last executing test programs: 2.702242096s ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0185879, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) (async) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r2}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0185879, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) 2.071846862s ago: executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x1) ioctl$TUNSETLINK(r0, 0x400454ce, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f00000006c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.015119621s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.999119143s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) write$cgroup_pid(r5, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10) 1.977762157s ago: executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 1.95430697s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0) socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x170}, 0x8008) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) 1.880086832s ago: executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.711787557s ago: executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00'}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000010000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r3) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f00000000c0), 0x12) ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}}) sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d50f69edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 1.338647865s ago: executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x7, 0x14}, 0xc) unlink(&(0x7f0000000040)='./file0\x00') r1 = gettid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000100)="bc9bd5b930ca5411339c7d6f65b6c07bc564f7c038d6191a965052908151213699a55cd963d2bd09690a08bb2e112e17c50a2112d9dda0489d374383fa141e4f4d27946a3fc921f55740dc13213241bf550eb474f8a07042d832fc6210c8bb8d47291f1e6ef9f290d32d2d8bae7e75a5ee0237f845248f063651b999e12d321d46b66800b82d0b33bd3b66132aeba07dc7b696b2633616cd7904774f3e9c9fecf72f67bb010e202f176484c586b40ce7742649ec9fd2e066b04201e9114fd35088c0cb7477b8b2d847b3930a857e75790494c81b7322fd22ac6508f8fce79a2e44e7185149e09759320eb6cb87022cd9bc0aab7c8247aa09", &(0x7f0000000200)=""/7, &(0x7f0000000240)="fd9732b063bcd1411bcb903903ae304493cc67804112b7f5c93a52fa631030a240e7c50e9b1eb8d34fcfd6966a3e491e2d5622ce5a3e0fee45fa0d4b45fba79913c8e118cbfb7541c3be73e6cf93", &(0x7f00000002c0)="e86add7a03ccc95a8a9b0c12a370a0fa7bcdaee1c924c15228d6995334cf597a4b7862a8843d33ff89dd2868eb2b13bed2932bf165313b9ade83d0b4b9286f3c7d9ef4d3b137cdd027f2b7367121eddd94897f20c15c7d37d2769c47a2dc4bee4d1a16ce0531ab8637d8c685c4f3a64cc026dde3a6aa1276cb90fd15f4fb251d8882f27a112d75bf0e6fff99fa255cfe871b151befb4002b074fb478e24392b6d010bf3f447e1c40e11a69554eab18e5c026857aa53a8b2a2a1a1199aa43c8443af4de66d660c94c06d9e9885e65e78be8d000dfbdbd2c381aa5b6a606f48bae", 0x80, r0, 0x4}, 0x38) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x67, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xac, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x2, 0xe, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff6, 0x0, 0x0, 0x0, 0xc3e}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x8, 0x100, 0x1}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5d4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff}]}, &(0x7f0000000500)='syzkaller\x00', 0xfffffffe, 0x98, &(0x7f0000000540)=""/152, 0x41100, 0x70, '\x00', r5, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x4, 0x0, &(0x7f0000000900)=[{0x1, 0x5, 0xd, 0x3}, {0x3, 0x3, 0x10, 0x1}, {0x2, 0x1, 0x5, 0x1}, {0x2, 0x4, 0xb}], 0x10, 0x6}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xc, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0x7}, [@alu={0x7, 0x1, 0x5, 0x3, 0x4, 0x18, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xe4b0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @generic={0x3f, 0x2, 0x5, 0x9b7e, 0x3}]}, &(0x7f0000000a80)='GPL\x00', 0x7fff, 0x33, &(0x7f0000000ac0)=""/51, 0x41100, 0x78, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x0, 0x26d4, 0xfff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000b80)=[r0], &(0x7f0000000bc0)=[{0x4, 0x4, 0x3, 0x8}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0x1}, {0x5, 0x4, 0x1, 0xb}, {0x0, 0x5, 0x0, 0xa}], 0x10, 0xfffffff9}, 0x90) unlink(&(0x7f0000000d00)='./file0\x00') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = gettid() r11 = perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x4, 0x1, 0x1, 0x40, 0x0, 0x3c0b, 0x41420, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000d80), 0x9}, 0x4, 0x9, 0xffff, 0x3, 0x2, 0xffff, 0x101, 0x0, 0x80000000, 0x0, 0x7fffffff}, r10, 0x9, r3, 0x8) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000e40)={'batadv_slave_0\x00', 0x2000}) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2f9c3994fa1c7ec0, 0x0, 0x1, 0x1b2, 0x412, r3, 0x3, '\x00', r5, r3, 0x3, 0x4, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001100)={0x6, 0x15, &(0x7f0000000f00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@call={0x85, 0x0, 0x0, 0x6a}, @alu={0x7, 0x1, 0x3, 0x3, 0x8, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000fc0)='GPL\x00', 0x400, 0x0, 0x0, 0x41000, 0x14, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001040)={0x0, 0xf, 0x1000, 0xffffffff}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001080)=[r12, r12, 0x1], &(0x7f00000010c0)=[{0x4, 0x2, 0x2, 0x2}, {0x0, 0x3, 0x1, 0x5}], 0x10, 0x101}, 0x90) sendmsg$unix(r9, &(0x7f0000001340)={&(0x7f00000011c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001240)="37380cb1c1a23596b4c9193561719ba5e9d49c3c073c7741", 0x18}], 0x1, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x60, 0x4040140}, 0x0) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=r6, 0x4) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0xf, &(0x7f0000001380)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r4}, @ldst={0x3, 0x3, 0x2, 0x4, 0x8, 0xfffffffffffffffe, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xe}, @generic={0x0, 0x1, 0x4, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000001400)='syzkaller\x00', 0x6, 0x6a, &(0x7f0000001440)=""/106, 0x41000, 0x44, '\x00', r5, 0x25, r13, 0x8, &(0x7f0000001500)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001540)={0x0, 0x9, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001580)=[r12, r3], &(0x7f00000015c0)=[{0x2, 0x3, 0x5, 0x150bac610521a623}, {0x1, 0x3, 0xf, 0xb}, {0x2, 0x5, 0xc, 0xa}, {0x3, 0x3, 0xd, 0x7}, {0x3, 0x5, 0xa, 0xd}, {0x2, 0x3, 0xa, 0x7}], 0x10, 0x5}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000001700)={'veth0\x00', @local}) write$cgroup_int(r11, &(0x7f0000001740)=0x14, 0x12) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@base={0x1f, 0x2, 0x20, 0x2, 0x1006, r12, 0x80000, '\x00', r5, r13, 0x2, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001880)={{r15, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)=r7}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r0, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b80)={0x18, 0x9, &(0x7f00000018c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r16}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000001940)='syzkaller\x00', 0x4e6a, 0x89, &(0x7f0000001980)=""/137, 0x41100, 0x48, '\x00', r17, 0x0, r13, 0x8, &(0x7f0000001b00)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b40)=[r3, r15, r15, r4, r0, r4, r3, r0], 0x0, 0x10, 0x2}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001c40)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r4, 0x58, &(0x7f0000001c80)}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001dc0)={{r16, 0xffffffffffffffff}, &(0x7f0000001d40), &(0x7f0000001d80)=r14}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001e80)={{r19}, &(0x7f0000001e00), &(0x7f0000001e40)=r18}, 0x20) 1.294777051s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) write$cgroup_int(r3, &(0x7f0000000200)=0x42000000, 0x42400) 1.24196676s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.190783527s ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000ff00000000000000000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='ext4_es_find_extent_range_exit\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000140)='ext4_es_find_extent_range_exit\x00', r1}, 0x10) mkdir(&(0x7f00000001c0)='./file1\x00', 0x7000000) 1.098672941s ago: executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x67, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xfffff000, 0xe80, 0x0, &(0x7f0000000880)="61df712bc884fed5722780b686dd", 0x0, 0x8000, 0x0, 0xfffffffffffffeca, 0x0, &(0x7f0000000000), &(0x7f0000000800)="ffe200004e379b19393a41afde6b0b1235c1278ebf59a5d4d697bc199e060b675b46d4ff37c7f91ceaa6790cd8570f080b0d2375918cd7dfcf26aa90dc6a5617be488475b892958512c8e814c24d7efc26f9f2512dec8c759773c42a2fca2735984613809a78eb", 0x0, 0x2}, 0x28) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000100000007800000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7030000000000008500000031000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000001b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000b00)=""/4096, 0x117, 0x1000, 0x1, 0x3af}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x0, 0x0}, 0x8) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="f3080100fbffffff6bb2000004000000850000008f000000"], &(0x7f0000000080)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, 0x1b, r7, 0x8, &(0x7f00000005c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xc, 0x100, 0x100}, 0x10, r8, 0x0, 0x4, &(0x7f00000008c0)=[r9, r1, r1], &(0x7f0000000900)=[{0x1, 0x3, 0xb, 0x8}, {0x3, 0x3, 0x3, 0x6}, {0x5, 0x5, 0x8, 0x5}, {0x4, 0x3, 0xa, 0x7}], 0x10, 0xfff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000740), &(0x7f0000000780)='%pi6 \x00'}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x36, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xb9, 0x4, 0x6, 0x1005, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x5}, 0x48) write$cgroup_int(r12, &(0x7f0000000680), 0x12) 1.006737765s ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) write$cgroup_pid(r5, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10) 1.003836996s ago: executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 982.003659ms ago: executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200}) 969.516041ms ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0) socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1400000000000000000000000200000007000000000000001100001900000000000000000100000005000000000000006c00000000000000000000000700000089170effffffff00000000e00000020a010102ac1414bb8907ca0a010101441441816401010100000042640101010000000907073be0100001070898680ea1d23a44181e5000000004000006a300000002000000090000000100000000000000140000000000000000000000010000000080000000000000b8000000000000000000000007000000443400000000009aace000000200000004e000000200000009e000000200010001e0000002000000040a01010100000fff891fe47f000001e0000002ac1414bb64010101ac1414bbe0000002ac1e0101444c6f53ac14144400000001ac14147f00000400ac1414aa0000bfec6401010000000400ac14141800000033e000000100008001ac1414aa00000006ffffffff00000101ac1414aa0000000900"], 0x170}, 0x8008) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r6, @ANYRES8=r5], 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20) 825.617393ms ago: executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180100000000000000000000000000008500000008000000660000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xad, &(0x7f0000000000)=""/173}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$MAP_CREATE(0x1800, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48) 720.18641ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 716.67152ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x8800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00'}, 0x90) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89b0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000e4000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 671.488997ms ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) recvmsg$unix(r2, &(0x7f0000000280)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)=""/124, 0x7c}], 0x1, &(0x7f0000000240)}, 0x20000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8360, 0x0, @perf_config_ext, 0x0, 0xf7fe}, 0x0, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x1, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580), &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x55, &(0x7f0000000600)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000001200), 0x8, 0xd9, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r7}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x53}, @ringbuf_output]}, &(0x7f0000000680)='GPL\x00'}, 0x90) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r7, 0x49}, 0x38) 643.281631ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000eef8b90000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x0, 0x0, 0x1f, 0x1012, 0xffffffffffffffff, 0x7}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x0, 0x0, 0x1f, 0x1012, 0xffffffffffffffff, 0x7}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socketpair(0x18, 0x0, 0x2, 0x0) (async) socketpair(0x18, 0x0, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000040), &(0x7f0000000340)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f00000004c0)="650753d05c889b4bed38a12256d7d6f38f3eb8b950f2632d0494a77ad282e8a6559a81389e79b8d54a6e13a5a27fd1dc193b464f81c6ed7586a633511e5910f9f306ab54da69a3f4d874cb6802dd168ee4f35f4895ba904aba43f1ac240110fe55adbf2bec51d653cc8308545ab3a2896ab000e94fa800e02ca81798877ae1f0bfbcb65045cb548c40efdf8fd729aa9bf391e5209e39783d5afcb764c091f0cae6b64e613ecc029cd498365299c1ec7aad7cc545ae371f3a20b774e33e186af86d82a0a644b6332d2724aea9", &(0x7f00000002c0)=""/106, &(0x7f00000005c0)="f43138b8462510947b45d9d25879aee81ef59a49f4e36bec7e8a438bd4fe8f25f5064bebe76bb09be432e4cb1c9536a716b405e528071ec916410ca043ff071a09dfb0ed2726513c2444359d0d78fe84849f9acff9896b2a184aad4685ee261006cde37acecae3c79046739b9ee8f260f0657fb41bb4c1308b9db879e2faee3ec3b023aa83d3213dc9ac9b4a930de540464fbb1a0e21cebe", &(0x7f0000000680)="c3e57b5064537bd9088edff022006ab9c1c1184436a777721b9a731363d6fc26ee9e98285be4907b49dce3cf8c4b26317dd2a1303a858331a2bcc090c59d50e2da524d52b3cbb8512f883eb78d33ae0402075b4fcc3c16859e98fab252bd78a5e235720acab66a215cdd39bf554cc647998e000f58c762617aa3d3892272c4fe890582c70ee93ac907ca7cc9f0c6b4e87b22cdc1b6cfcd72065d594472147d0234fd5ca36bdbeddead0847db0739c0dd99906d67f62a9dc55d70c9e9f1cca78ea19f10962c408092541f43f9236fa4772858d19bca4fc3bf702ee371dcc2cf4106", 0x0, r3, 0x4}, 0x38) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 604.801657ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x7fe2, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x4, &(0x7f0000000bc0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x52}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x33, 0x7, [@typedef={0x9}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x43, 0x10000}], "bffda3"}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000400)=""/21, 0x53, 0x15, 0x0, 0xb6d}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={r1, 0x20, &(0x7f0000000540)={&(0x7f00000005c0)=""/236, 0xec, 0x0, &(0x7f00000006c0)=""/171, 0xab}}, 0x10) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000010000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000600)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x0, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x3}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_journal_start\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8992, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000014c0)=""/4094, 0x0, 0xffe}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xa4, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xc5, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 538.675477ms ago: executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0) socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x170}, 0x8008) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) 510.425202ms ago: executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 472.250067ms ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 460.658639ms ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0) socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1400000000000000000000000200000007000000000000001100001900000000000000000100000005000000000000006c00000000000000000000000700000089170effffffff00000000e00000020a010102ac1414bb8907ca0a010101441441816401010100000042640101010000000907073be0100001070898680ea1d23a44181e5000000004000006a300000002000000090000000100000000000000140000000000000000000000010000000080000000000000b8000000000000000000000007000000443400000000009aace000000200000004e000000200000009e000000200010001e0000002000000040a01010100000fff891fe47f000001e0000002ac1414bb64010101ac1414bbe0000002ac1e0101444c6f53ac14144400000001ac14147f00000400ac1414aa0000bfec6401010000000400ac14141800000033e000000100008001ac1414aa00000006ffffffff00000101ac1414aa0000000900"], 0x170}, 0x8008) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) 93.863195ms ago: executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 50.562652ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10) write$cgroup_pid(r5, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10) 0s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x1600, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x4}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.168' (ED25519) to the list of known hosts. 2024/06/10 03:46:46 fuzzer started 2024/06/10 03:46:46 dialing manager at 10.128.0.163:30010 [ 20.310950][ T30] audit: type=1400 audit(1717991206.560:66): avc: denied { node_bind } for pid=282 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 20.318980][ T30] audit: type=1400 audit(1717991206.560:67): avc: denied { name_bind } for pid=282 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 20.350797][ T30] audit: type=1400 audit(1717991206.600:69): avc: denied { integrity } for pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 20.355063][ T291] cgroup: Unknown subsys name 'net' [ 20.381591][ T291] cgroup: Unknown subsys name 'devices' [ 20.387469][ T30] audit: type=1400 audit(1717991206.600:70): avc: denied { mounton } for pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.413183][ T30] audit: type=1400 audit(1717991206.600:71): avc: denied { mount } for pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.435482][ T30] audit: type=1400 audit(1717991206.600:68): avc: denied { mounton } for pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.441661][ T298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.460364][ T30] audit: type=1400 audit(1717991206.630:72): avc: denied { mount } for pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 20.491612][ T30] audit: type=1400 audit(1717991206.630:73): avc: denied { unmount } for pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.494352][ T294] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 20.511583][ T30] audit: type=1400 audit(1717991206.640:74): avc: denied { setattr } for pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.542573][ T30] audit: type=1400 audit(1717991206.720:75): avc: denied { relabelto } for pid=298 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.639394][ T291] cgroup: Unknown subsys name 'hugetlb' [ 20.644985][ T291] cgroup: Unknown subsys name 'rlimit' 2024/06/10 03:46:47 starting 5 executor processes [ 21.812444][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.819341][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.826632][ T307] device bridge_slave_0 entered promiscuous mode [ 21.844981][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.851856][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.859116][ T307] device bridge_slave_1 entered promiscuous mode [ 21.906892][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.913852][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.921093][ T309] device bridge_slave_0 entered promiscuous mode [ 21.933464][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.940588][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.947927][ T309] device bridge_slave_1 entered promiscuous mode [ 21.976383][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.983258][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.990583][ T311] device bridge_slave_0 entered promiscuous mode [ 22.003718][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.010594][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.017874][ T310] device bridge_slave_0 entered promiscuous mode [ 22.024589][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.031566][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.038813][ T311] device bridge_slave_1 entered promiscuous mode [ 22.055089][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.061955][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.069207][ T310] device bridge_slave_1 entered promiscuous mode [ 22.155382][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.162328][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.169544][ T312] device bridge_slave_0 entered promiscuous mode [ 22.176209][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.183155][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.190645][ T312] device bridge_slave_1 entered promiscuous mode [ 22.301787][ T309] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.308681][ T309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.315790][ T309] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.322639][ T309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.339723][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.346567][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.354042][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.360823][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.371644][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.378593][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.385689][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.392494][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.429235][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.436174][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.443386][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.450162][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.465448][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.472339][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.479433][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.486196][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.507350][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.514670][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.522337][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.529313][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.536217][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.543606][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.550632][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.557660][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.565774][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.573998][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.581035][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.608951][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.616204][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.624830][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.631669][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.639469][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.647544][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.654390][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.661654][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.669429][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.690683][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.698142][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.705424][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.712839][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.720922][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.727798][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.735233][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.743256][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.750098][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.779765][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.794359][ T310] device veth0_vlan entered promiscuous mode [ 22.808843][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.816775][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.824631][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.832610][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.840405][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.848163][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.856187][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.864217][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.871070][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.878307][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.886375][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.894379][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.901223][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.908474][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.916234][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.924172][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.932063][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.939972][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.947965][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.957304][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.964543][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.987934][ T309] device veth0_vlan entered promiscuous mode [ 22.995132][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.002677][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.010045][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.018903][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.026806][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.033578][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.040771][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.048899][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.056804][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.063683][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.070935][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.079130][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.087248][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.095429][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.103365][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.111282][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.120271][ T310] device veth1_macvtap entered promiscuous mode [ 23.135679][ T307] device veth0_vlan entered promiscuous mode [ 23.144273][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.151661][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.159084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.166920][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.175241][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.183369][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.191576][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.199332][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.207430][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.214703][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.233454][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.241759][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.249870][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.261928][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.270062][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.278322][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.286264][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.295405][ T309] device veth1_macvtap entered promiscuous mode [ 23.311068][ T307] device veth1_macvtap entered promiscuous mode [ 23.324075][ T312] device veth0_vlan entered promiscuous mode [ 23.331262][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.339467][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.346802][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.354468][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.362602][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.370538][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.378009][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.386081][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.394324][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.402320][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.410516][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.418597][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.438494][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.451450][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.460150][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.468370][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.484310][ T312] device veth1_macvtap entered promiscuous mode [ 23.501451][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.553963][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.557203][ C1] hrtimer: interrupt took 34861 ns [ 23.562567][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.576096][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.584826][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.596581][ T311] device veth0_vlan entered promiscuous mode [ 23.619066][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.631625][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.673942][ T311] device veth1_macvtap entered promiscuous mode [ 23.695038][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.711152][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.738471][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.771991][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.799692][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.826097][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.852084][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.299393][ T356] geneve1: tun_chr_ioctl cmd 1074025692 [ 25.058720][ T393] syz-executor.2[393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.058818][ T393] syz-executor.2[393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.651969][ T411] geneve1: tun_chr_ioctl cmd 1074025692 [ 26.033656][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 26.033673][ T30] audit: type=1400 audit(1717991212.280:108): avc: denied { setopt } for pid=432 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.466292][ T454] bond_slave_1: mtu greater than device maximum [ 27.303300][ T30] audit: type=1400 audit(1717991213.550:109): avc: denied { read write } for pid=483 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.383060][ T30] audit: type=1400 audit(1717991213.550:110): avc: denied { open } for pid=483 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.408676][ T30] audit: type=1400 audit(1717991213.580:111): avc: denied { ioctl } for pid=483 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.459686][ T30] audit: type=1400 audit(1717991214.700:112): avc: denied { write } for pid=536 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.515984][ T30] audit: type=1400 audit(1717991214.760:113): avc: denied { create } for pid=536 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 28.837817][ T30] audit: type=1400 audit(1717991215.090:114): avc: denied { relabelfrom } for pid=564 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.879738][ T30] audit: type=1400 audit(1717991215.090:115): avc: denied { relabelto } for pid=564 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 29.694709][ T30] audit: type=1400 audit(1717991215.940:116): avc: denied { create } for pid=580 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 29.826268][ T599] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.833339][ T599] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.810835][ T618] device pim6reg1 entered promiscuous mode [ 31.152044][ T637] syz-executor.2[637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.152142][ T637] syz-executor.2[637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.312161][ T667] syz-executor.0[667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.329702][ T667] syz-executor.0[667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.329709][ T664] device pim6reg1 entered promiscuous mode [ 32.425576][ T670] syz-executor.1 (670) used greatest stack depth: 21616 bytes left [ 32.497688][ T30] audit: type=1400 audit(1717991218.750:117): avc: denied { create } for pid=693 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 34.392188][ T30] audit: type=1400 audit(1717991220.640:118): avc: denied { create } for pid=795 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.843990][ T808] device pim6reg1 entered promiscuous mode [ 35.515678][ T850] device pim6reg1 entered promiscuous mode [ 37.027176][ C0] sched: RT throttling activated [ 39.157016][ T885] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.200398][ T885] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.222691][ T885] device bridge_slave_0 entered promiscuous mode [ 39.259178][ T312] syz-executor.4 (312) used greatest stack depth: 20880 bytes left [ 39.294810][ T885] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.375145][ T885] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.451448][ T885] device bridge_slave_1 entered promiscuous mode [ 39.816943][ T925] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 39.892980][ T885] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.899877][ T885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.907039][ T885] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.913853][ T885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.997057][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.010727][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.028713][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.078102][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.127469][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.162321][ T902] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.169223][ T902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.207636][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.215784][ T902] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.222778][ T902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.230333][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.242698][ T957] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 40.253463][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.269120][ T958] device veth0_vlan left promiscuous mode [ 40.275122][ T958] device veth0_vlan entered promiscuous mode [ 40.297256][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.305309][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.317022][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.346778][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.355293][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.399126][ T885] device veth0_vlan entered promiscuous mode [ 40.409212][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.409255][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.417005][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.429333][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.455721][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.455782][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.471847][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.483550][ T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.539580][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.647977][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.657431][ T10] device bridge_slave_1 left promiscuous mode [ 40.663464][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.735902][ T10] device bridge_slave_0 left promiscuous mode [ 40.782788][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.813599][ T10] device veth1_macvtap left promiscuous mode [ 40.874803][ T10] device veth0_vlan left promiscuous mode [ 41.356218][ T885] device veth1_macvtap entered promiscuous mode [ 41.436495][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.447985][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.456009][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.522651][ T997] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 41.551057][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.559160][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.567419][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.575589][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.345278][ T1036] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 43.261495][ T1083] device pim6reg1 entered promiscuous mode [ 44.327449][ T1129] device pim6reg1 entered promiscuous mode [ 44.542943][ T1145] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 46.279496][ T1206] device pim6reg1 entered promiscuous mode [ 48.011217][ T30] audit: type=1400 audit(1717991234.260:119): avc: denied { create } for pid=1274 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 48.055815][ T1273] device sit0 entered promiscuous mode [ 48.457222][ T1301] device pim6reg1 entered promiscuous mode [ 49.419941][ T384] device bridge_slave_1 left promiscuous mode [ 49.425996][ T384] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.443637][ T384] device bridge_slave_0 left promiscuous mode [ 49.449688][ T384] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.457858][ T384] device veth1_macvtap left promiscuous mode [ 49.463744][ T384] device veth0_vlan left promiscuous mode [ 49.942299][ T1318] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.975511][ T1318] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.988875][ T1318] device bridge_slave_0 entered promiscuous mode [ 49.996453][ T1318] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.003707][ T1318] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.040858][ T1318] device bridge_slave_1 entered promiscuous mode [ 50.466335][ T1351] device veth0_vlan left promiscuous mode [ 50.479295][ T1351] device veth0_vlan entered promiscuous mode [ 50.526375][ T890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 50.535278][ T890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 50.542729][ T890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 50.691492][ C0] ------------[ cut here ]------------ [ 50.696781][ C0] WARNING: CPU: 0 PID: 1348 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80 [ 50.700388][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.705895][ C0] Modules linked in: [ 50.705917][ C0] CPU: 0 PID: 1348 Comm: syz-executor.1 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 50.713512][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.716650][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 50.716670][ C0] RIP: 0010:__local_bh_enable_ip+0x6c/0x80 [ 50.749653][ C0] Code: 66 8b 05 27 89 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 99 86 bf 7e 85 c0 74 02 5d c3 e8 9a 9a bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48 [ 50.769072][ C0] RSP: 0018:ffffc900000077c0 EFLAGS: 00010006 [ 50.774973][ C0] RAX: 0000000080010204 RBX: ffff888100b9d558 RCX: dffffc0000000000 [ 50.782871][ C0] RDX: 0000000080010204 RSI: 0000000000000201 RDI: ffffffff83fe68e2 [ 50.790771][ C0] RBP: ffffc900000077c0 R08: ffffffff83fe673f R09: 0000000000000003 [ 50.798582][ C0] R10: fffff52000000eec R11: dffffc0000000001 R12: 0000000000000000 [ 50.806393][ C0] R13: dffffc0000000000 R14: 00000000fffffffe R15: ffff88810ac2c710 [ 50.814205][ C0] FS: 00007fa34b8356c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 50.822969][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.829394][ C0] CR2: 000000000000000b CR3: 0000000125f9f000 CR4: 00000000003506b0 [ 50.837206][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.845018][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.852841][ C0] Call Trace: [ 50.855952][ C0] [ 50.858645][ C0] ? show_regs+0x58/0x60 [ 50.862725][ C0] ? __warn+0x160/0x2f0 [ 50.866716][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 50.871753][ C0] ? report_bug+0x3d9/0x5b0 [ 50.876097][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 50.881124][ C0] ? handle_bug+0x41/0x70 [ 50.885291][ C0] ? exc_invalid_op+0x1b/0x50 [ 50.889805][ C0] ? asm_exc_invalid_op+0x1b/0x20 [ 50.894663][ C0] ? sock_hash_delete_elem+0xff/0x2f0 [ 50.899871][ C0] ? sock_hash_delete_elem+0x2a2/0x2f0 [ 50.905169][ C0] ? __local_bh_enable_ip+0x6c/0x80 [ 50.910201][ C0] _raw_spin_unlock_bh+0x51/0x60 [ 50.914971][ C0] sock_hash_delete_elem+0x2a2/0x2f0 [ 50.920096][ C0] bpf_prog_bc4ba9860fbb0da4+0x3e/0x54c [ 50.925475][ C0] bpf_trace_run4+0x13f/0x270 [ 50.930078][ C0] ? bpf_trace_run3+0x250/0x250 [ 50.934763][ C0] ? __alloc_pages+0x8f0/0x8f0 [ 50.939366][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 50.944658][ C0] __traceiter_mm_page_alloc+0x3a/0x60 [ 50.949952][ C0] __alloc_pages+0x3cb/0x8f0 [ 50.954378][ C0] ? prep_new_page+0x110/0x110 [ 50.958978][ C0] ? __this_cpu_preempt_check+0x13/0x20 [ 50.964361][ C0] ? hrtimer_forward+0x1a6/0x2c0 [ 50.969135][ C0] new_slab+0x9a/0x4e0 [ 50.973044][ C0] ___slab_alloc+0x39e/0x830 [ 50.977477][ C0] ? cpu_clock_event_read+0x50/0x50 [ 50.982498][ C0] ? __sigqueue_alloc+0x130/0x200 [ 50.987361][ C0] ? __sigqueue_alloc+0x130/0x200 [ 50.992221][ C0] __slab_alloc+0x4a/0x90 [ 50.996386][ C0] ? __sigqueue_alloc+0x130/0x200 [ 51.001246][ C0] kmem_cache_alloc+0x134/0x200 [ 51.005938][ C0] __sigqueue_alloc+0x130/0x200 [ 51.010622][ C0] __send_signal+0x1fd/0xcb0 [ 51.015048][ C0] send_signal+0x43a/0x590 [ 51.019301][ C0] do_send_sig_info+0xde/0x230 [ 51.023909][ C0] group_send_sig_info+0x113/0x460 [ 51.028848][ C0] ? __lock_task_sighand+0x100/0x100 [ 51.033975][ C0] ? clockevents_program_event+0x22f/0x300 [ 51.039611][ C0] do_bpf_send_signal+0x8c/0x150 [ 51.044385][ C0] irq_work_run_list+0x1c2/0x290 [ 51.049160][ C0] ? irq_work_run+0xf0/0xf0 [ 51.053522][ C0] irq_work_run+0x69/0xf0 [ 51.057663][ C0] __sysvec_irq_work+0x63/0x1b0 [ 51.062355][ C0] sysvec_irq_work+0x92/0xb0 [ 51.066863][ C0] [ 51.069642][ C0] [ 51.072417][ C0] asm_sysvec_irq_work+0x1b/0x20 [ 51.077192][ C0] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70 [ 51.082833][ C0] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57 [ 51.102277][ C0] RSP: 0018:ffffc9000380fbb8 EFLAGS: 00000246 [ 51.108179][ C0] RAX: 0000000000000001 RBX: ffff88813f9fbd40 RCX: dffffc0000000000 [ 51.116074][ C0] RDX: ffffc9000170f000 RSI: 000000000003ffff RDI: 0000000000000001 [ 51.123887][ C0] RBP: ffffc9000380fbc0 R08: ffffffff81456d9a R09: fffff52000701fc0 [ 51.131702][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88813f9fbd40 [ 51.139507][ C0] R13: ffff88813f9fc160 R14: 0000000000000021 R15: dffffc0000000000 [ 51.147326][ C0] ? get_signal+0x151a/0x1630 [ 51.151836][ C0] ? _raw_spin_unlock_irq+0x41/0x70 [ 51.156870][ C0] get_signal+0x1562/0x1630 [ 51.161212][ C0] arch_do_signal_or_restart+0xbd/0x1680 [ 51.166676][ C0] ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0 [ 51.172926][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 51.177877][ C0] ? __kasan_check_write+0x14/0x20 [ 51.182821][ C0] ? _copy_from_user+0x96/0xd0 [ 51.187423][ C0] ? restore_altstack+0x274/0x400 [ 51.192283][ C0] ? get_sigframe_size+0x10/0x10 [ 51.197054][ C0] ? __ia32_sys_sigaltstack+0x70/0x70 [ 51.202266][ C0] ? __do_sys_rt_sigreturn+0x160/0x1e0 [ 51.207604][ C0] exit_to_user_mode_loop+0xa0/0xe0 [ 51.212589][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 51.217887][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 51.223265][ C0] do_syscall_64+0x49/0xb0 [ 51.227521][ C0] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 51.233192][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 51.238889][ C0] RIP: 0033:0x7fa34c465880 [ 51.243146][ C0] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31 [ 51.262587][ C0] RSP: 002b:00007fa34b8342b8 EFLAGS: 00000283 [ 51.268486][ C0] RAX: 0000000000000000 RBX: 00007fa34b834dc0 RCX: 00007fa34c5bbbc0 [ 51.276297][ C0] RDX: 00007fa34b8342c0 RSI: 00007fa34b8343f0 RDI: 000000000000000b [ 51.284194][ C0] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 51.292008][ C0] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 51.299817][ C0] R13: 00007fa34b834f40 R14: 9999999999999999 R15: 0000000000000000 [ 51.307634][ C0] [ 51.310492][ C0] ---[ end trace 78a9421c7c2f46e4 ]--- [ 51.360482][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.385114][ T902] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.392013][ T902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.402869][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.477504][ T902] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.484365][ T902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.537385][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.563668][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.598020][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.640865][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.650076][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.666403][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.682763][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.691447][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.701973][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.710022][ T1318] device veth0_vlan entered promiscuous mode [ 51.734124][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 51.759011][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.767476][ T1318] device veth1_macvtap entered promiscuous mode [ 51.800944][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 51.835650][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 51.843918][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 51.852109][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 51.860182][ T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.500109][ T1398] device syzkaller0 entered promiscuous mode [ 57.477699][ T1567] device pim6reg1 entered promiscuous mode [ 57.671739][ T30] audit: type=1400 audit(1717991243.920:120): avc: denied { tracepoint } for pid=1593 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 58.283348][ T1633] device veth0_vlan left promiscuous mode [ 58.293864][ T1633] device veth0_vlan entered promiscuous mode [ 58.321613][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.330677][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.342093][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 58.371903][ T1635] device wg2 entered promiscuous mode [ 58.499184][ T1639] ªªªªªª: renamed from vlan0 [ 58.921467][ T1660] device wg2 entered promiscuous mode [ 58.982231][ T1663] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 59.099781][ T1681] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 59.145764][ T30] audit: type=1400 audit(1717991245.390:121): avc: denied { create } for pid=1686 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 59.325772][ T1696] device veth0_vlan left promiscuous mode [ 59.340515][ T1696] device veth0_vlan entered promiscuous mode [ 59.434374][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.442616][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 59.453216][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.463862][ T1704] device veth0_vlan left promiscuous mode [ 59.505937][ T1704] device veth0_vlan entered promiscuous mode [ 59.528575][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 59.540079][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 59.560734][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.609430][ T1709] device wg2 entered promiscuous mode [ 59.767501][ T1732] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 59.884427][ T1736] device bridge0 entered promiscuous mode [ 60.222728][ T1769] device wg2 entered promiscuous mode [ 60.723265][ T1803] syz-executor.1[1803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.723339][ T1803] syz-executor.1[1803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.912151][ T1811] device wg2 left promiscuous mode [ 60.994178][ T1811] device wg2 entered promiscuous mode [ 61.728748][ T1866] device veth0_vlan left promiscuous mode [ 61.742790][ T1866] device veth0_vlan entered promiscuous mode [ 61.764791][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.808320][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.856500][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.694122][ T1927] device wg2 left promiscuous mode [ 65.129381][ T30] audit: type=1400 audit(1717991251.380:122): avc: denied { ioctl } for pid=2072 comm="syz-executor.1" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.648943][ T2099] syz-executor.4[2099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.649017][ T2099] syz-executor.4[2099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.254017][ T2141] syz-executor.3[2141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.265836][ T2141] syz-executor.3[2141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.387628][ T2144] device sit0 entered promiscuous mode [ 66.939218][ T2154] device wg2 entered promiscuous mode [ 67.166321][ T2176] device sit0 entered promiscuous mode [ 67.876297][ T30] audit: type=1400 audit(1717991254.120:123): avc: denied { create } for pid=2192 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 68.372433][ T2219] device sit0 left promiscuous mode [ 68.509756][ T2219] device sit0 entered promiscuous mode [ 69.652394][ T2275] device sit0 entered promiscuous mode [ 69.991266][ T2280] syz-executor.4[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.991342][ T2280] syz-executor.4[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.212542][ T2293] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 70.693134][ T2314] device sit0 left promiscuous mode [ 70.828639][ T2315] device sit0 entered promiscuous mode [ 72.193618][ T2345] device syzkaller0 entered promiscuous mode [ 74.928376][ T2470] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 76.322747][ T2567] vlan0: mtu less than device minimum [ 78.590205][ T2658] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups) [ 78.761030][ T30] audit: type=1400 audit(1717991265.010:124): avc: denied { create } for pid=2681 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 78.847572][ T30] audit: type=1400 audit(1717991265.100:125): avc: denied { read } for pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 82.060003][ T30] audit: type=1400 audit(1717991268.300:126): avc: denied { create } for pid=2811 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 82.351287][ T2816] device syzkaller0 entered promiscuous mode [ 82.675476][ T2824] device veth0_vlan left promiscuous mode [ 82.681402][ T2824] device veth0_vlan entered promiscuous mode [ 82.704304][ T2836] device pim6reg1 entered promiscuous mode [ 82.710914][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.719726][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.728996][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.366795][ T2860] device sit0 left promiscuous mode [ 83.832198][ T2878] device syzkaller0 entered promiscuous mode [ 84.303249][ T2888] device syzkaller0 entered promiscuous mode [ 84.688862][ T2920] syz-executor.0[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.688930][ T2920] syz-executor.0[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.718033][ T2921] syz-executor.0[2921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.777245][ T2921] syz-executor.0[2921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.365840][ T2947] device syzkaller0 entered promiscuous mode [ 85.654968][ T2949] device syzkaller0 entered promiscuous mode [ 85.872377][ T2962] device syzkaller0 entered promiscuous mode [ 86.428950][ T2991] syz-executor.1[2991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.429014][ T2991] syz-executor.1[2991] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.763969][ T2998] device syzkaller0 entered promiscuous mode [ 87.047107][ T3013] device syzkaller0 entered promiscuous mode [ 88.275476][ T3071] device wg2 entered promiscuous mode [ 88.509853][ T3065] device syzkaller0 entered promiscuous mode [ 89.680872][ T30] audit: type=1400 audit(1717991275.930:127): avc: denied { create } for pid=3110 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 90.510341][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.510408][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.522826][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.534548][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.654868][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.687329][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.747434][ T3155] device wg2 left promiscuous mode [ 92.492889][ T3245] syz-executor.0[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.492951][ T3245] syz-executor.0[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.535742][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.572258][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.827914][ T3279] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 93.121479][ T3313] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 93.382482][ T3334] device wg2 left promiscuous mode [ 93.470516][ T30] audit: type=1400 audit(1717991279.720:128): avc: denied { create } for pid=3339 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 93.860505][ T30] audit: type=1400 audit(1717991280.110:129): avc: denied { create } for pid=3377 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.893171][ T3378] device syzkaller0 entered promiscuous mode [ 94.091161][ T3402] device syzkaller0 entered promiscuous mode [ 95.729374][ T3498] bpf_get_probe_write_proto: 2 callbacks suppressed [ 95.729390][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.735946][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.748693][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.765388][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.792527][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.837484][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.629107][ T30] audit: type=1400 audit(1717991282.880:130): avc: denied { create } for pid=3593 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 96.882501][ T30] audit: type=1400 audit(1717991283.130:131): avc: denied { create } for pid=3615 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 96.992357][ T3623] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled. [ 98.265563][ T3695] device veth1_macvtap left promiscuous mode [ 98.274790][ T3695] device veth1_macvtap entered promiscuous mode [ 98.281312][ T3695] device macsec0 entered promiscuous mode [ 99.042187][ T3762] device veth0_vlan left promiscuous mode [ 99.065050][ T3762] device veth0_vlan entered promiscuous mode [ 99.648343][ T3824] syz-executor.3[3824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.648399][ T3824] syz-executor.3[3824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.073350][ T30] audit: type=1400 audit(1717991287.320:132): avc: denied { create } for pid=3926 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 102.079721][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.079782][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.096673][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.108389][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.145102][ T4000] sit0: mtu greater than device maximum [ 102.175346][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.175433][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.378954][ T4078] device syzkaller0 entered promiscuous mode [ 103.662604][ T4117] device pim6reg1 entered promiscuous mode [ 104.320361][ T4159] device syzkaller0 entered promiscuous mode [ 105.219242][ T4214] device syzkaller0 entered promiscuous mode [ 105.253119][ T4221] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further [ 105.515891][ T30] audit: type=1400 audit(1717991291.750:133): avc: denied { create } for pid=4245 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 105.753438][ T4279] syz-executor.1[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.753498][ T4279] syz-executor.1[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.777445][ T4278] syz-executor.1[4278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.794626][ T4278] syz-executor.1[4278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.807044][ T4275] device syzkaller0 entered promiscuous mode [ 107.786125][ T4413] device bridge0 entered promiscuous mode [ 114.630580][ T4636] device syzkaller0 entered promiscuous mode [ 116.113051][ T4710] device syzkaller0 entered promiscuous mode [ 117.973418][ T4799] ªªªªªª: renamed from vlan0 [ 120.858012][ T4912] tap0: tun_chr_ioctl cmd 1074025678 [ 120.863311][ T4912] tap0: group set to 0 [ 121.032932][ T4928] device veth0_vlan left promiscuous mode [ 121.084997][ T4928] device veth0_vlan entered promiscuous mode [ 121.175335][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.184778][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 121.195633][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.947159][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 222.953601][ C0] rcu: 0-...!: (10001 ticks this GP) idle=619/1/0x4000000000000000 softirq=18776/18776 fqs=0 last_accelerate: ba7f/e19a dyntick_enabled: 1 [ 222.967652][ C0] (t=10001 jiffies g=18777 q=132) [ 222.972583][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10000 jiffies! g18777 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 222.984728][ C0] rcu: Possible timer handling issue on cpu=0 timer-softirq=4709 [ 222.992367][ C0] rcu: rcu_preempt kthread starved for 10001 jiffies! g18777 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 223.003562][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 223.013370][ C0] rcu: RCU grace-period kthread stack dump: [ 223.019099][ C0] task:rcu_preempt state:I stack:28328 pid: 14 ppid: 2 flags:0x00004000 [ 223.028131][ C0] Call Trace: [ 223.031251][ C0] [ 223.034033][ C0] __schedule+0xccc/0x1590 [ 223.038284][ C0] ? __sched_text_start+0x8/0x8 [ 223.042971][ C0] ? __kasan_check_write+0x14/0x20 [ 223.047916][ C0] schedule+0x11f/0x1e0 [ 223.051995][ C0] schedule_timeout+0x18c/0x370 [ 223.056683][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 223.061717][ C0] ? console_conditional_schedule+0x30/0x30 [ 223.067445][ C0] ? update_process_times+0x200/0x200 [ 223.072652][ C0] ? prepare_to_swait_event+0x308/0x320 [ 223.078063][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 223.082799][ C0] ? debug_smp_processor_id+0x17/0x20 [ 223.087932][ C0] ? __note_gp_changes+0x4ab/0x920 [ 223.092876][ C0] ? rcu_gp_init+0xc30/0xc30 [ 223.097417][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 223.102449][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 223.106886][ C0] rcu_gp_kthread+0xa4/0x350 [ 223.111304][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 223.115990][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 223.120502][ C0] ? __kasan_check_read+0x11/0x20 [ 223.125374][ C0] ? __kthread_parkme+0xb2/0x200 [ 223.130139][ C0] kthread+0x421/0x510 [ 223.134044][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 223.138559][ C0] ? kthread_blkcg+0xd0/0xd0 [ 223.142984][ C0] ret_from_fork+0x1f/0x30 [ 223.147237][ C0] [ 223.150103][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 223.156273][ C0] NMI backtrace for cpu 0 [ 223.160433][ C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 223.171888][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 223.181779][ C0] Call Trace: [ 223.184903][ C0] [ 223.187594][ C0] dump_stack_lvl+0x151/0x1b7 [ 223.192223][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 223.197696][ C0] dump_stack+0x15/0x17 [ 223.201691][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 223.206545][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 223.212534][ C0] ? panic+0x751/0x751 [ 223.216437][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 223.222343][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 223.228152][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 223.234056][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 223.239784][ C0] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 223.245779][ C0] ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230 [ 223.252543][ C0] print_cpu_stall+0x310/0x5f0 [ 223.257154][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 223.262179][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 223.268169][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 223.273202][ C0] update_process_times+0x198/0x200 [ 223.278237][ C0] tick_sched_timer+0x188/0x240 [ 223.282920][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 223.288303][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 223.293339][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 223.298283][ C0] ? clockevents_program_event+0x22f/0x300 [ 223.303922][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 223.309828][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 223.314605][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 223.320329][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 223.325795][ C0] [ 223.328575][ C0] [ 223.331351][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 223.337171][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 223.342139][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 223.361745][ C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246 [ 223.367653][ C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f [ 223.375538][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090 [ 223.383346][ C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213 [ 223.391158][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 223.398972][ C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34 [ 223.406809][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 223.412861][ C0] ? asm_common_interrupt+0x27/0x40 [ 223.417892][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 223.422842][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 223.428917][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 223.434819][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 223.441083][ C0] ? __kasan_check_write+0x14/0x20 [ 223.446014][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 223.450787][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 223.455823][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 223.460858][ C0] ? lock_sock_nested+0x266/0x300 [ 223.465811][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.470315][ C0] sk_psock_link_pop+0x2e/0x170 [ 223.475001][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.479430][ C0] sock_map_remove_links+0x25/0x570 [ 223.484465][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.488890][ C0] sock_map_close+0x2ac/0x4c0 [ 223.493403][ C0] ? sock_map_remove_links+0x570/0x570 [ 223.498699][ C0] ? rwsem_mark_wake+0x6b0/0x6b0 [ 223.503481][ C0] unix_release+0x82/0xc0 [ 223.507637][ C0] sock_close+0xdf/0x270 [ 223.511717][ C0] ? sock_mmap+0xa0/0xa0 [ 223.515795][ C0] __fput+0x3fe/0x910 [ 223.519616][ C0] ____fput+0x15/0x20 [ 223.523431][ C0] task_work_run+0x129/0x190 [ 223.527863][ C0] exit_to_user_mode_loop+0xc4/0xe0 [ 223.532979][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 223.538275][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 223.543658][ C0] do_syscall_64+0x49/0xb0 [ 223.547910][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 223.553637][ C0] RIP: 0033:0x7f7351c00e5a [ 223.557897][ C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 223.577335][ C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 223.585580][ C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a [ 223.593393][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 223.601200][ C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001 [ 223.609013][ C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80 [ 223.616910][ C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980 [ 223.624725][ C0] [ 223.627623][ C0] NMI backtrace for cpu 0 [ 223.631754][ C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 223.643211][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 223.653191][ C0] Call Trace: [ 223.656318][ C0] [ 223.659006][ C0] dump_stack_lvl+0x151/0x1b7 [ 223.663522][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 223.668987][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 223.673675][ C0] dump_stack+0x15/0x17 [ 223.677675][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 223.682442][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 223.688470][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 223.693724][ C0] ? __kasan_check_write+0x14/0x20 [ 223.698673][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 223.703358][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 223.709269][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 223.715075][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 223.720978][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 223.726706][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 223.731656][ C0] print_cpu_stall+0x315/0x5f0 [ 223.736256][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 223.741329][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 223.747279][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 223.752322][ C0] update_process_times+0x198/0x200 [ 223.757347][ C0] tick_sched_timer+0x188/0x240 [ 223.762032][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 223.767413][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 223.772450][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 223.777394][ C0] ? clockevents_program_event+0x22f/0x300 [ 223.783049][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 223.789092][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 223.793868][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 223.799670][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 223.805140][ C0] [ 223.807913][ C0] [ 223.810690][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 223.816638][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 223.821405][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 223.840848][ C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246 [ 223.846747][ C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f [ 223.854572][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090 [ 223.862370][ C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213 [ 223.870181][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 223.877993][ C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34 [ 223.885824][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 223.891883][ C0] ? asm_common_interrupt+0x27/0x40 [ 223.897027][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 223.901960][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 223.908025][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 223.913928][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 223.920184][ C0] ? __kasan_check_write+0x14/0x20 [ 223.925124][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 223.929897][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 223.934930][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 223.939965][ C0] ? lock_sock_nested+0x266/0x300 [ 223.944825][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.949253][ C0] sk_psock_link_pop+0x2e/0x170 [ 223.953937][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.958366][ C0] sock_map_remove_links+0x25/0x570 [ 223.963403][ C0] ? unix_peer_get+0xe0/0xe0 [ 223.967923][ C0] sock_map_close+0x2ac/0x4c0 [ 223.972451][ C0] ? sock_map_remove_links+0x570/0x570 [ 223.977730][ C0] ? rwsem_mark_wake+0x6b0/0x6b0 [ 223.982506][ C0] unix_release+0x82/0xc0 [ 223.986668][ C0] sock_close+0xdf/0x270 [ 223.990757][ C0] ? sock_mmap+0xa0/0xa0 [ 223.994970][ C0] __fput+0x3fe/0x910 [ 223.998765][ C0] ____fput+0x15/0x20 [ 224.002586][ C0] task_work_run+0x129/0x190 [ 224.007015][ C0] exit_to_user_mode_loop+0xc4/0xe0 [ 224.012038][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 224.017334][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 224.022714][ C0] do_syscall_64+0x49/0xb0 [ 224.026967][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.032696][ C0] RIP: 0033:0x7f7351c00e5a [ 224.036953][ C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 224.056478][ C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 224.064729][ C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a [ 224.072532][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 224.080358][ C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001 [ 224.088178][ C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80 [ 224.095968][ C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980 [ 224.103791][ C0] [ 224.106648][ C0] Sending NMI from CPU 0 to CPUs 1: [ 224.111753][ C1] NMI backtrace for cpu 1 [ 224.111764][ C1] CPU: 1 PID: 4993 Comm: syz-executor.2 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 224.111784][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 224.111793][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 224.111813][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d fa 03 f3 03 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 224.111827][ C1] RSP: 0018:ffffc900001cf800 EFLAGS: 00000046 [ 224.111841][ C1] RAX: 0000000000000003 RBX: 1ffff92000039f04 RCX: ffffffff8154fa3f [ 224.111853][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127454928 [ 224.111865][ C1] RBP: ffffc900001cf8b0 R08: dffffc0000000000 R09: ffffed1024e8a926 [ 224.111878][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 224.111889][ C1] R13: ffff888127454928 R14: 0000000000000003 R15: 1ffff92000039f08 [ 224.111901][ C1] FS: 00007fa1543766c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 224.111916][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 224.111928][ C1] CR2: 00007ffefa99ee38 CR3: 000000012d333000 CR4: 00000000003506a0 [ 224.111944][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 224.111954][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 224.111964][ C1] Call Trace: [ 224.111971][ C1] [ 224.111978][ C1] ? show_regs+0x58/0x60 [ 224.112005][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 224.112038][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 224.112067][ C1] ? kvm_wait+0x117/0x180 [ 224.112086][ C1] ? kvm_wait+0x117/0x180 [ 224.112101][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 224.112120][ C1] ? nmi_handle+0xa8/0x280 [ 224.112141][ C1] ? kvm_wait+0x117/0x180 [ 224.112161][ C1] ? default_do_nmi+0x69/0x160 [ 224.112178][ C1] ? exc_nmi+0xaf/0x120 [ 224.112194][ C1] ? end_repeat_nmi+0x16/0x31 [ 224.112212][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 224.112237][ C1] ? kvm_wait+0x117/0x180 [ 224.112252][ C1] ? kvm_wait+0x117/0x180 [ 224.112268][ C1] ? kvm_wait+0x117/0x180 [ 224.112283][ C1] [ 224.112287][ C1] [ 224.112292][ C1] ? __set_page_owner+0x2c7/0x2e0 [ 224.112309][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 224.112326][ C1] ? pv_hash+0x86/0x150 [ 224.112343][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 224.112365][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 224.112386][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 224.112406][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 224.112427][ C1] sock_map_delete_elem+0x99/0x130 [ 224.112446][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 224.112460][ C1] bpf_trace_run4+0x13f/0x270 [ 224.112480][ C1] ? bpf_trace_run3+0x250/0x250 [ 224.112502][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 224.112521][ C1] __alloc_pages+0x3cb/0x8f0 [ 224.112539][ C1] ? prep_new_page+0x110/0x110 [ 224.112557][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 224.112575][ C1] ? stack_trace_save+0x113/0x1c0 [ 224.112594][ C1] __stack_depot_save+0x38d/0x470 [ 224.112616][ C1] stack_depot_save+0xe/0x10 [ 224.112630][ C1] save_stack+0x104/0x1e0 [ 224.112645][ C1] ? __reset_page_owner+0x190/0x190 [ 224.112661][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 224.112677][ C1] ? prep_new_page+0x1b/0x110 [ 224.112694][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 224.112712][ C1] ? __alloc_pages+0x27e/0x8f0 [ 224.112735][ C1] ? __stack_depot_save+0x38d/0x470 [ 224.112753][ C1] ? kasan_set_track+0x5d/0x70 [ 224.112768][ C1] ? kasan_set_free_info+0x23/0x40 [ 224.112785][ C1] ? ____kasan_slab_free+0x126/0x160 [ 224.112801][ C1] ? __kasan_slab_free+0x11/0x20 [ 224.112816][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 224.112835][ C1] ? kfree+0xc8/0x220 [ 224.112851][ C1] ? sock_map_unref+0x352/0x4d0 [ 224.112868][ C1] ? sock_map_delete_elem+0xc1/0x130 [ 224.112885][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 224.112898][ C1] ? bpf_trace_run4+0x13f/0x270 [ 224.112915][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 224.112934][ C1] __set_page_owner+0x28/0x2e0 [ 224.112950][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 224.112968][ C1] post_alloc_hook+0x1a3/0x1b0 [ 224.112987][ C1] prep_new_page+0x1b/0x110 [ 224.113004][ C1] get_page_from_freelist+0x3550/0x35d0 [ 224.113023][ C1] ? __kasan_check_read+0x11/0x20 [ 224.113049][ C1] ? lruvec_init+0x150/0x150 [ 224.113066][ C1] ? update_stack_state+0x15d/0x460 [ 224.113086][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 224.113105][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 224.113123][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 224.113142][ C1] __alloc_pages+0x27e/0x8f0 [ 224.113159][ C1] ? prep_new_page+0x110/0x110 [ 224.113179][ C1] ? stack_trace_save+0x113/0x1c0 [ 224.113196][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 224.113213][ C1] ? stack_trace_save+0x113/0x1c0 [ 224.113230][ C1] __stack_depot_save+0x38d/0x470 [ 224.113250][ C1] ? kfree+0xc8/0x220 [ 224.113267][ C1] kasan_set_track+0x5d/0x70 [ 224.113281][ C1] ? kasan_set_track+0x4b/0x70 [ 224.113296][ C1] ? kasan_set_free_info+0x23/0x40 [ 224.113312][ C1] ? ____kasan_slab_free+0x126/0x160 [ 224.113328][ C1] ? __kasan_slab_free+0x11/0x20 [ 224.113343][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 224.113367][ C1] ? kfree+0xc8/0x220 [ 224.113383][ C1] ? sock_map_unref+0x352/0x4d0 [ 224.113399][ C1] ? sock_map_delete_elem+0xc1/0x130 [ 224.113417][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 224.113429][ C1] ? bpf_trace_run4+0x13f/0x270 [ 224.113446][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 224.113462][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 224.113479][ C1] ? new_slab+0x9a/0x4e0 [ 224.113493][ C1] ? ___slab_alloc+0x39e/0x830 [ 224.113510][ C1] ? __slab_alloc+0x4a/0x90 [ 224.113527][ C1] ? kmem_cache_alloc+0x134/0x200 [ 224.113544][ C1] ? __sigqueue_alloc+0x130/0x200 [ 224.113561][ C1] ? __send_signal+0x1fd/0xcb0 [ 224.113577][ C1] ? send_signal+0x43a/0x590 [ 224.113592][ C1] ? do_send_sig_info+0xde/0x230 [ 224.113608][ C1] ? group_send_sig_info+0x113/0x460 [ 224.113624][ C1] ? do_bpf_send_signal+0x8c/0x150 [ 224.113642][ C1] ? irq_work_run_list+0x1c2/0x290 [ 224.113659][ C1] ? irq_work_run+0x69/0xf0 [ 224.113676][ C1] ? __sysvec_irq_work+0x63/0x1b0 [ 224.113693][ C1] ? sysvec_irq_work+0x92/0xb0 [ 224.113710][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 224.113730][ C1] ? _raw_spin_unlock_irq+0x49/0x70 [ 224.113745][ C1] ? get_signal+0x1562/0x1630 [ 224.113761][ C1] ? arch_do_signal_or_restart+0xbd/0x1680 [ 224.113777][ C1] ? exit_to_user_mode_loop+0xa0/0xe0 [ 224.113793][ C1] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 224.113810][ C1] ? syscall_exit_to_user_mode+0x26/0x160 [ 224.113828][ C1] ? do_syscall_64+0x49/0xb0 [ 224.113843][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.113866][ C1] kasan_set_free_info+0x23/0x40 [ 224.113883][ C1] ____kasan_slab_free+0x126/0x160 [ 224.113900][ C1] __kasan_slab_free+0x11/0x20 [ 224.113915][ C1] slab_free_freelist_hook+0xbd/0x190 [ 224.113935][ C1] ? sock_map_unref+0x352/0x4d0 [ 224.113952][ C1] kfree+0xc8/0x220 [ 224.113970][ C1] sock_map_unref+0x352/0x4d0 [ 224.113990][ C1] sock_map_delete_elem+0xc1/0x130 [ 224.114008][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 224.114021][ C1] bpf_trace_run4+0x13f/0x270 [ 224.114039][ C1] ? bpf_trace_run3+0x250/0x250 [ 224.114060][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 224.114078][ C1] __alloc_pages+0x3cb/0x8f0 [ 224.114094][ C1] ? sysvec_irq_work+0x92/0xb0 [ 224.114112][ C1] ? prep_new_page+0x110/0x110 [ 224.114128][ C1] ? syscall_exit_to_user_mode+0x26/0x160 [ 224.114146][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.114165][ C1] ? try_to_wake_up+0x697/0x1160 [ 224.114184][ C1] new_slab+0x9a/0x4e0 [ 224.114199][ C1] ___slab_alloc+0x39e/0x830 [ 224.114216][ C1] ? __sigqueue_alloc+0x130/0x200 [ 224.114235][ C1] ? __sigqueue_alloc+0x130/0x200 [ 224.114251][ C1] __slab_alloc+0x4a/0x90 [ 224.114269][ C1] ? __sigqueue_alloc+0x130/0x200 [ 224.114285][ C1] kmem_cache_alloc+0x134/0x200 [ 224.114303][ C1] __sigqueue_alloc+0x130/0x200 [ 224.114321][ C1] __send_signal+0x1fd/0xcb0 [ 224.114339][ C1] send_signal+0x43a/0x590 [ 224.114356][ C1] do_send_sig_info+0xde/0x230 [ 224.114373][ C1] group_send_sig_info+0x113/0x460 [ 224.114391][ C1] ? __lock_task_sighand+0x100/0x100 [ 224.114407][ C1] ? clockevents_program_event+0x22f/0x300 [ 224.114427][ C1] do_bpf_send_signal+0x8c/0x150 [ 224.114446][ C1] irq_work_run_list+0x1c2/0x290 [ 224.114464][ C1] ? irq_work_run+0xf0/0xf0 [ 224.114484][ C1] irq_work_run+0x69/0xf0 [ 224.114501][ C1] __sysvec_irq_work+0x63/0x1b0 [ 224.114520][ C1] sysvec_irq_work+0x92/0xb0 [ 224.114537][ C1] [ 224.114542][ C1] [ 224.114547][ C1] asm_sysvec_irq_work+0x1b/0x20 [ 224.114563][ C1] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70 [ 224.114579][ C1] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57 [ 224.114592][ C1] RSP: 0018:ffffc90000d4fbb8 EFLAGS: 00000246 [ 224.114606][ C1] RAX: 0000000000000001 RBX: ffff8881449ea300 RCX: dffffc0000000000 [ 224.114617][ C1] RDX: ffffc9000231e000 RSI: 000000000003ffff RDI: 0000000000000001 [ 224.114628][ C1] RBP: ffffc90000d4fbc0 R08: ffffffff81456d9a R09: fffff520001a9fc0 [ 224.114641][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881449ea300 [ 224.114667][ C1] R13: ffff8881449ea720 R14: 0000000000000021 R15: dffffc0000000000 [ 224.114681][ C1] ? get_signal+0x151a/0x1630 [ 224.114700][ C1] ? _raw_spin_unlock_irq+0x41/0x70 [ 224.114715][ C1] get_signal+0x1562/0x1630 [ 224.114741][ C1] arch_do_signal_or_restart+0xbd/0x1680 [ 224.114757][ C1] ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0 [ 224.114775][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 224.114795][ C1] ? __kasan_check_write+0x14/0x20 [ 224.114812][ C1] ? _copy_from_user+0x96/0xd0 [ 224.114828][ C1] ? restore_altstack+0x274/0x400 [ 224.114847][ C1] ? get_sigframe_size+0x10/0x10 [ 224.114862][ C1] ? __ia32_sys_sigaltstack+0x70/0x70 [ 224.114885][ C1] ? __do_sys_rt_sigreturn+0x160/0x1e0 [ 224.114903][ C1] exit_to_user_mode_loop+0xa0/0xe0 [ 224.114920][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 224.114942][ C1] syscall_exit_to_user_mode+0x26/0x160 [ 224.114961][ C1] do_syscall_64+0x49/0xb0 [ 224.114976][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 224.114994][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.115011][ C1] RIP: 0033:0x7fa154fa6880 [ 224.115024][ C1] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31 [ 224.115037][ C1] RSP: 002b:00007fa1543752b8 EFLAGS: 00000283 [ 224.115049][ C1] RAX: 0000000000000000 RBX: 00007fa154375dc0 RCX: 00007fa1550fcbc0 [ 224.115060][ C1] RDX: 00007fa1543752c0 RSI: 00007fa1543753f0 RDI: 000000000000000b [ 224.115071][ C1] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 224.115081][ C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 224.115091][ C1] R13: 00007fa154375f40 R14: 9999999999999999 R15: 0000000000000000 [ 224.115107][ C1] [ 375.029254][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.0:4996] [ 375.037687][ C0] Modules linked in: [ 375.041402][ C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 375.052854][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 375.062749][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 375.067527][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 375.087485][ C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246 [ 375.093393][ C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f [ 375.101198][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090 [ 375.109011][ C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213 [ 375.116821][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 375.124634][ C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34 [ 375.132443][ C0] FS: 000055555685f480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 375.141217][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.147634][ C0] CR2: 0000001b2ed24000 CR3: 0000000129f48000 CR4: 00000000003506b0 [ 375.155446][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 375.163258][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 375.171158][ C0] Call Trace: [ 375.174279][ C0] [ 375.176974][ C0] ? show_regs+0x58/0x60 [ 375.181060][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 375.186082][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 375.191210][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 375.196417][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 375.201451][ C0] ? clockevents_program_event+0x22f/0x300 [ 375.207095][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 375.213002][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 375.217944][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 375.223843][ C0] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 375.229486][ C0] [ 375.232263][ C0] [ 375.235039][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.241033][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 375.247106][ C0] ? kvm_wait+0x147/0x180 [ 375.251275][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.257261][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 375.262212][ C0] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 375.268283][ C0] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 375.274189][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 375.280446][ C0] ? __kasan_check_write+0x14/0x20 [ 375.285384][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 375.290155][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 375.295189][ C0] ? __local_bh_enable_ip+0x58/0x80 [ 375.300223][ C0] ? lock_sock_nested+0x266/0x300 [ 375.305084][ C0] ? unix_peer_get+0xe0/0xe0 [ 375.309511][ C0] sk_psock_link_pop+0x2e/0x170 [ 375.314197][ C0] ? unix_peer_get+0xe0/0xe0 [ 375.318623][ C0] sock_map_remove_links+0x25/0x570 [ 375.323658][ C0] ? unix_peer_get+0xe0/0xe0 [ 375.328085][ C0] sock_map_close+0x2ac/0x4c0 [ 375.332599][ C0] ? sock_map_remove_links+0x570/0x570 [ 375.337894][ C0] ? rwsem_mark_wake+0x6b0/0x6b0 [ 375.342667][ C0] unix_release+0x82/0xc0 [ 375.346834][ C0] sock_close+0xdf/0x270 [ 375.350912][ C0] ? sock_mmap+0xa0/0xa0 [ 375.355008][ C0] __fput+0x3fe/0x910 [ 375.358811][ C0] ____fput+0x15/0x20 [ 375.362629][ C0] task_work_run+0x129/0x190 [ 375.367057][ C0] exit_to_user_mode_loop+0xc4/0xe0 [ 375.372089][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 375.377385][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 375.382763][ C0] do_syscall_64+0x49/0xb0 [ 375.387018][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.392763][ C0] RIP: 0033:0x7f7351c00e5a [ 375.397010][ C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 [ 375.416441][ C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 375.424687][ C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a [ 375.432499][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 375.440309][ C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001 [ 375.448121][ C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80 [ 375.455934][ C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980 [ 375.463745][ C0] [ 375.466608][ C0] Sending NMI from CPU 0 to CPUs 1: [ 375.471696][ C1] NMI backtrace for cpu 1 [ 375.471706][ C1] CPU: 1 PID: 4993 Comm: syz-executor.2 Tainted: G W 5.15.149-syzkaller-00131-g79bd336c7a94 #0 [ 375.471725][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 375.471734][ C1] RIP: 0010:kvm_wait+0x117/0x180 [ 375.471754][ C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d fa 03 f3 03 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 375.471767][ C1] RSP: 0018:ffffc900001cf800 EFLAGS: 00000046 [ 375.471781][ C1] RAX: 0000000000000003 RBX: 1ffff92000039f04 RCX: ffffffff8154fa3f [ 375.471793][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127454928 [ 375.471805][ C1] RBP: ffffc900001cf8b0 R08: dffffc0000000000 R09: ffffed1024e8a926 [ 375.471818][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 375.471829][ C1] R13: ffff888127454928 R14: 0000000000000003 R15: 1ffff92000039f08 [ 375.471841][ C1] FS: 00007fa1543766c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 375.471856][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.471869][ C1] CR2: 00007ffefa99ee38 CR3: 000000012d333000 CR4: 00000000003506a0 [ 375.471884][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 375.471893][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 375.471904][ C1] Call Trace: [ 375.471910][ C1] [ 375.471916][ C1] ? show_regs+0x58/0x60 [ 375.471943][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 375.471976][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 375.472010][ C1] ? kvm_wait+0x117/0x180 [ 375.472032][ C1] ? kvm_wait+0x117/0x180 [ 375.472048][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 375.472068][ C1] ? nmi_handle+0xa8/0x280 [ 375.472085][ C1] ? kvm_wait+0x117/0x180 [ 375.472099][ C1] ? kvm_wait+0x117/0x180 [ 375.472114][ C1] ? default_do_nmi+0x69/0x160 [ 375.472132][ C1] ? exc_nmi+0xaf/0x120 [ 375.472148][ C1] ? end_repeat_nmi+0x16/0x31 [ 375.472166][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 375.472186][ C1] ? kvm_wait+0x117/0x180 [ 375.472202][ C1] ? kvm_wait+0x117/0x180 [ 375.472217][ C1] ? kvm_wait+0x117/0x180 [ 375.472232][ C1] [ 375.472237][ C1] [ 375.472241][ C1] ? __set_page_owner+0x2c7/0x2e0 [ 375.472258][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 375.472275][ C1] ? pv_hash+0x86/0x150 [ 375.472309][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 375.472331][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 375.472353][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 375.472372][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 375.472393][ C1] sock_map_delete_elem+0x99/0x130 [ 375.472412][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 375.472426][ C1] bpf_trace_run4+0x13f/0x270 [ 375.472445][ C1] ? bpf_trace_run3+0x250/0x250 [ 375.472466][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 375.472485][ C1] __alloc_pages+0x3cb/0x8f0 [ 375.472503][ C1] ? prep_new_page+0x110/0x110 [ 375.472521][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 375.472539][ C1] ? stack_trace_save+0x113/0x1c0 [ 375.472557][ C1] __stack_depot_save+0x38d/0x470 [ 375.472579][ C1] stack_depot_save+0xe/0x10 [ 375.472593][ C1] save_stack+0x104/0x1e0 [ 375.472608][ C1] ? __reset_page_owner+0x190/0x190 [ 375.472623][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 375.472639][ C1] ? prep_new_page+0x1b/0x110 [ 375.472656][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 375.472674][ C1] ? __alloc_pages+0x27e/0x8f0 [ 375.472690][ C1] ? __stack_depot_save+0x38d/0x470 [ 375.472708][ C1] ? kasan_set_track+0x5d/0x70 [ 375.472723][ C1] ? kasan_set_free_info+0x23/0x40 [ 375.472739][ C1] ? ____kasan_slab_free+0x126/0x160 [ 375.472755][ C1] ? __kasan_slab_free+0x11/0x20 [ 375.472770][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 375.472789][ C1] ? kfree+0xc8/0x220 [ 375.472805][ C1] ? sock_map_unref+0x352/0x4d0 [ 375.472821][ C1] ? sock_map_delete_elem+0xc1/0x130 [ 375.472838][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 375.472851][ C1] ? bpf_trace_run4+0x13f/0x270 [ 375.472868][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 375.472887][ C1] __set_page_owner+0x28/0x2e0 [ 375.472902][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 375.472920][ C1] post_alloc_hook+0x1a3/0x1b0 [ 375.472938][ C1] prep_new_page+0x1b/0x110 [ 375.472955][ C1] get_page_from_freelist+0x3550/0x35d0 [ 375.472974][ C1] ? __kasan_check_read+0x11/0x20 [ 375.472999][ C1] ? lruvec_init+0x150/0x150 [ 375.473017][ C1] ? update_stack_state+0x15d/0x460 [ 375.473038][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 375.473057][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 375.473074][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 375.473093][ C1] __alloc_pages+0x27e/0x8f0 [ 375.473111][ C1] ? prep_new_page+0x110/0x110 [ 375.473131][ C1] ? stack_trace_save+0x113/0x1c0 [ 375.473148][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 375.473165][ C1] ? stack_trace_save+0x113/0x1c0 [ 375.473182][ C1] __stack_depot_save+0x38d/0x470 [ 375.473202][ C1] ? kfree+0xc8/0x220 [ 375.473219][ C1] kasan_set_track+0x5d/0x70 [ 375.473233][ C1] ? kasan_set_track+0x4b/0x70 [ 375.473248][ C1] ? kasan_set_free_info+0x23/0x40 [ 375.473264][ C1] ? ____kasan_slab_free+0x126/0x160 [ 375.473286][ C1] ? __kasan_slab_free+0x11/0x20 [ 375.473301][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 375.473319][ C1] ? kfree+0xc8/0x220 [ 375.473335][ C1] ? sock_map_unref+0x352/0x4d0 [ 375.473352][ C1] ? sock_map_delete_elem+0xc1/0x130 [ 375.473369][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 375.473382][ C1] ? bpf_trace_run4+0x13f/0x270 [ 375.473399][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 375.473415][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 375.473431][ C1] ? new_slab+0x9a/0x4e0 [ 375.473444][ C1] ? ___slab_alloc+0x39e/0x830 [ 375.473461][ C1] ? __slab_alloc+0x4a/0x90 [ 375.473478][ C1] ? kmem_cache_alloc+0x134/0x200 [ 375.473495][ C1] ? __sigqueue_alloc+0x130/0x200 [ 375.473511][ C1] ? __send_signal+0x1fd/0xcb0 [ 375.473527][ C1] ? send_signal+0x43a/0x590 [ 375.473542][ C1] ? do_send_sig_info+0xde/0x230 [ 375.473558][ C1] ? group_send_sig_info+0x113/0x460 [ 375.473574][ C1] ? do_bpf_send_signal+0x8c/0x150 [ 375.473592][ C1] ? irq_work_run_list+0x1c2/0x290 [ 375.473609][ C1] ? irq_work_run+0x69/0xf0 [ 375.473625][ C1] ? __sysvec_irq_work+0x63/0x1b0 [ 375.473642][ C1] ? sysvec_irq_work+0x92/0xb0 [ 375.473658][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 375.473674][ C1] ? _raw_spin_unlock_irq+0x49/0x70 [ 375.473688][ C1] ? get_signal+0x1562/0x1630 [ 375.473704][ C1] ? arch_do_signal_or_restart+0xbd/0x1680 [ 375.473720][ C1] ? exit_to_user_mode_loop+0xa0/0xe0 [ 375.473737][ C1] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 375.473753][ C1] ? syscall_exit_to_user_mode+0x26/0x160 [ 375.473771][ C1] ? do_syscall_64+0x49/0xb0 [ 375.473786][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.473810][ C1] kasan_set_free_info+0x23/0x40 [ 375.473826][ C1] ____kasan_slab_free+0x126/0x160 [ 375.473843][ C1] __kasan_slab_free+0x11/0x20 [ 375.473858][ C1] slab_free_freelist_hook+0xbd/0x190 [ 375.473879][ C1] ? sock_map_unref+0x352/0x4d0 [ 375.473896][ C1] kfree+0xc8/0x220 [ 375.473914][ C1] sock_map_unref+0x352/0x4d0 [ 375.473933][ C1] sock_map_delete_elem+0xc1/0x130 [ 375.473951][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14 [ 375.473964][ C1] bpf_trace_run4+0x13f/0x270 [ 375.473983][ C1] ? bpf_trace_run3+0x250/0x250 [ 375.474004][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 375.474022][ C1] __alloc_pages+0x3cb/0x8f0 [ 375.474039][ C1] ? sysvec_irq_work+0x92/0xb0 [ 375.474057][ C1] ? prep_new_page+0x110/0x110 [ 375.474073][ C1] ? syscall_exit_to_user_mode+0x26/0x160 [ 375.474092][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.474111][ C1] ? try_to_wake_up+0x697/0x1160 [ 375.474130][ C1] new_slab+0x9a/0x4e0 [ 375.474145][ C1] ___slab_alloc+0x39e/0x830 [ 375.474162][ C1] ? __sigqueue_alloc+0x130/0x200 [ 375.474181][ C1] ? __sigqueue_alloc+0x130/0x200 [ 375.474198][ C1] __slab_alloc+0x4a/0x90 [ 375.474216][ C1] ? __sigqueue_alloc+0x130/0x200 [ 375.474232][ C1] kmem_cache_alloc+0x134/0x200 [ 375.474251][ C1] __sigqueue_alloc+0x130/0x200 [ 375.474269][ C1] __send_signal+0x1fd/0xcb0 [ 375.474298][ C1] send_signal+0x43a/0x590 [ 375.474316][ C1] do_send_sig_info+0xde/0x230 [ 375.474333][ C1] group_send_sig_info+0x113/0x460 [ 375.474351][ C1] ? __lock_task_sighand+0x100/0x100 [ 375.474368][ C1] ? clockevents_program_event+0x22f/0x300 [ 375.474388][ C1] do_bpf_send_signal+0x8c/0x150 [ 375.474407][ C1] irq_work_run_list+0x1c2/0x290 [ 375.474425][ C1] ? irq_work_run+0xf0/0xf0 [ 375.474445][ C1] irq_work_run+0x69/0xf0 [ 375.474462][ C1] __sysvec_irq_work+0x63/0x1b0 [ 375.474480][ C1] sysvec_irq_work+0x92/0xb0 [ 375.474498][ C1] [ 375.474502][ C1] [ 375.474507][ C1] asm_sysvec_irq_work+0x1b/0x20 [ 375.474523][ C1] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70 [ 375.474539][ C1] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57 [ 375.474552][ C1] RSP: 0018:ffffc90000d4fbb8 EFLAGS: 00000246 [ 375.474565][ C1] RAX: 0000000000000001 RBX: ffff8881449ea300 RCX: dffffc0000000000 [ 375.474577][ C1] RDX: ffffc9000231e000 RSI: 000000000003ffff RDI: 0000000000000001 [ 375.474588][ C1] RBP: ffffc90000d4fbc0 R08: ffffffff81456d9a R09: fffff520001a9fc0 [ 375.474601][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881449ea300 [ 375.474612][ C1] R13: ffff8881449ea720 R14: 0000000000000021 R15: dffffc0000000000 [ 375.474626][ C1] ? get_signal+0x151a/0x1630 [ 375.474645][ C1] ? _raw_spin_unlock_irq+0x41/0x70 [ 375.474660][ C1] get_signal+0x1562/0x1630 [ 375.474681][ C1] arch_do_signal_or_restart+0xbd/0x1680 [ 375.474697][ C1] ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0 [ 375.474715][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 375.474735][ C1] ? __kasan_check_write+0x14/0x20 [ 375.474752][ C1] ? _copy_from_user+0x96/0xd0 [ 375.474768][ C1] ? restore_altstack+0x274/0x400 [ 375.474787][ C1] ? get_sigframe_size+0x10/0x10 [ 375.474802][ C1] ? __ia32_sys_sigaltstack+0x70/0x70 [ 375.474824][ C1] ? __do_sys_rt_sigreturn+0x160/0x1e0 [ 375.474842][ C1] exit_to_user_mode_loop+0xa0/0xe0 [ 375.474859][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 375.474877][ C1] syscall_exit_to_user_mode+0x26/0x160 [ 375.474896][ C1] do_syscall_64+0x49/0xb0 [ 375.474911][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 375.474930][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.474946][ C1] RIP: 0033:0x7fa154fa6880 [ 375.474960][ C1] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31 [ 375.474972][ C1] RSP: 002b:00007fa1543752b8 EFLAGS: 00000283 [ 375.474985][ C1] RAX: 0000000000000000 RBX: 00007fa154375dc0 RCX: 00007fa1550fcbc0 [ 375.474996][ C1] RDX: 00007fa1543752c0 RSI: 00007fa1543753f0 RDI: 000000000000000b [ 375.475007][ C1] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 375.475017][ C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 375.475027][ C1] R13: 00007fa154375f40 R14: 9999999999999999 R15: 0000000000000000 [ 375.475043][ C1]