T18815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1441.465104][ T7205] syz-executor.2[7205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.465157][ T7205] syz-executor.2[7205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1441.597489][ T7230] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1442.642456][ T7341] EXT4-fs warning (device sda1): ext4_group_extend:1812: need to use ext2online to resize further [ 1442.945017][ T7370] syz-executor.4[7370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.945072][ T7370] syz-executor.4[7370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1442.998988][ T7374] device syzkaller0 entered promiscuous mode [ 1443.463469][ T7419] device veth1_macvtap left promiscuous mode [ 1445.394846][ T7533] device pim6reg1 entered promiscuous mode [ 1446.897931][ T7609] syz-executor.4[7609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1446.897988][ T7609] syz-executor.4[7609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1447.996175][ T7664] device dummy0 entered promiscuous mode [ 1449.005645][ T7695] syz-executor.1[7695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1449.005688][ T7695] syz-executor.1[7695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1449.107764][ T7703] device syzkaller0 entered promiscuous mode [ 1450.099272][ T7731] device vxcan1 entered promiscuous mode [ 1450.125801][ T7753] device pim6reg1 entered promiscuous mode [ 1450.819962][ T7781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1450.827206][ T7781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1450.834798][ T7781] device bridge_slave_0 entered promiscuous mode [ 1450.842268][ T7781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1450.849201][ T7781] bridge0: port 2(bridge_slave_1) entered disabled state [ 1450.856606][ T7781] device bridge_slave_1 entered promiscuous mode [ 1450.938031][ T7781] bridge0: port 2(bridge_slave_1) entered blocking state [ 1450.944919][ T7781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1450.952027][ T7781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1450.958892][ T7781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1450.999629][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1451.007340][ T3479] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.014402][ T3479] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.032177][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1451.043757][ T7789] syz-executor.1[7789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1451.043821][ T7789] syz-executor.1[7789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1451.060226][ T6692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.078527][ T6692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1451.106438][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1451.114409][ T6692] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.121248][ T6692] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1451.128619][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1451.188213][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1451.204561][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1451.214694][ T7781] device veth0_vlan entered promiscuous mode [ 1451.222850][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1451.231153][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1451.255779][ T7781] device veth1_macvtap entered promiscuous mode [ 1451.265083][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1451.272814][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1451.281460][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1451.290673][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1451.298986][ T3479] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1451.322125][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1451.330890][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1451.340294][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1451.352279][ T3476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1451.388763][ T24] audit: type=1400 audit(1718052276.500:169): avc: denied { create } for pid=7808 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1452.055782][ T7862] device sit0 entered promiscuous mode [ 1452.391277][ T7893] device sit0 entered promiscuous mode [ 1452.964007][ T7927] device sit0 left promiscuous mode [ 1453.070599][ T7927] device sit0 entered promiscuous mode [ 1453.145595][ T7935] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1453.702702][ T7971] device sit0 entered promiscuous mode [ 1454.140516][ T7991] device syzkaller0 entered promiscuous mode [ 1454.782286][ T8030] syz-executor.2[8030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1454.782349][ T8030] syz-executor.2[8030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1455.374650][ T8040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1456.380378][ T8089] device syzkaller0 entered promiscuous mode [ 1456.394767][ T8089] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 1456.409554][ T8087] device pim6reg1 entered promiscuous mode [ 1456.720318][ T8124] device pim6reg1 entered promiscuous mode [ 1457.155762][ T8156] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 1457.265116][ T6692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1457.277735][ T6692] bridge0: port 1(bridge_slave_0) entered blocking state [ 1457.284599][ T6692] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1457.403972][ T8170] syz-executor.0[8170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.404031][ T8170] syz-executor.0[8170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1457.449283][ T8170] device pim6reg1 entered promiscuous mode [ 1457.584871][ T8193] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1457.789869][ T8212] device syzkaller0 entered promiscuous mode [ 1459.660676][ T8319] device syzkaller0 entered promiscuous mode [ 1460.068852][ T8349] syz-executor.3[8349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.068915][ T8349] syz-executor.3[8349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.107685][ T8349] syz-executor.3[8349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.132566][ T8349] syz-executor.3[8349] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1460.149538][ T8351] device pim6reg1 entered promiscuous mode [ 1461.268661][ T8442] device syzkaller0 entered promiscuous mode [ 1461.312820][ T8448] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.319873][ T8448] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.335550][ T8448] bridge0: port 2(bridge_slave_1) entered blocking state [ 1461.342431][ T8448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1461.349546][ T8448] bridge0: port 1(bridge_slave_0) entered blocking state [ 1461.356389][ T8448] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1461.366456][ T8448] device bridge0 entered promiscuous mode [ 1462.088367][ T8504] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1462.109309][ T8504] device syzkaller0 entered promiscuous mode [ 1463.056644][ T8539] EXT4-fs warning (device sda1): ext4_group_extend:1812: need to use ext2online to resize further [ 1463.501471][ T8548] syz-executor.4[8548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1463.501533][ T8548] syz-executor.4[8548] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1463.549445][ T8550] syz-executor.4[8550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1463.564662][ T8550] syz-executor.4[8550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1464.299767][ T8596] syz-executor.4[8596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1464.311606][ T8596] syz-executor.4[8596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1464.617561][ T8615] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1464.964548][ T8660] device syzkaller0 entered promiscuous mode [ 1466.751315][ T8756] device veth0_vlan left promiscuous mode [ 1466.784115][ T8756] device veth0_vlan entered promiscuous mode [ 1467.605836][ T8804] device veth0_vlan left promiscuous mode [ 1467.672941][ T8804] device veth0_vlan entered promiscuous mode [ 1467.824702][ T8815] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.831882][ T8815] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.839166][ T8815] device bridge_slave_0 entered promiscuous mode [ 1467.854208][ T8815] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.863629][ T8815] bridge0: port 2(bridge_slave_1) entered disabled state [ 1467.873755][ T8815] device bridge_slave_1 entered promiscuous mode [ 1467.936251][ T8815] bridge0: port 2(bridge_slave_1) entered blocking state [ 1467.943132][ T8815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1467.950240][ T8815] bridge0: port 1(bridge_slave_0) entered blocking state [ 1467.957009][ T8815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1467.982937][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1467.991848][T11392] bridge0: port 1(bridge_slave_0) entered disabled state [ 1467.999320][T11392] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.037974][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1468.045976][T11392] bridge0: port 1(bridge_slave_0) entered blocking state [ 1468.052831][T11392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1468.076420][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1468.084453][T11392] bridge0: port 2(bridge_slave_1) entered blocking state [ 1468.091323][T11392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1468.116518][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1468.124304][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1468.167771][ T8815] device veth0_vlan entered promiscuous mode [ 1468.176318][ T6543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1468.184467][ T6543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1468.206846][ T6543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1468.214810][ T6543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1468.241233][ T8815] device veth1_macvtap entered promiscuous mode [ 1468.248639][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1468.256056][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1468.263932][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1468.274317][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1468.307998][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1468.325719][T11386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1468.344310][T11386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1468.403122][T11386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1468.411330][T11386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1468.517256][T12673] device bridge_slave_1 left promiscuous mode [ 1468.523212][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1468.535167][T12673] device bridge_slave_0 left promiscuous mode [ 1468.543643][T12673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1468.593533][T12673] device veth0_vlan left promiscuous mode [ 1470.561636][ T8937] syz-executor.3[8937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1470.561693][ T8937] syz-executor.3[8937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1470.582965][ T8937] device veth1_macvtap left promiscuous mode [ 1470.602249][ T8937] device macsec0 left promiscuous mode [ 1471.148015][ T8969] syz-executor.0[8969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1471.148069][ T8969] syz-executor.0[8969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.599625][ T9033] syz-executor.0[9033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.666632][ T9033] syz-executor.0[9033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.666839][ T9039] syz-executor.0[9039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.698796][ T9039] syz-executor.0[9039] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1472.727235][ T9041] EXT4-fs warning (device sda1): __ext4_ioctl:890: Setting inode version is not supported with metadata_csum enabled. [ 1472.781416][ T9036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.788385][ T9036] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.799174][ T9036] device bridge_slave_0 entered promiscuous mode [ 1472.806092][ T9036] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.813388][ T9036] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.821076][ T9036] device bridge_slave_1 entered promiscuous mode [ 1472.916024][ T9036] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.922888][ T9036] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.929983][ T9036] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.936772][ T9036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.962804][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1472.971074][ T830] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.978311][ T830] bridge0: port 2(bridge_slave_1) entered disabled state [ 1473.013318][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1473.025874][T26737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1473.032729][T26737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1473.067572][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1473.084280][T26737] bridge0: port 2(bridge_slave_1) entered blocking state [ 1473.091130][T26737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1473.117796][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1473.143737][ T9056] device wg2 entered promiscuous mode [ 1473.164898][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1473.185576][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1473.200901][ T9036] device veth0_vlan entered promiscuous mode [ 1473.214437][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1473.232202][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1473.240846][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1473.263734][ T9036] device veth1_macvtap entered promiscuous mode [ 1473.277778][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1473.296346][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1473.304833][T11392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1473.314709][ T7] device veth1_macvtap left promiscuous mode [ 1473.320643][ T7] device veth0_vlan left promiscuous mode [ 1474.879151][ T9108] device syzkaller0 entered promiscuous mode [ 1474.999809][ T9115] geneve0: tun_chr_ioctl cmd 1074025675 [ 1475.005724][ T9115] geneve0: persist disabled [ 1475.699341][ T9149] device veth0_vlan left promiscuous mode [ 1475.721946][ T9149] device veth0_vlan entered promiscuous mode [ 1476.828226][ T9213] geneve1: tun_chr_ioctl cmd 1074025681 [ 1477.153606][ T9247] syz-executor.2[9247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.153655][ T9247] syz-executor.2[9247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1477.246588][ T9267] device syzkaller0 entered promiscuous mode [ 1477.622969][ T9307] device syzkaller0 entered promiscuous mode [ 1477.844479][ T9326] device syzkaller0 entered promiscuous mode [ 1478.260773][ T9377] syz-executor.3[9377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.260811][ T9377] syz-executor.3[9377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1478.294540][ T9379] device syzkaller0 entered promiscuous mode [ 1479.763631][ T9492] device syzkaller0 entered promiscuous mode [ 1479.881549][ T9501] device wlan0 entered promiscuous mode [ 1480.244481][ T9554] device wlan0 entered promiscuous mode [ 1480.422045][ T9578] device syzkaller0 entered promiscuous mode [ 1480.460733][ T9587] syz-executor.2[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.460785][ T9587] syz-executor.2[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.478568][ T9587] syz-executor.2[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1480.496074][ T9587] syz-executor.2[9587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1481.010039][ T9658] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1481.687326][ T9695] FAULT_INJECTION: forcing a failure. [ 1481.687326][ T9695] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.700654][ T9695] CPU: 0 PID: 9695 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1481.712083][ T9695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1481.721972][ T9695] Call Trace: [ 1481.725108][ T9695] dump_stack_lvl+0x1e2/0x24b [ 1481.729633][ T9695] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1481.734913][ T9695] ? blk_cleanup_queue+0x200/0x200 [ 1481.739871][ T9695] dump_stack+0x15/0x17 [ 1481.743855][ T9695] should_fail+0x3c6/0x510 [ 1481.748104][ T9695] ? mempool_alloc_slab+0x1d/0x30 [ 1481.752964][ T9695] __should_failslab+0xa4/0xe0 [ 1481.757565][ T9695] should_failslab+0x9/0x20 [ 1481.761906][ T9695] kmem_cache_alloc+0x3d/0x2e0 [ 1481.766502][ T9695] ? mempool_alloc_slab+0x1d/0x30 [ 1481.771367][ T9695] ? mempool_free+0x310/0x310 [ 1481.775875][ T9695] mempool_alloc_slab+0x1d/0x30 [ 1481.780567][ T9695] mempool_alloc+0x11f/0x530 [ 1481.784997][ T9695] ? out_of_line_wait_on_bit+0x1ab/0x230 [ 1481.790456][ T9695] ? bit_wait+0xd0/0xd0 [ 1481.794477][ T9695] ? mempool_resize+0x840/0x840 [ 1481.799145][ T9695] ? bit_waitqueue+0x30/0x30 [ 1481.803565][ T9695] ? fscrypt_set_bio_crypt_ctx+0x160/0x4f0 [ 1481.809213][ T9695] bio_alloc_bioset+0x1e0/0x650 [ 1481.813894][ T9695] ? __bio_add_page+0x290/0x450 [ 1481.818590][ T9695] ? bio_chain_endio+0x250/0x250 [ 1481.823445][ T9695] ? __disk_get_part+0x79/0xd0 [ 1481.828041][ T9695] submit_bh_wbc+0x1d1/0x700 [ 1481.832477][ T9695] write_dirty_buffer+0x13c/0x170 [ 1481.837330][ T9695] __flush_batch+0x125/0x3a0 [ 1481.841778][ T9695] ? jbd2_cleanup_journal_tail+0x2c0/0x2c0 [ 1481.847400][ T9695] ? _raw_spin_trylock_bh+0x190/0x190 [ 1481.852605][ T9695] jbd2_log_do_checkpoint+0x88b/0xd50 [ 1481.857807][ T9695] ? _raw_read_unlock+0x25/0x40 [ 1481.862500][ T9695] ? __jbd2_log_wait_for_space+0x480/0x480 [ 1481.868141][ T9695] jbd2_journal_flush+0x216/0x570 [ 1481.872999][ T9695] ext4_ioctl+0x2747/0x66d0 [ 1481.877343][ T9695] ? __mod_memcg_lruvec_state+0x131/0x310 [ 1481.882894][ T9695] ? avc_has_extended_perms+0x1e3/0xf70 [ 1481.888274][ T9695] ? memcpy+0x56/0x70 [ 1481.892093][ T9695] ? avc_has_extended_perms+0x975/0xf70 [ 1481.897473][ T9695] ? ext4_reset_inode_seed+0x700/0x700 [ 1481.902781][ T9695] ? pagevec_lru_move_fn+0x1e3/0x270 [ 1481.907885][ T9695] ? avc_ss_reset+0x280/0x280 [ 1481.912416][ T9695] ? _kstrtoull+0x3a0/0x4a0 [ 1481.916741][ T9695] ? kstrtouint_from_user+0x20a/0x2a0 [ 1481.921951][ T9695] ? kstrtol_from_user+0x310/0x310 [ 1481.926904][ T9695] ? __fsnotify_parent+0x4b9/0x6c0 [ 1481.931846][ T9695] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1481.938437][ T9695] ? proc_fail_nth_write+0x20b/0x290 [ 1481.943557][ T9695] ? ioctl_has_perm+0x1f8/0x560 [ 1481.948244][ T9695] ? do_vfs_ioctl+0x102e/0x1a30 [ 1481.952931][ T9695] ? ioctl_has_perm+0x3f0/0x560 [ 1481.957617][ T9695] ? preempt_count_add+0x92/0x1a0 [ 1481.962478][ T9695] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1481.967685][ T9695] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1481.972633][ T9695] ? kernel_write+0x3d0/0x3d0 [ 1481.977148][ T9695] ? selinux_file_ioctl+0x3cc/0x540 [ 1481.982182][ T9695] ? selinux_file_alloc_security+0x120/0x120 [ 1481.988015][ T9695] ? __fget_files+0x31e/0x380 [ 1481.992630][ T9695] ? security_file_ioctl+0x84/0xb0 [ 1481.997665][ T9695] ? ext4_reset_inode_seed+0x700/0x700 [ 1482.002941][ T9695] __se_sys_ioctl+0x114/0x190 [ 1482.007459][ T9695] __x64_sys_ioctl+0x7b/0x90 [ 1482.011882][ T9695] do_syscall_64+0x34/0x70 [ 1482.016137][ T9695] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1482.021862][ T9695] RIP: 0033:0x7f83a38ebf69 [ 1482.026205][ T9695] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1482.045640][ T9695] RSP: 002b:00007f83a2c660c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1482.053888][ T9695] RAX: ffffffffffffffda RBX: 00007f83a3a22f80 RCX: 00007f83a38ebf69 [ 1482.061696][ T9695] RDX: 0000000020001412 RSI: 0000000040086607 RDI: 0000000000000003 [ 1482.069506][ T9695] RBP: 00007f83a2c66120 R08: 0000000000000000 R09: 0000000000000000 [ 1482.077317][ T9695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1482.085124][ T9695] R13: 000000000000000b R14: 00007f83a3a22f80 R15: 00007ffd95518ae8 [ 1482.240347][ T9710] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.256774][ T9710] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.265472][ T9710] device bridge_slave_0 entered promiscuous mode [ 1482.276062][ T9710] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.286139][ T9710] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.294303][ T9710] device bridge_slave_1 entered promiscuous mode [ 1482.353585][ T9710] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.360438][ T9710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.367537][ T9710] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.374319][ T9710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.399687][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1482.408119][T26727] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.415567][T26727] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.428920][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1482.437068][T11387] bridge0: port 1(bridge_slave_0) entered blocking state [ 1482.443913][T11387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1482.451485][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1482.460871][T11387] bridge0: port 2(bridge_slave_1) entered blocking state [ 1482.467721][T11387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1482.486339][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1482.494081][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1482.516719][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1482.539216][ T9710] device veth0_vlan entered promiscuous mode [ 1482.546844][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1482.554803][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1482.569254][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1482.590006][ T9710] device veth1_macvtap entered promiscuous mode [ 1482.614006][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1482.629041][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1482.637501][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1482.996716][ T9757] device wlan0 entered promiscuous mode [ 1483.006282][ T9749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.015750][ T9749] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.033145][ T9749] device bridge_slave_0 entered promiscuous mode [ 1483.051271][ T1078] device bridge_slave_1 left promiscuous mode [ 1483.057549][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.067695][ T1078] device bridge_slave_0 left promiscuous mode [ 1483.073638][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.091938][ T1078] device veth1_macvtap left promiscuous mode [ 1483.106391][ T1078] device veth0_vlan left promiscuous mode [ 1483.254587][ T9749] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.262026][ T9749] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.279494][ T9749] device bridge_slave_1 entered promiscuous mode [ 1483.348140][ T9749] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.355083][ T9749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.362206][ T9749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.368992][ T9749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1483.394712][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1483.412983][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 1483.420409][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1483.436565][ T9763] device veth1_macvtap left promiscuous mode [ 1483.458346][T14057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1483.467983][T14057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.474833][T14057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1483.483089][T14057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1483.491456][T14057] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.498316][T14057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.505499][T14057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1483.513287][T14057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1483.531674][ T9749] device veth0_vlan entered promiscuous mode [ 1483.545061][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1483.553679][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1483.562589][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1483.576193][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1483.590426][ T9749] device veth1_macvtap entered promiscuous mode [ 1483.602180][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1483.620315][ T6690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1483.630759][ T6690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1484.318099][ T1078] device bridge_slave_1 left promiscuous mode [ 1484.324096][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1484.332567][ T1078] device bridge_slave_0 left promiscuous mode [ 1484.339203][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.273302][ T9909] syz-executor.4[9909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.273391][ T9909] syz-executor.4[9909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1485.764701][ T9951] device veth1_macvtap left promiscuous mode [ 1486.537646][ T9996] syz-executor.1[9996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1486.537696][ T9996] syz-executor.1[9996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1486.842069][T10013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1486.919583][T10013] bridge0: port 1(bridge_slave_0) entered disabled state [ 1486.926972][T10013] device bridge_slave_0 entered promiscuous mode [ 1486.942870][T10013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1486.965294][T10013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1486.981344][T10013] device bridge_slave_1 entered promiscuous mode [ 1486.991573][T10029] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 925 (only 8 groups) [ 1487.048786][T10013] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.055625][T10013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.062811][T10013] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.069619][T10013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.090502][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1487.096692][T10031] syz-executor.0[10031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.097574][T10031] syz-executor.0[10031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.109236][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.129790][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.193967][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1487.236582][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1487.243441][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1487.276503][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1487.284601][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1487.291459][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1487.299355][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1487.312472][T26737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1487.331651][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1487.349889][T10013] device veth0_vlan entered promiscuous mode [ 1487.356164][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1487.374543][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1487.383961][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1487.413141][T10013] device veth1_macvtap entered promiscuous mode [ 1487.425655][T26727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1487.443181][T10052] syz-executor.4[10052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.443235][T10052] syz-executor.4[10052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1487.506046][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1487.526748][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1487.685171][ T1078] device bridge_slave_1 left promiscuous mode [ 1487.696453][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1487.706933][ T1078] device bridge_slave_0 left promiscuous mode [ 1487.714029][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1487.737540][ T1078] device veth1_macvtap left promiscuous mode [ 1487.743394][ T1078] device veth0_vlan left promiscuous mode [ 1488.126590][T10103] syz-executor.4[10103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1488.126663][T10103] syz-executor.4[10103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1488.141444][T10103] device veth1_macvtap left promiscuous mode [ 1488.639649][T10170] FAULT_INJECTION: forcing a failure. [ 1488.639649][T10170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1488.661540][T10170] CPU: 0 PID: 10170 Comm: syz-executor.3 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1488.673084][T10170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1488.683046][T10170] Call Trace: [ 1488.686182][T10170] dump_stack_lvl+0x1e2/0x24b [ 1488.690690][T10170] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1488.695981][T10170] ? 0xffffffffa0016000 [ 1488.700062][T10170] ? __kernel_text_address+0x9b/0x110 [ 1488.705271][T10170] dump_stack+0x15/0x17 [ 1488.709261][T10170] should_fail+0x3c6/0x510 [ 1488.713519][T10170] should_fail_usercopy+0x1a/0x20 [ 1488.718375][T10170] _copy_from_user+0x20/0xd0 [ 1488.722799][T10170] ext4_ioctl+0x1034/0x66d0 [ 1488.727147][T10170] ? avc_has_extended_perms+0x1e3/0xf70 [ 1488.732522][T10170] ? memcpy+0x56/0x70 [ 1488.736343][T10170] ? avc_has_extended_perms+0x975/0xf70 [ 1488.741725][T10170] ? ext4_reset_inode_seed+0x700/0x700 [ 1488.747030][T10170] ? __mod_node_page_state+0xac/0xf0 [ 1488.752139][T10170] ? avc_ss_reset+0x280/0x280 [ 1488.756651][T10170] ? _kstrtoull+0x3a0/0x4a0 [ 1488.760993][T10170] ? kstrtouint_from_user+0x20a/0x2a0 [ 1488.766196][T10170] ? kstrtol_from_user+0x310/0x310 [ 1488.771161][T10170] ? __fsnotify_parent+0x4b9/0x6c0 [ 1488.776109][T10170] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 1488.782688][T10170] ? proc_fail_nth_write+0x20b/0x290 [ 1488.787807][T10170] ? ioctl_has_perm+0x1f8/0x560 [ 1488.792493][T10170] ? do_vfs_ioctl+0x102e/0x1a30 [ 1488.797179][T10170] ? ioctl_has_perm+0x3f0/0x560 [ 1488.801868][T10170] ? preempt_count_add+0x92/0x1a0 [ 1488.806729][T10170] ? __x32_compat_sys_ioctl+0x90/0x90 [ 1488.811938][T10170] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1488.816893][T10170] ? selinux_file_ioctl+0x3cc/0x540 [ 1488.821918][T10170] ? selinux_file_alloc_security+0x120/0x120 [ 1488.827736][T10170] ? __fget_files+0x31e/0x380 [ 1488.832254][T10170] ? security_file_ioctl+0x84/0xb0 [ 1488.837193][T10170] ? ext4_reset_inode_seed+0x700/0x700 [ 1488.842488][T10170] __se_sys_ioctl+0x114/0x190 [ 1488.847000][T10170] __x64_sys_ioctl+0x7b/0x90 [ 1488.851427][T10170] do_syscall_64+0x34/0x70 [ 1488.855684][T10170] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1488.861409][T10170] RIP: 0033:0x7f4c1b04df69 [ 1488.865665][T10170] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1488.885098][T10170] RSP: 002b:00007f4c1a3c80c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1488.893345][T10170] RAX: ffffffffffffffda RBX: 00007f4c1b184f80 RCX: 00007f4c1b04df69 [ 1488.901251][T10170] RDX: 0000000020000540 RSI: 0000000040286608 RDI: 0000000000000003 [ 1488.909056][T10170] RBP: 00007f4c1a3c8120 R08: 0000000000000000 R09: 0000000000000000 [ 1488.916864][T10170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1488.924676][T10170] R13: 000000000000000b R14: 00007f4c1b184f80 R15: 00007ffd7e390fe8 [ 1489.892722][T10288] device veth0_vlan left promiscuous mode [ 1489.900509][T10288] device veth0_vlan entered promiscuous mode [ 1490.398351][T10344] bpf_get_probe_write_proto: 4 callbacks suppressed [ 1490.398374][T10344] syz-executor.3[10344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.405930][T10344] syz-executor.3[10344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.449188][T10345] syz-executor.3[10345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.470021][T10345] syz-executor.3[10345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1490.848810][T10391] device pim6reg1 entered promiscuous mode [ 1491.081570][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1491.081640][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1491.106919][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1491.119717][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1491.132948][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1491.146013][T10417] syz-executor.1[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1492.757607][T10557] tap0: tun_chr_ioctl cmd 2147767511 [ 1493.051586][T10591] device pim6reg1 entered promiscuous mode [ 1493.884797][T10650] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 18432 (only 8 groups) [ 1493.907922][T10647] device syzkaller0 entered promiscuous mode [ 1495.055022][T10721] device vxcan1 entered promiscuous mode [ 1495.344203][T10738] device syzkaller0 entered promiscuous mode [ 1496.506434][T10809] bpf_get_probe_write_proto: 8 callbacks suppressed [ 1496.506446][T10809] syz-executor.1[10809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1496.520607][T10809] syz-executor.1[10809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1496.551294][T10807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.575490][T10807] bridge0: port 1(bridge_slave_0) entered disabled state [ 1496.583370][T10807] device bridge_slave_0 entered promiscuous mode [ 1496.590142][T10807] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.597168][T10807] bridge0: port 2(bridge_slave_1) entered disabled state [ 1496.604738][T10807] device bridge_slave_1 entered promiscuous mode [ 1496.750343][T10807] bridge0: port 2(bridge_slave_1) entered blocking state [ 1496.757236][T10807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1496.764317][T10807] bridge0: port 1(bridge_slave_0) entered blocking state [ 1496.771245][T10807] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1496.829036][T18168] bridge0: port 1(bridge_slave_0) entered disabled state [ 1496.839908][T18168] bridge0: port 2(bridge_slave_1) entered disabled state [ 1496.895656][T10807] device veth0_vlan entered promiscuous mode [ 1496.910588][T10807] device veth1_macvtap entered promiscuous mode [ 1496.938252][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1496.945537][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1497.028345][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1497.089328][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.097594][T15879] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.104444][T15879] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.111775][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1497.120701][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1497.128861][T15879] bridge0: port 2(bridge_slave_1) entered blocking state [ 1497.135690][T15879] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1497.155104][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1497.165858][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1497.174974][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1497.182915][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1497.193827][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1497.202078][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1497.210498][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1497.225890][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1497.233982][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1497.242270][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1497.250428][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1497.258029][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1497.266130][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1497.275680][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1497.284800][T15879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1497.300956][T18180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1497.312564][T18180] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1497.601067][ T1078] device bridge_slave_1 left promiscuous mode [ 1497.612475][ T1078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1497.621719][ T1078] device bridge_slave_0 left promiscuous mode [ 1497.627832][ T1078] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.635759][ T1078] device veth0_vlan left promiscuous mode [ 1497.895228][T10927] device syzkaller0 entered promiscuous mode [ 1498.301478][T10956] device syzkaller0 entered promiscuous mode [ 1498.530752][T10969] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1499.126086][T11036] macsec0: mtu less than device minimum [ 1499.850857][T11066] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1500.038598][T11088] device syzkaller0 entered promiscuous mode [ 1500.049989][T15884] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1500.193698][T11097] device veth0_vlan left promiscuous mode [ 1500.199994][T11097] device veth0_vlan entered promiscuous mode [ 1500.282160][T11109] syz-executor.3[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.282250][T11109] syz-executor.3[11109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.698861][T11174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1500.773066][T11195] syz-executor.3[11195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.773122][T11195] syz-executor.3[11195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.807217][T11195] syz-executor.3[11195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1500.821124][T11195] syz-executor.3[11195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1501.218723][T11266] device syzkaller0 entered promiscuous mode [ 1501.377573][T11278] syz-executor.4[11278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1501.377632][T11278] syz-executor.4[11278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1501.716532][T11306] device sit0 entered promiscuous mode [ 1502.478110][T11345] device pim6reg1 entered promiscuous mode [ 1502.485711][T11345] bridge0: port 3(macsec0) entered blocking state [ 1502.494053][T11345] bridge0: port 3(macsec0) entered disabled state [ 1502.501527][T11345] device macsec0 entered promiscuous mode [ 1502.507399][T11345] bridge0: port 3(macsec0) entered blocking state [ 1502.513639][T11345] bridge0: port 3(macsec0) entered forwarding state [ 1503.456108][T11406] syz-executor.4[11406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.456158][T11406] syz-executor.4[11406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.509153][T11409] device vxcan1 entered promiscuous mode [ 1503.646195][T11422] syz-executor.3[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.646286][T11422] syz-executor.3[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.658765][T11422] syz-executor.3[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1503.670426][T11422] syz-executor.3[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.419566][T11494] syz-executor.1[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.433484][T11494] syz-executor.1[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.446082][T11494] syz-executor.1[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1505.458681][T11494] syz-executor.1[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1506.476427][T11544] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1506.648229][T11555] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 10 (only 8 groups) [ 1508.729884][T11647] device syzkaller0 left promiscuous mode [ 1508.750702][T11653] bpf_get_probe_write_proto: 16 callbacks suppressed [ 1508.750712][T11653] syz-executor.3[11653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.758761][T11653] syz-executor.3[11653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.781078][T11653] syz-executor.3[11653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1508.795610][T11653] syz-executor.3[11653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.226542][T11687] device syzkaller0 entered promiscuous mode [ 1509.294102][T11691] syz-executor.3[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.294165][T11691] syz-executor.3[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.327128][T11691] syz-executor.3[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.348892][T11691] syz-executor.3[11691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.914963][T11742] syz-executor.2[11742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1509.927778][T11742] syz-executor.2[11742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.349739][T11800] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 31232 (only 8 groups) [ 1510.888381][T11887] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1511.007230][T11896] device syzkaller0 entered promiscuous mode [ 1511.061763][T11913] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1511.097627][T11915] device vxcan1 entered promiscuous mode [ 1512.972222][T12054] device pim6reg1 entered promiscuous mode [ 1513.363331][T12065] device sit0 entered promiscuous mode [ 1513.690258][T12087] device pim6reg1 entered promiscuous mode [ 1514.008068][T12119] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1514.415602][T12133] device pim6reg1 entered promiscuous mode [ 1514.642064][T12148] bpf_get_probe_write_proto: 8 callbacks suppressed [ 1514.642076][T12148] syz-executor.2[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.661634][T12148] syz-executor.2[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.740855][T12148] syz-executor.2[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.752677][T12148] syz-executor.2[12148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1514.818285][T12160] device sit0 left promiscuous mode [ 1514.844694][T12160] device sit0 entered promiscuous mode [ 1515.124717][T12174] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1515.133760][T12174] device syzkaller0 entered promiscuous mode [ 1515.236144][T12186] syz-executor.1[12186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1515.236196][T12186] syz-executor.1[12186] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1515.723517][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.765372][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.775695][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.785882][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.796024][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.806297][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.816447][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.826555][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.836708][T12219] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1515.857660][T12221] device macsec0 entered promiscuous mode [ 1515.865914][T12221] device veth1_macvtap entered promiscuous mode [ 1515.873877][ T830] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1516.004553][T12227] device pim6reg1 entered promiscuous mode [ 1516.184349][T12249] syz-executor.2[12249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1516.184393][T12249] syz-executor.2[12249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1516.400118][T12269] €Â: renamed from pim6reg1 [ 1516.451275][T12283] syz-executor.3[12283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1516.451333][T12283] syz-executor.3[12283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1516.700787][T12328] FAULT_INJECTION: forcing a failure. [ 1516.700787][T12328] name failslab, interval 1, probability 0, space 0, times 0 [ 1516.725267][T12328] CPU: 1 PID: 12328 Comm: syz-executor.4 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1516.736786][T12328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1516.747459][T12328] Call Trace: [ 1516.750593][T12328] dump_stack_lvl+0x1e2/0x24b [ 1516.755112][T12328] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1516.760395][T12328] ? 0xffffffffa0016000 [ 1516.764398][T12328] ? stack_trace_save+0x1c0/0x1c0 [ 1516.769255][T12328] ? __kernel_text_address+0x9b/0x110 [ 1516.774464][T12328] dump_stack+0x15/0x17 [ 1516.778448][T12328] should_fail+0x3c6/0x510 [ 1516.782699][T12328] ? create_task_io_context+0x2c/0x3c0 [ 1516.787992][T12328] __should_failslab+0xa4/0xe0 [ 1516.792604][T12328] should_failslab+0x9/0x20 [ 1516.796936][T12328] kmem_cache_alloc+0x3d/0x2e0 [ 1516.801533][T12328] ? stack_trace_save+0x113/0x1c0 [ 1516.806399][T12328] create_task_io_context+0x2c/0x3c0 [ 1516.811530][T12328] submit_bio_checks+0x1088/0x16d0 [ 1516.816468][T12328] ? submit_bio_noacct+0x1150/0x1150 [ 1516.821583][T12328] ? __kasan_slab_free+0x11/0x20 [ 1516.826475][T12328] ? slab_free_freelist_hook+0xc0/0x190 [ 1516.831849][T12328] ? kmem_cache_free+0xa9/0x1e0 [ 1516.836562][T12328] ? jbd2_journal_stop+0x8be/0xd40 [ 1516.841484][T12328] ? __ext4_journal_stop+0x111/0x1c0 [ 1516.846606][T12328] ? ext4_writepages+0x2804/0x3c00 [ 1516.851554][T12328] ? do_writepages+0x12e/0x270 [ 1516.856153][T12328] ? __filemap_fdatawrite_range+0x33c/0x3f0 [ 1516.861895][T12328] ? file_write_and_wait_range+0x89/0x120 [ 1516.867432][T12328] ? ext4_sync_file+0x1a2/0xa30 [ 1516.872121][T12328] ? vfs_fsync_range+0x17b/0x190 [ 1516.876893][T12328] ? ext4_buffered_write_iter+0x565/0x610 [ 1516.882457][T12328] ? ext4_file_write_iter+0x193/0x1c80 [ 1516.887738][T12328] ? vfs_write+0xb55/0xe70 [ 1516.891993][T12328] ? ksys_write+0x199/0x2c0 [ 1516.896333][T12328] ? __x64_sys_write+0x7b/0x90 [ 1516.900932][T12328] ? do_syscall_64+0x34/0x70 [ 1516.905359][T12328] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1516.911289][T12328] submit_bio_noacct+0x98/0x1150 [ 1516.916040][T12328] ? blk_put_request+0x20/0x20 [ 1516.920657][T12328] ? kmem_cache_free+0xa9/0x1e0 [ 1516.925325][T12328] ? ____kasan_slab_free+0x12c/0x160 [ 1516.930448][T12328] ? __kasan_slab_free+0x11/0x20 [ 1516.935215][T12328] ? slab_free_freelist_hook+0xc0/0x190 [ 1516.940605][T12328] ? memset+0x35/0x40 [ 1516.944416][T12328] ? mpage_release_unused_pages+0x206/0x6b0 [ 1516.950147][T12328] submit_bio+0x1fc/0x6f0 [ 1516.954311][T12328] ? mpage_prepare_extent_to_map+0xd70/0xd70 [ 1516.960127][T12328] ? submit_bio_checks+0x16d0/0x16d0 [ 1516.965253][T12328] ext4_io_submit+0x187/0x240 [ 1516.969762][T12328] ext4_writepages+0x285c/0x3c00 [ 1516.974548][T12328] ? ext4_readpage+0x230/0x230 [ 1516.979147][T12328] ? jbd2_journal_stop+0x8be/0xd40 [ 1516.984085][T12328] ? balance_dirty_pages_ratelimited+0xff0/0xff0 [ 1516.990370][T12328] ? ext4_readpage+0x230/0x230 [ 1516.994968][T12328] do_writepages+0x12e/0x270 [ 1516.999394][T12328] ? __writepage+0x130/0x130 [ 1517.003818][T12328] ? __kasan_check_write+0x14/0x20 [ 1517.008768][T12328] ? _raw_spin_lock+0xa4/0x1b0 [ 1517.013367][T12328] ? _raw_spin_unlock+0x4d/0x70 [ 1517.018071][T12328] __filemap_fdatawrite_range+0x33c/0x3f0 [ 1517.023695][T12328] ? filemap_check_errors+0x150/0x150 [ 1517.028987][T12328] ? generic_perform_write+0x4ce/0x570 [ 1517.034280][T12328] file_write_and_wait_range+0x89/0x120 [ 1517.039662][T12328] ext4_sync_file+0x1a2/0xa30 [ 1517.044170][T12328] ? down_write+0xd7/0x150 [ 1517.048429][T12328] vfs_fsync_range+0x17b/0x190 [ 1517.053029][T12328] ext4_buffered_write_iter+0x565/0x610 [ 1517.058412][T12328] ext4_file_write_iter+0x193/0x1c80 [ 1517.063523][T12328] ? kstrtol_from_user+0x310/0x310 [ 1517.068476][T12328] ? memset+0x35/0x40 [ 1517.072295][T12328] ? avc_policy_seqno+0x1b/0x70 [ 1517.076986][T12328] ? selinux_file_permission+0x2bb/0x560 [ 1517.082456][T12328] ? fsnotify_perm+0x67/0x4e0 [ 1517.087074][T12328] ? ext4_file_read_iter+0x4d0/0x4d0 [ 1517.092197][T12328] ? security_file_permission+0x86/0xb0 [ 1517.097576][T12328] ? iov_iter_init+0x3f/0x120 [ 1517.102093][T12328] vfs_write+0xb55/0xe70 [ 1517.106257][T12328] ? kernel_write+0x3d0/0x3d0 [ 1517.110768][T12328] ? mutex_trylock+0xa0/0xa0 [ 1517.115197][T12328] ? __fdget_pos+0x2e7/0x3a0 [ 1517.119614][T12328] ? ksys_write+0x77/0x2c0 [ 1517.123872][T12328] ksys_write+0x199/0x2c0 [ 1517.128038][T12328] ? __ia32_sys_read+0x90/0x90 [ 1517.132638][T12328] ? debug_smp_processor_id+0x17/0x20 [ 1517.137844][T12328] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1517.143752][T12328] ? debug_smp_processor_id+0x17/0x20 [ 1517.148960][T12328] __x64_sys_write+0x7b/0x90 [ 1517.153377][T12328] do_syscall_64+0x34/0x70 [ 1517.157632][T12328] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1517.163357][T12328] RIP: 0033:0x7f411473ff69 [ 1517.167612][T12328] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1517.187050][T12328] RSP: 002b:00007f4113aba0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1517.195297][T12328] RAX: ffffffffffffffda RBX: 00007f4114876f80 RCX: 00007f411473ff69 [ 1517.203112][T12328] RDX: 0000000000000007 RSI: 0000000020000240 RDI: 0000000000000007 [ 1517.210920][T12328] RBP: 00007f4113aba120 R08: 0000000000000000 R09: 0000000000000000 [ 1517.218731][T12328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1517.226544][T12328] R13: 000000000000000b R14: 00007f4114876f80 R15: 00007ffc50da00d8 [ 1517.864853][T12354] device syzkaller0 entered promiscuous mode [ 1517.890415][T12359] device veth0_vlan left promiscuous mode [ 1517.898897][T12359] device veth0_vlan entered promiscuous mode [ 1518.323475][T12400] device pim6reg1 entered promiscuous mode [ 1518.833941][T12437] device pim6reg1 entered promiscuous mode [ 1519.447794][T12489] device pim6reg1 entered promiscuous mode [ 1520.245792][T12510] device syzkaller0 entered promiscuous mode [ 1520.297886][T12521] device wlan0 entered promiscuous mode [ 1520.387401][T12537] EXT4-fs warning: 24 callbacks suppressed [ 1520.387416][T12537] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 2 (only 8 groups) [ 1520.921108][T12595] device veth0_vlan left promiscuous mode [ 1520.927703][T12595] device veth0_vlan entered promiscuous mode [ 1521.677568][T12689] bpf_get_probe_write_proto: 6 callbacks suppressed [ 1521.677580][T12689] syz-executor.1[12689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1521.697234][T12689] syz-executor.1[12689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1523.553490][T12819] device veth1_macvtap left promiscuous mode [ 1524.123119][T12864] device veth1_macvtap left promiscuous mode [ 1524.129607][T12864] device macsec0 left promiscuous mode [ 1524.829172][T12905] device syzkaller0 entered promiscuous mode [ 1525.086676][T12937] device syzkaller0 left promiscuous mode [ 1525.717599][T12960] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1526.592167][T12981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1526.611772][T12981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1526.631556][T12981] device bridge_slave_0 entered promiscuous mode [ 1526.657456][T12981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1526.664492][T12981] bridge0: port 2(bridge_slave_1) entered disabled state [ 1526.671882][T12981] device bridge_slave_1 entered promiscuous mode [ 1526.792744][T12981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1526.799622][T12981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1526.806714][T12981] bridge0: port 1(bridge_slave_0) entered blocking state [ 1526.813566][T12981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1526.982568][T18824] bridge0: port 1(bridge_slave_0) entered disabled state [ 1527.011732][T18824] bridge0: port 2(bridge_slave_1) entered disabled state [ 1527.030837][T13005] device veth0_vlan left promiscuous mode [ 1527.045227][T13005] device veth0_vlan entered promiscuous mode [ 1527.081070][T18824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1527.098317][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1527.108461][T12660] bridge0: port 1(bridge_slave_0) entered blocking state [ 1527.115351][T12660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1527.152390][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1527.203406][T12660] bridge0: port 2(bridge_slave_1) entered blocking state [ 1527.210370][T12660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1527.289782][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1527.350930][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1527.383941][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1527.428543][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1527.471961][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1527.569941][T12981] device veth0_vlan entered promiscuous mode [ 1527.596469][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1527.604196][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1527.669729][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1527.677104][T12660] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1527.699041][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1527.709062][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1527.723120][T12981] device veth1_macvtap entered promiscuous mode [ 1527.735285][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1527.742924][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1527.751047][T12661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1527.769585][T18824] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1527.788041][T18824] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1528.240183][T13088] syz-executor.1[13088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1528.240238][T13088] syz-executor.1[13088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1528.262273][T13080] ¯Ê®¸}p: renamed from pim6reg1 [ 1528.283796][T13088] syz-executor.1[13088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1528.283854][T13088] syz-executor.1[13088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1529.291474][T13173] syzkaller0: refused to change device tx_queue_len [ 1532.314844][T13360] device vxcan1 entered promiscuous mode [ 1532.403325][T13364] device syzkaller0 entered promiscuous mode [ 1532.509056][T13372] device pim6reg1 entered promiscuous mode [ 1532.605064][T13372] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1532.684088][T13389] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 1532.885947][T13419] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1532.905383][T13419] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1532.923206][T13419] device veth0_to_batadv entered promiscuous mode [ 1532.936527][T13419] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1532.943474][T13419] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 1532.954084][T13424] device veth0_to_batadv left promiscuous mode [ 1532.960579][T13424] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1533.059642][T13437] syz-executor.0[13437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.059699][T13437] syz-executor.0[13437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.081535][T13436] syz-executor.0[13436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.095413][T13436] syz-executor.0[13436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.116934][T13438] syz-executor.0[13438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.129214][T13438] syz-executor.0[13438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.310391][T13473] syz-executor.1[13473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1533.332550][T13473] syz-executor.1[13473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1563.537072][T13503] bridge0: port 1(bridge_slave_0) entered blocking state [ 1563.555573][T13503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1563.562835][T13503] device bridge_slave_0 entered promiscuous mode [ 1563.569684][T13503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.576525][T13503] bridge0: port 2(bridge_slave_1) entered disabled state [ 1563.583736][T13503] device bridge_slave_1 entered promiscuous mode [ 1563.638218][T13503] bridge0: port 2(bridge_slave_1) entered blocking state [ 1563.645060][T13503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1563.652183][T13503] bridge0: port 1(bridge_slave_0) entered blocking state [ 1563.658965][T13503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1633.636219][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1633.642650][ C0] rcu: 0-....: (1 GPs behind) idle=89e/1/0x4000000000000000 softirq=224075/224081 fqs=4877 last_accelerate: e16b/08ab dyntick_enabled: 1 [ 1633.656522][ C0] (t=10000 jiffies g=278821 q=2687) [ 1633.661649][ C0] NMI backtrace for cpu 0 [ 1633.665810][ C0] CPU: 0 PID: 13490 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1633.677348][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1633.687243][ C0] Call Trace: [ 1633.690365][ C0] [ 1633.693072][ C0] dump_stack_lvl+0x1e2/0x24b [ 1633.697574][ C0] ? panic+0x80b/0x80b [ 1633.701481][ C0] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1633.706792][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1633.712071][ C0] ? vprintk_func+0x19d/0x1e0 [ 1633.716583][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 1633.721267][ C0] ? printk+0xd1/0x111 [ 1633.725174][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1633.731074][ C0] dump_stack+0x15/0x17 [ 1633.735067][ C0] nmi_trigger_cpumask_backtrace+0x2b5/0x300 [ 1633.740882][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1633.746872][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 1633.752600][ C0] rcu_dump_cpu_stacks+0x199/0x2b0 [ 1633.757548][ C0] rcu_sched_clock_irq+0xf8a/0x1890 [ 1633.762581][ C0] ? rcutree_dead_cpu+0x340/0x340 [ 1633.767443][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 1633.772478][ C0] update_process_times+0x198/0x200 [ 1633.777513][ C0] tick_sched_timer+0x188/0x240 [ 1633.782307][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 1633.787670][ C0] __hrtimer_run_queues+0x3d7/0xa50 [ 1633.792708][ C0] ? hrtimer_interrupt+0x8b0/0x8b0 [ 1633.797660][ C0] ? clockevents_program_event+0x214/0x2c0 [ 1633.803312][ C0] ? ktime_get_update_offsets_now+0x266/0x280 [ 1633.809196][ C0] hrtimer_interrupt+0x39a/0x8b0 [ 1633.813972][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1633.819692][ C0] asm_call_irq_on_stack+0xf/0x20 [ 1633.824564][ C0] [ 1633.827342][ C0] sysvec_apic_timer_interrupt+0x85/0xe0 [ 1633.832957][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1633.838759][ C0] RIP: 0010:__kasan_check_write+0x15/0x20 [ 1633.844333][ C0] Code: d2 e8 ef ed ff ff 5d c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 48 89 e5 89 f6 48 8b 4d 08 ba 01 00 00 00 e8 cc ed ff ff 5d 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 53 49 89 [ 1633.863743][ C0] RSP: 0018:ffffc900019a6858 EFLAGS: 00000256 [ 1633.869640][ C0] RAX: 0000000000000001 RBX: 1ffff92000334d0c RCX: ffffffff84b16787 [ 1633.877470][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffc900019a6d94 [ 1633.885264][ C0] RBP: ffffc900019a68f0 R08: dffffc0000000000 R09: fffff52000334db3 [ 1633.893075][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1633.900888][ C0] R13: ffffc900019a6d94 R14: 1ffff92000334d10 R15: ffffc900019a6880 [ 1633.908721][ C0] ? _raw_spin_lock_bh+0x97/0x1b0 [ 1633.913567][ C0] ? _raw_spin_lock_bh+0x97/0x1b0 [ 1633.918422][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1633.923477][ C0] ? tipc_sk_rcv+0x1795/0x1e30 [ 1633.928067][ C0] tipc_sk_rcv+0x2d6/0x1e30 [ 1633.932408][ C0] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1633.938039][ C0] ? __stack_depot_save+0x468/0x4d0 [ 1633.943073][ C0] ? kmem_cache_free+0xa9/0x1e0 [ 1633.947759][ C0] ? kasan_set_free_info+0x23/0x40 [ 1633.952719][ C0] ? ____kasan_slab_free+0x121/0x160 [ 1633.957833][ C0] ? __kasan_slab_free+0x11/0x20 [ 1633.962605][ C0] ? slab_free_freelist_hook+0xc0/0x190 [ 1633.967986][ C0] ? kfree_skbmem+0x104/0x170 [ 1633.972616][ C0] ? kfree_skb+0xc1/0x320 [ 1633.976778][ C0] ? tipc_sk_rcv+0x8a1/0x1e30 [ 1633.981287][ C0] ? tipc_node_xmit+0x34b/0xe30 [ 1633.985979][ C0] ? __skb_queue_purge+0x180/0x180 [ 1633.990926][ C0] tipc_node_xmit+0x34b/0xe30 [ 1633.995436][ C0] ? ____kasan_slab_free+0x12c/0x160 [ 1634.000551][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1634.005933][ C0] ? __kasan_slab_free+0x11/0x20 [ 1634.010708][ C0] ? slab_free_freelist_hook+0xc0/0x190 [ 1634.016091][ C0] tipc_node_distr_xmit+0x36a/0x4d0 [ 1634.021126][ C0] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1634.026172][ C0] ? trace_tipc_sk_rej_msg+0x2b/0x6f0 [ 1634.031364][ C0] tipc_sk_rcv+0x177d/0x1e30 [ 1634.035796][ C0] ? __skb_queue_purge+0x180/0x180 [ 1634.040736][ C0] tipc_node_xmit+0x34b/0xe30 [ 1634.045249][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1634.050127][ C0] ? __kernel_text_address+0x9b/0x110 [ 1634.055316][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1634.060699][ C0] ? __kasan_check_write+0x14/0x20 [ 1634.065644][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1634.070941][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 1634.075628][ C0] tipc_sk_filter_rcv+0x1da8/0x3e00 [ 1634.080674][ C0] ? tipc_sk_dump+0xf50/0xf50 [ 1634.085172][ C0] ? __kasan_check_write+0x14/0x20 [ 1634.090121][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1634.094980][ C0] ? kmem_cache_free+0xa9/0x1e0 [ 1634.099669][ C0] tipc_sk_rcv+0x8a1/0x1e30 [ 1634.104017][ C0] ? __skb_queue_purge+0x180/0x180 [ 1634.108961][ C0] ? tipc_sk_filter_rcv+0x3583/0x3e00 [ 1634.114167][ C0] tipc_node_xmit+0x34b/0xe30 [ 1634.118680][ C0] ? tipc_node_get_linkname+0x190/0x190 [ 1634.124067][ C0] tipc_node_distr_xmit+0x36a/0x4d0 [ 1634.129089][ C0] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1634.134126][ C0] tipc_sk_backlog_rcv+0x18b/0x210 [ 1634.139069][ C0] ? tipc_sk_timeout+0xab0/0xab0 [ 1634.143844][ C0] ? __local_bh_enable_ip+0x53/0x80 [ 1634.148878][ C0] ? lock_sock_nested+0x26a/0x300 [ 1634.153753][ C0] __release_sock+0x148/0x410 [ 1634.158254][ C0] sock_setsockopt+0x1e3b/0x2e00 [ 1634.163026][ C0] ? bpf_prog_array_is_empty+0x60/0x80 [ 1634.168322][ C0] ? __sock_set_mark+0x160/0x160 [ 1634.173096][ C0] ? __cgroup_bpf_run_filter_sysctl+0xb40/0xb40 [ 1634.179194][ C0] ? security_socket_setsockopt+0x82/0xb0 [ 1634.184722][ C0] __sys_setsockopt+0x441/0x870 [ 1634.189412][ C0] ? __ia32_sys_recv+0xb0/0xb0 [ 1634.194008][ C0] ? __kasan_check_write+0x14/0x20 [ 1634.198956][ C0] ? switch_fpu_return+0x1e4/0x3c0 [ 1634.203903][ C0] ? fpu__clear_all+0x20/0x20 [ 1634.208418][ C0] __x64_sys_setsockopt+0xbf/0xd0 [ 1634.213278][ C0] do_syscall_64+0x34/0x70 [ 1634.217532][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1634.223259][ C0] RIP: 0033:0x7f0e22f48f69 [ 1634.227599][ C0] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1634.247040][ C0] RSP: 002b:00007f0e222a20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1634.255285][ C0] RAX: ffffffffffffffda RBX: 00007f0e23080050 RCX: 00007f0e22f48f69 [ 1634.263093][ C0] RDX: 0000000000000021 RSI: 0000000000000001 RDI: 0000000000000005 [ 1634.270904][ C0] RBP: 00007f0e22fa66fe R08: 0000000000000004 R09: 0000000000000000 [ 1634.278714][ C0] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000000 [ 1634.286527][ C0] R13: 000000000000000b R14: 00007f0e23080050 R15: 00007fff6335a3b8 [ 1637.046602][T14051] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10340 jiffies s: 190737 root: 0x1/. [ 1637.058788][T14051] rcu: blocking rcu_node structures: [ 1637.063881][T14051] Task dump for CPU 0: [ 1637.067811][T14051] task:syz-executor.1 state:R running task stack: 0 pid:13490 ppid: 10013 flags:0x0000400c [ 1637.078412][T14051] Call Trace: [ 1637.081533][T14051] ? __skb_queue_purge+0x180/0x180 [ 1637.086472][T14051] ? tipc_sk_filter_rcv+0x3583/0x3e00 [ 1637.091758][T14051] ? tipc_node_xmit+0x34b/0xe30 [ 1637.096457][T14051] ? tipc_node_get_linkname+0x190/0x190 [ 1637.101826][T14051] ? tipc_node_distr_xmit+0x36a/0x4d0 [ 1637.107061][T14051] ? tipc_node_xmit_skb+0x1b0/0x1b0 [ 1637.112076][T14051] ? tipc_sk_backlog_rcv+0x18b/0x210 [ 1637.117189][T14051] ? tipc_sk_timeout+0xab0/0xab0 [ 1637.121958][T14051] ? __local_bh_enable_ip+0x53/0x80 [ 1637.126996][T14051] ? lock_sock_nested+0x26a/0x300 [ 1637.131854][T14051] ? __release_sock+0x148/0x410 [ 1637.136562][T14051] ? sock_setsockopt+0x1e3b/0x2e00 [ 1637.141482][T14051] ? bpf_prog_array_is_empty+0x60/0x80 [ 1637.146791][T14051] ? __sock_set_mark+0x160/0x160 [ 1637.151557][T14051] ? __cgroup_bpf_run_filter_sysctl+0xb40/0xb40 [ 1637.157640][T14051] ? security_socket_setsockopt+0x82/0xb0 [ 1637.163182][T14051] ? __sys_setsockopt+0x441/0x870 [ 1637.168067][T14051] ? __ia32_sys_recv+0xb0/0xb0 [ 1637.172638][T14051] ? __kasan_check_write+0x14/0x20 [ 1637.177601][T14051] ? switch_fpu_return+0x1e4/0x3c0 [ 1637.182540][T14051] ? fpu__clear_all+0x20/0x20 [ 1637.187063][T14051] ? __x64_sys_setsockopt+0xbf/0xd0 [ 1637.192090][T14051] ? do_syscall_64+0x34/0x70 [ 1637.196529][T14051] ? entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1782.879742][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 123s! [syz-executor.1:13490] [ 1782.888344][ C0] Modules linked in: [ 1782.892084][ C0] CPU: 0 PID: 13490 Comm: syz-executor.1 Tainted: G W 5.10.214-syzkaller-00114-gd3c4d815bf09 #0 [ 1782.903625][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 1782.913522][ C0] RIP: 0010:__kasan_check_write+0x14/0x20 2024/06/10 20:50:08 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 1782.919076][ C0] Code: 31 d2 e8 ef ed ff ff 5d c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 55 48 89 e5 89 f6 48 8b 4d 08 ba 01 00 00 00 e8 cc ed ff ff <5d> c3 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 57 41 56 53 49 [ 1782.941338][ C0] RSP: 0018:ffffc900019a6850 EFLAGS: 00000256 [ 1782.947232][ C0] RAX: 0000000000000001 RBX: 1ffff92000334d0c RCX: ffffffff84b16787 [ 1782.955055][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffc900019a6d94 [ 1782.962855][ C0] RBP: ffffc900019a6850 R08: dffffc0000000000 R09: fffff52000334db3 [ 1782.970667][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1782.978481][ C0] R13: ffffc900019a6d94 R14: 1f