last executing test programs:

2.702242096s ago: executing program 3:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0185879, &(0x7f0000000040))
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10)
r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2})
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) (async)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) (async)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r2}, 0x10) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0185879, &(0x7f0000000040)) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) (async)
openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async)
ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async)

2.071846862s ago: executing program 3:
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272})
ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x1)
ioctl$TUNSETLINK(r0, 0x400454ce, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f00000006c0)}, 0x20)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

2.015119621s ago: executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={<r0=>0xffffffffffffffff})
close(r0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
close(r0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

1.999119143s ago: executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, <r2=>0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10)
close(0xffffffffffffffff)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10)
write$cgroup_pid(r5, &(0x7f0000000980), 0x12)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10)
ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast})
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10)

1.977762157s ago: executing program 3:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0)
ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90)
ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"})
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200})

1.95430697s ago: executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0)
socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={<r2=>0xffffffffffffffff})
sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x170}, 0x8008)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000100), 0x1001)
ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20)

1.880086832s ago: executing program 4:
socketpair$tipc(0x1e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

1.711787557s ago: executing program 3:
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='sys_enter\x00'}, 0x10)
perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r2=>0xffffffffffffffff})
close(r2)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff})
sendmsg$inet(r4, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000010000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0)
close(r3)
close(r4)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_ext_remove_space_done\x00', r7}, 0x10)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0)
write$cgroup_int(r8, &(0x7f00000000c0), 0x12)
ioctl$SIOCSIFHWADDR(r8, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x2}})
sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c75256509e3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d50f69edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0)
recvmsg$unix(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100)

1.338647865s ago: executing program 1:
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x7, 0x14}, 0xc)
unlink(&(0x7f0000000040)='./file0\x00')
r1 = gettid()
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000100)="bc9bd5b930ca5411339c7d6f65b6c07bc564f7c038d6191a965052908151213699a55cd963d2bd09690a08bb2e112e17c50a2112d9dda0489d374383fa141e4f4d27946a3fc921f55740dc13213241bf550eb474f8a07042d832fc6210c8bb8d47291f1e6ef9f290d32d2d8bae7e75a5ee0237f845248f063651b999e12d321d46b66800b82d0b33bd3b66132aeba07dc7b696b2633616cd7904774f3e9c9fecf72f67bb010e202f176484c586b40ce7742649ec9fd2e066b04201e9114fd35088c0cb7477b8b2d847b3930a857e75790494c81b7322fd22ac6508f8fce79a2e44e7185149e09759320eb6cb87022cd9bc0aab7c8247aa09", &(0x7f0000000200)=""/7, &(0x7f0000000240)="fd9732b063bcd1411bcb903903ae304493cc67804112b7f5c93a52fa631030a240e7c50e9b1eb8d34fcfd6966a3e491e2d5622ce5a3e0fee45fa0d4b45fba79913c8e118cbfb7541c3be73e6cf93", &(0x7f00000002c0)="e86add7a03ccc95a8a9b0c12a370a0fa7bcdaee1c924c15228d6995334cf597a4b7862a8843d33ff89dd2868eb2b13bed2932bf165313b9ade83d0b4b9286f3c7d9ef4d3b137cdd027f2b7367121eddd94897f20c15c7d37d2769c47a2dc4bee4d1a16ce0531ab8637d8c685c4f3a64cc026dde3a6aa1276cb90fd15f4fb251d8882f27a112d75bf0e6fff99fa255cfe871b151befb4002b074fb478e24392b6d010bf3f447e1c40e11a69554eab18e5c026857aa53a8b2a2a1a1199aa43c8443af4de66d660c94c06d9e9885e65e78be8d000dfbdbd2c381aa5b6a606f48bae", 0x80, r0, 0x4}, 0x38)
r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x4008, r0}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r3, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, <r5=>0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], <r6=>0x0, 0x67, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xac, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x2, 0xe, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff6, 0x0, 0x0, 0x0, 0xc3e}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x8, 0x100, 0x1}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5d4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xff}]}, &(0x7f0000000500)='syzkaller\x00', 0xfffffffe, 0x98, &(0x7f0000000540)=""/152, 0x41100, 0x70, '\x00', r5, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0, 0x4, 0x0, &(0x7f0000000900)=[{0x1, 0x5, 0xd, 0x3}, {0x3, 0x3, 0x10, 0x1}, {0x2, 0x1, 0x5, 0x1}, {0x2, 0x4, 0xb}], 0x10, 0x6}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0xc, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0x7}, [@alu={0x7, 0x1, 0x5, 0x3, 0x4, 0x18, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xe4b0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @generic={0x3f, 0x2, 0x5, 0x9b7e, 0x3}]}, &(0x7f0000000a80)='GPL\x00', 0x7fff, 0x33, &(0x7f0000000ac0)=""/51, 0x41100, 0x78, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000b00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x0, 0x26d4, 0xfff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000b80)=[r0], &(0x7f0000000bc0)=[{0x4, 0x4, 0x3, 0x8}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0x1}, {0x5, 0x4, 0x1, 0xb}, {0x0, 0x5, 0x0, 0xa}], 0x10, 0xfffffff9}, 0x90)
unlink(&(0x7f0000000d00)='./file0\x00')
socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000d40)={<r8=>0xffffffffffffffff, <r9=>0xffffffffffffffff})
r10 = gettid()
r11 = perf_event_open(&(0x7f0000000dc0)={0x2, 0x80, 0x4, 0x1, 0x1, 0x40, 0x0, 0x3c0b, 0x41420, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000d80), 0x9}, 0x4, 0x9, 0xffff, 0x3, 0x2, 0xffff, 0x101, 0x0, 0x80000000, 0x0, 0x7fffffff}, r10, 0x9, r3, 0x8)
ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000e40)={'batadv_slave_0\x00', 0x2000})
r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@base={0x2f9c3994fa1c7ec0, 0x0, 0x1, 0x1b2, 0x412, r3, 0x3, '\x00', r5, r3, 0x3, 0x4, 0x2}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001100)={0x6, 0x15, &(0x7f0000000f00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@call={0x85, 0x0, 0x0, 0x6a}, @alu={0x7, 0x1, 0x3, 0x3, 0x8, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000fc0)='GPL\x00', 0x400, 0x0, 0x0, 0x41000, 0x14, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001040)={0x0, 0xf, 0x1000, 0xffffffff}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001080)=[r12, r12, 0x1], &(0x7f00000010c0)=[{0x4, 0x2, 0x2, 0x2}, {0x0, 0x3, 0x1, 0x5}], 0x10, 0x101}, 0x90)
sendmsg$unix(r9, &(0x7f0000001340)={&(0x7f00000011c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001240)="37380cb1c1a23596b4c9193561719ba5e9d49c3c073c7741", 0x18}], 0x1, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x60, 0x4040140}, 0x0)
r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000014c0)=r6, 0x4)
r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0xf, &(0x7f0000001380)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, r4}, @ldst={0x3, 0x3, 0x2, 0x4, 0x8, 0xfffffffffffffffe, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xe}, @generic={0x0, 0x1, 0x4, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000001400)='syzkaller\x00', 0x6, 0x6a, &(0x7f0000001440)=""/106, 0x41000, 0x44, '\x00', r5, 0x25, r13, 0x8, &(0x7f0000001500)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001540)={0x0, 0x9, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001580)=[r12, r3], &(0x7f00000015c0)=[{0x2, 0x3, 0x5, 0x150bac610521a623}, {0x1, 0x3, 0xf, 0xb}, {0x2, 0x5, 0xc, 0xa}, {0x3, 0x3, 0xd, 0x7}, {0x3, 0x5, 0xa, 0xd}, {0x2, 0x3, 0xa, 0x7}], 0x10, 0x5}, 0x90)
ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000001700)={'veth0\x00', @local})
write$cgroup_int(r11, &(0x7f0000001740)=0x14, 0x12)
r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=@base={0x1f, 0x2, 0x20, 0x2, 0x1006, r12, 0x80000, '\x00', r5, r13, 0x2, 0x3, 0x5}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001880)={{r15, <r16=>0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)=r7}, 0x20)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r0, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r17=>0x0}}, 0x10)
r18 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b80)={0x18, 0x9, &(0x7f00000018c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r16}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000001940)='syzkaller\x00', 0x4e6a, 0x89, &(0x7f0000001980)=""/137, 0x41100, 0x48, '\x00', r17, 0x0, r13, 0x8, &(0x7f0000001b00)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b40)=[r3, r15, r15, r4, r0, r4, r3, r0], 0x0, 0x10, 0x2}, 0x90)
socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001c40))
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r4, 0x58, &(0x7f0000001c80)}, 0x10)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001dc0)={{r16, <r19=>0xffffffffffffffff}, &(0x7f0000001d40), &(0x7f0000001d80)=r14}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001e80)={{r19}, &(0x7f0000001e00), &(0x7f0000001e40)=r18}, 0x20)

1.294777051s ago: executing program 1:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00', r2}, 0x10)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040))
write$cgroup_int(r3, &(0x7f0000000200)=0x42000000, 0x42400)

1.24196676s ago: executing program 0:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={<r0=>0xffffffffffffffff})
close(r0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
close(r0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

1.190783527s ago: executing program 1:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000ff00000000000000000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='ext4_es_find_extent_range_exit\x00', r0}, 0x10)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000140)='ext4_es_find_extent_range_exit\x00', r1}, 0x10)
mkdir(&(0x7f00000001c0)='./file1\x00', 0x7000000)

1.098672941s ago: executing program 2:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, <r3=>0x0, 0x0, 0x0, 0x0, 0x8, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x67, 0x8, 0x8, &(0x7f0000000380)}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0}, 0x90)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xfffff000, 0xe80, 0x0, &(0x7f0000000880)="61df712bc884fed5722780b686dd", 0x0, 0x8000, 0x0, 0xfffffffffffffeca, 0x0, &(0x7f0000000000), &(0x7f0000000800)="ffe200004e379b19393a41afde6b0b1235c1278ebf59a5d4d697bc199e060b675b46d4ff37c7f91ceaa6790cd8570f080b0d2375918cd7dfcf26aa90dc6a5617be488475b892958512c8e814c24d7efc26f9f2512dec8c759773c42a2fca2735984613809a78eb", 0x0, 0x2}, 0x28)
r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10)
r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x12, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000100000007800000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7030000000000008500000031000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000001b00)=ANY=[@ANYBLOB="9feb01001800000000000000fc000000fc0000000300000009000000020000040500000006000000010000001f0600000c0000000000000005000000030071548f9a44210400000000000b00000000080000000000000a050000000e00010005000006040000000c000000070000000100000c000000050000000c000000000046dc8790788d04f241f8dc00000500000003000004ba4c00000e000000000000000600000003ecffffffffffff070000000500000003000000000000000e000000020000060400000007000000da0000000c00000004000000000000000500000d0000000010000000050000000b00000003000000080000000400000009000000000000000200000002000000080000000000000a00000000005f0058bf094dd641cf4a194681db1fdd277bf7493962c8c075310e1640519819aa80396104f8a69523c0774ed1d022ff1f1f20021cd90b8ff951e9d190c6f60a87a307f3ef4732266c6db9b5d0ce0867f3318cffa83eccbc656ff7804eb9332b09da29a34942a128c27294b015062788151618d60866c4c7911d623546ef4e5689b9704e9057c313446383f60a4c83ca26f08624d95110b88e63e533330e04203574d6fce0b8e03c9429"], &(0x7f0000000b00)=""/4096, 0x117, 0x1000, 0x1, 0x3af}, 0x20)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0x0, <r8=>0x0}, 0x8)
r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="f3080100fbffffff6bb2000004000000850000008f000000"], &(0x7f0000000080)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', r3, 0x1b, r7, 0x8, &(0x7f00000005c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0xc, 0x100, 0x100}, 0x10, r8, 0x0, 0x4, &(0x7f00000008c0)=[r9, r1, r1], &(0x7f0000000900)=[{0x1, 0x3, 0xb, 0x8}, {0x3, 0x3, 0x3, 0x6}, {0x5, 0x5, 0x8, 0x5}, {0x4, 0x3, 0xa, 0x7}], 0x10, 0xfff}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0)
bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000740), &(0x7f0000000780)='%pi6   \x00'}, 0x20)
r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
close(r0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r10}, 0x10)
r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x36, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r11}, 0x10)
r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xb9, 0x4, 0x6, 0x1005, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x5}, 0x48)
write$cgroup_int(r12, &(0x7f0000000680), 0x12)

1.006737765s ago: executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, <r2=>0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10)
close(0xffffffffffffffff)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10)
write$cgroup_pid(r5, &(0x7f0000000980), 0x12)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10)
ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast})
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10)

1.003836996s ago: executing program 0:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0)
ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90)
ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"})
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200})

982.003659ms ago: executing program 1:
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/uts\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90)
bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0)
ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x2, 0x4, 0xb, 0x0, r4}, 0x48)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000240), 0x0}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90)
ioctl$SIOCSIFHWADDR(r2, 0x89a0, &(0x7f0000000000)={'veth0_vlan\x00', @remote})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"})
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000001c0)={'veth0\x00', 0x200})

969.516041ms ago: executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff})
recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0)
socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={<r1=>0xffffffffffffffff})
sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1400000000000000000000000200000007000000000000001100001900000000000000000100000005000000000000006c00000000000000000000000700000089170effffffff00000000e00000020a010102ac1414bb8907ca0a010101441441816401010100000042640101010000000907073be0100001070898680ea1d23a44181e5000000004000006a300000002000000090000000100000000000000140000000000000000000000010000000080000000000000b8000000000000000000000007000000443400000000009aace000000200000004e000000200000009e000000200010001e0000002000000040a01010100000fff891fe47f000001e0000002ac1414bb64010101ac1414bbe0000002ac1e0101444c6f53ac14144400000001ac14147f00000400ac1414aa0000bfec6401010000000400ac14141800000033e000000100008001ac1414aa00000006ffffffff00000101ac1414aa0000000900"], 0x170}, 0x8008)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
write$cgroup_int(r2, &(0x7f0000000100), 0x1001)
ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r4}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
ioctl$TUNSETOFFLOAD(r3, 0x40086607, 0x20001412)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r6, @ANYRES8=r5], 0x0, 0x4}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, 0x0, &(0x7f0000000040)}, 0x20)

825.617393ms ago: executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180100000000000000000000000000008500000008000000660000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xad, &(0x7f0000000000)=""/173}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='percpu_alloc_percpu\x00', r0}, 0x10)
bpf$MAP_CREATE(0x1800, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8}, 0x48)

720.18641ms ago: executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48)

716.67152ms ago: executing program 0:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x8800, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00'}, 0x90)
perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x800})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89b0, &(0x7f0000000080))
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000e4000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x80}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_da_write_pages\x00', r6}, 0x10)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0)
write$cgroup_int(r7, &(0x7f0000000100), 0x1001)
ioctl$SIOCSIFHWADDR(r7, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48)

671.488997ms ago: executing program 1:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r1}, 0x10)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8)
recvmsg$unix(r2, &(0x7f0000000280)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)=""/124, 0x7c}], 0x1, &(0x7f0000000240)}, 0x20000)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8360, 0x0, @perf_config_ext, 0x0, 0xf7fe}, 0x0, 0x0, 0xffffffffffffffff, 0xa)
write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r5}, 0x48)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000000000957b72fb9900010045"], 0x0}, 0x90)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080))
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x1, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580), &(0x7f00000005c0)=[0x0, 0x0], 0x0, 0x55, &(0x7f0000000600)=[{}, {}], 0x10, 0x10, &(0x7f0000000640), &(0x7f0000001200), 0x8, 0xd9, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84}, 0x48)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r7}, 0x38)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x53}, @ringbuf_output]}, &(0x7f0000000680)='GPL\x00'}, 0x90)
mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x1ff)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x800}, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r7, 0x49}, 0x38)

643.281631ms ago: executing program 4:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000eef8b90000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x0, 0x0, 0x1f, 0x1012, 0xffffffffffffffff, 0x7}, 0x48) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1f, 0x0, 0x0, 0x1f, 0x1012, 0xffffffffffffffff, 0x7}, 0x48)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) (async)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={<r1=>0xffffffffffffffff})
close(r1)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48) (async)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x100, 0x9, 0x1}, 0x48)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10)
socketpair(0x18, 0x0, 0x2, 0x0) (async)
socketpair(0x18, 0x0, 0x2, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff})
ioctl$TUNGETDEVNETNS(r5, 0x8982, 0x20000000)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000040), &(0x7f0000000340)}, 0x20)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={&(0x7f00000004c0)="650753d05c889b4bed38a12256d7d6f38f3eb8b950f2632d0494a77ad282e8a6559a81389e79b8d54a6e13a5a27fd1dc193b464f81c6ed7586a633511e5910f9f306ab54da69a3f4d874cb6802dd168ee4f35f4895ba904aba43f1ac240110fe55adbf2bec51d653cc8308545ab3a2896ab000e94fa800e02ca81798877ae1f0bfbcb65045cb548c40efdf8fd729aa9bf391e5209e39783d5afcb764c091f0cae6b64e613ecc029cd498365299c1ec7aad7cc545ae371f3a20b774e33e186af86d82a0a644b6332d2724aea9", &(0x7f00000002c0)=""/106, &(0x7f00000005c0)="f43138b8462510947b45d9d25879aee81ef59a49f4e36bec7e8a438bd4fe8f25f5064bebe76bb09be432e4cb1c9536a716b405e528071ec916410ca043ff071a09dfb0ed2726513c2444359d0d78fe84849f9acff9896b2a184aad4685ee261006cde37acecae3c79046739b9ee8f260f0657fb41bb4c1308b9db879e2faee3ec3b023aa83d3213dc9ac9b4a930de540464fbb1a0e21cebe", &(0x7f0000000680)="c3e57b5064537bd9088edff022006ab9c1c1184436a777721b9a731363d6fc26ee9e98285be4907b49dce3cf8c4b26317dd2a1303a858331a2bcc090c59d50e2da524d52b3cbb8512f883eb78d33ae0402075b4fcc3c16859e98fab252bd78a5e235720acab66a215cdd39bf554cc647998e000f58c762617aa3d3892272c4fe890582c70ee93ac907ca7cc9f0c6b4e87b22cdc1b6cfcd72065d594472147d0234fd5ca36bdbeddead0847db0739c0dd99906d67f62a9dc55d70c9e9f1cca78ea19f10962c408092541f43f9236fa4772858d19bca4fc3bf702ee371dcc2cf4106", 0x0, r3, 0x4}, 0x38)
perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)

604.801657ms ago: executing program 0:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0)
socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0))
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
getpid()
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$ENABLE_STATS(0x20, 0x0, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x7fe2, 0x3}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x15, 0x4, &(0x7f0000000bc0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x52}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x33, 0x7, [@typedef={0x9}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x5, 0x43, 0x10000}], "bffda3"}, @restrict={0x5, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000400)=""/21, 0x53, 0x15, 0x0, 0xb6d}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={r1, 0x20, &(0x7f0000000540)={&(0x7f00000005c0)=""/236, 0xec, 0x0, &(0x7f00000006c0)=""/171, 0xab}}, 0x10)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000010000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r6=>0x0}}, 0x10)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB], 0x0}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000600)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x0, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x3}, 0x90)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_journal_start\x00', r7}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8992, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f00000014c0)=""/4094, 0x0, 0xffe}, 0x20)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x4030582a, &(0x7f0000000040))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0], 0x0, 0xa4, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xc5, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)

538.675477ms ago: executing program 4:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0)
socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={<r2=>0xffffffffffffffff})
sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x170}, 0x8008)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000100), 0x1001)
ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20)

510.425202ms ago: executing program 1:
socketpair$tipc(0x1e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

472.250067ms ago: executing program 3:
bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={<r0=>0xffffffffffffffff})
close(r0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
close(r0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

460.658639ms ago: executing program 3:
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r0}, 0x10)
socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x24, 0x0, 0x0}, 0x90)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x10001, 0x0)
socketpair(0x8, 0x4, 0xc6e, &(0x7f0000000200)={<r2=>0xffffffffffffffff})
sendmsg$inet(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000780)=[{&(0x7f00000006c0)="b4404aa824156e7826371a3e3d654bfeb5d90847c8c3a84b628d81e8a29910037ed8913135a39421b68ecf40a9e062849e145bfb2525905c143d252cdd71cee6a759230f32abe17ec33e914b8e94b4999f5bfde9a3aee7feee8e1260532c63306770baad776ed84a4de3791ae4d16e48becc3386d73e604795bb95deab4099d39f", 0x81}, {&(0x7f0000000880)="f60b7cd070f994cba6ea6680454fba0dcd38d38adbe69f6165feec8398e9ad5bc256d5065b86bc7ce3ae7daed5734344d64e46ed562fd1fcaac0ffe334fe921bcbccf704b38bf73dd3902426e3acdddb70d1eade85bedfe8a6167d711c3cfe2cbe79e8d8d727632abed5ee6b6621308bc499dc8671d1d2642a9bbcc3f0273b7ab98d3775b207b9c7dd8eda3ec60b9dd97e9d7c217529247755f0e0b5d604ee33c492f97c116f4b56b82cef1759a439580b0e68eae5e383e2366fb58d908d5d4a8177944529", 0xc5}, {&(0x7f00000002c0)="b519b3d9bc16a3190c749d43c81b91134ad2ceb965effdd35ace2ff08f1972797474c68bd712c2cdea6e980a1a02afca52ed9c19eef39ca97a9a7f5453a18255dcc5c25bc4e75dd6eed7594bc7d0586bd56dee1c349bcb46063c3e17ab25d2abb7b05a8de6e4ca", 0x67}, {&(0x7f0000000980)="dd382ea180742d4e3e1a25e5471784c0bdb672fcb51e5b7dc12ebb6ad3ad81047dc87c4bde1020e4a728b7d54b4926f204c7335dfcada212ff54a82afc3ce83b5f009b945992b5ab4a75ba9f1777c202ccc26232122fa111871ed3abf3ac73a34732d4731b79a573f14b78175c020ac4526e858c5832d32e73bcdd7a70bb458d4d84451e034a72ec9af63f89f771a5", 0x8f}, {&(0x7f0000000c00)="b9262321531fd21cda4d9232ca22b607e70a5d83f7469b671a07bec72e7aecc47be3d16a1c919a9262a9518a554271c80092974a0aa5a95420f9c8519d2a18796d9fa0c3264d13c2aa4a07d9cea777f0223949db79ecf86e3c43aadb683966edff6070b369bf119c0332895a58668f6a7bdc8d43656517c8653032adbdb673afa776604cbcb3267c7a6d7b02ad626cfd50469babfe40601b14d02fc9b9fdd5eec2111684fb8664ed7871", 0xaa}], 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1400000000000000000000000200000007000000000000001100001900000000000000000100000005000000000000006c00000000000000000000000700000089170effffffff00000000e00000020a010102ac1414bb8907ca0a010101441441816401010100000042640101010000000907073be0100001070898680ea1d23a44181e5000000004000006a300000002000000090000000100000000000000140000000000000000000000010000000080000000000000b8000000000000000000000007000000443400000000009aace000000200000004e000000200000009e000000200010001e0000002000000040a01010100000fff891fe47f000001e0000002ac1414bb64010101ac1414bbe0000002ac1e0101444c6f53ac14144400000001ac14147f00000400ac1414aa0000bfec6401010000000400ac14141800000033e000000100008001ac1414aa00000006ffffffff00000101ac1414aa0000000900"], 0x170}, 0x8008)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
write$cgroup_int(r3, &(0x7f0000000100), 0x1001)
ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}})
ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1820000000000000000400000000000000110000c946dfbb48be4b370cec08da66b23c6c8408800607020f50931949817e471a8c1f8cb312b8fc6d47dace9de0edcae2115f3aed0269a8894d0227ed189d883b09c82617c5263a8986dcd7db2ecc55097371be11ea0ecf5900554c0da8042f491500236e2e347415c15a90efe7b68a3206441f4b57047d3803", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='jbd2_checkpoint_stats\x00', r5}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412)
r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ec0)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000400000000000080b22a36a0018110000", @ANYRES32=r7, @ANYRES8=r6], 0x0, 0x4}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20)

93.863195ms ago: executing program 2:
socketpair$tipc(0x1e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80)
bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000e00)={0x0, &(0x7f0000000cc0)=""/45, 0x0, &(0x7f0000000d80)="2f8aad11d330078fc550b7222f42196f6ee0a6ebf98a9b85da6ad8158851ab347fca6f886c6c374eda04a983bce46ea2a15b690c46e57aad98664242fa802ebd775db837cf470a1747d5ee972f70541988e0097471e9ae2ddc139e4a6c672279b759", 0x101}, 0x38)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r0}, 0x10)
syz_open_procfs$namespace(0x0, 0xfffffffffffffffe)

50.562652ms ago: executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000400)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, <r2=>0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf7, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000000340)}}, 0x10)
close(0xffffffffffffffff)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x1000, 0x7}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff4, 0x0, 0x0, 0x0}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00', r7}, 0x10)
write$cgroup_pid(r5, &(0x7f0000000980), 0x12)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10)
ioctl$SIOCSIFHWADDR(r4, 0x8983, &(0x7f0000000900)={'bridge0\x00', @broadcast})
r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r8}, 0x10)

0s ago: executing program 0:
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48)
close(r0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10)
bpf$MAP_CREATE(0x1600, &(0x7f0000000280)=@base={0x2, 0x4, 0x940e, 0x1, 0x4}, 0x48)

kernel console output (not intermixed with test programs):

Warning: Permanently added '10.128.0.168' (ED25519) to the list of known hosts.
2024/06/10 03:46:46 fuzzer started
2024/06/10 03:46:46 dialing manager at 10.128.0.163:30010
[   20.310950][   T30] audit: type=1400 audit(1717991206.560:66): avc:  denied  { node_bind } for  pid=282 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[   20.318980][   T30] audit: type=1400 audit(1717991206.560:67): avc:  denied  { name_bind } for  pid=282 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[   20.350797][   T30] audit: type=1400 audit(1717991206.600:69): avc:  denied  { integrity } for  pid=291 comm="syz-executor" lockdown_reason="debugfs access" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1
[   20.355063][  T291] cgroup: Unknown subsys name 'net'
[   20.381591][  T291] cgroup: Unknown subsys name 'devices'
[   20.387469][   T30] audit: type=1400 audit(1717991206.600:70): avc:  denied  { mounton } for  pid=291 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   20.413183][   T30] audit: type=1400 audit(1717991206.600:71): avc:  denied  { mount } for  pid=291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   20.435482][   T30] audit: type=1400 audit(1717991206.600:68): avc:  denied  { mounton } for  pid=292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   20.441661][  T298] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   20.460364][   T30] audit: type=1400 audit(1717991206.630:72): avc:  denied  { mount } for  pid=292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
[   20.491612][   T30] audit: type=1400 audit(1717991206.630:73): avc:  denied  { unmount } for  pid=291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   20.494352][  T294] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   20.511583][   T30] audit: type=1400 audit(1717991206.640:74): avc:  denied  { setattr } for  pid=297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=162 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   20.542573][   T30] audit: type=1400 audit(1717991206.720:75): avc:  denied  { relabelto } for  pid=298 comm="mkswap" name="swap-file" dev="sda1" ino=1927 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   20.639394][  T291] cgroup: Unknown subsys name 'hugetlb'
[   20.644985][  T291] cgroup: Unknown subsys name 'rlimit'
2024/06/10 03:46:47 starting 5 executor processes
[   21.812444][  T307] bridge0: port 1(bridge_slave_0) entered blocking state
[   21.819341][  T307] bridge0: port 1(bridge_slave_0) entered disabled state
[   21.826632][  T307] device bridge_slave_0 entered promiscuous mode
[   21.844981][  T307] bridge0: port 2(bridge_slave_1) entered blocking state
[   21.851856][  T307] bridge0: port 2(bridge_slave_1) entered disabled state
[   21.859116][  T307] device bridge_slave_1 entered promiscuous mode
[   21.906892][  T309] bridge0: port 1(bridge_slave_0) entered blocking state
[   21.913852][  T309] bridge0: port 1(bridge_slave_0) entered disabled state
[   21.921093][  T309] device bridge_slave_0 entered promiscuous mode
[   21.933464][  T309] bridge0: port 2(bridge_slave_1) entered blocking state
[   21.940588][  T309] bridge0: port 2(bridge_slave_1) entered disabled state
[   21.947927][  T309] device bridge_slave_1 entered promiscuous mode
[   21.976383][  T311] bridge0: port 1(bridge_slave_0) entered blocking state
[   21.983258][  T311] bridge0: port 1(bridge_slave_0) entered disabled state
[   21.990583][  T311] device bridge_slave_0 entered promiscuous mode
[   22.003718][  T310] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.010594][  T310] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.017874][  T310] device bridge_slave_0 entered promiscuous mode
[   22.024589][  T311] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.031566][  T311] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.038813][  T311] device bridge_slave_1 entered promiscuous mode
[   22.055089][  T310] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.061955][  T310] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.069207][  T310] device bridge_slave_1 entered promiscuous mode
[   22.155382][  T312] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.162328][  T312] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.169544][  T312] device bridge_slave_0 entered promiscuous mode
[   22.176209][  T312] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.183155][  T312] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.190645][  T312] device bridge_slave_1 entered promiscuous mode
[   22.301787][  T309] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.308681][  T309] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.315790][  T309] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.322639][  T309] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.339723][  T307] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.346567][  T307] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.354042][  T307] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.360823][  T307] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.371644][  T310] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.378593][  T310] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.385689][  T310] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.392494][  T310] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.429235][  T311] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.436174][  T311] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.443386][  T311] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.450162][  T311] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.465448][  T312] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.472339][  T312] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.479433][  T312] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.486196][  T312] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.507350][  T317] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.514670][  T317] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.522337][  T317] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.529313][  T317] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.536217][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.543606][  T317] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.550632][  T317] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.557660][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.565774][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.573998][  T317] bridge0: port 1(bridge_slave_0) entered disabled state
[   22.581035][  T317] bridge0: port 2(bridge_slave_1) entered disabled state
[   22.608951][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.616204][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.624830][   T42] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.631669][   T42] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.639469][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.647544][   T42] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.654390][   T42] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.661654][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.669429][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.690683][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.698142][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   22.705424][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   22.712839][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.720922][  T313] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.727798][  T313] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.735233][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.743256][  T313] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.750098][  T313] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.779765][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   22.794359][  T310] device veth0_vlan entered promiscuous mode
[   22.808843][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   22.816775][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.824631][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.832610][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.840405][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.848163][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   22.856187][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   22.864217][  T313] bridge0: port 1(bridge_slave_0) entered blocking state
[   22.871070][  T313] bridge0: port 1(bridge_slave_0) entered forwarding state
[   22.878307][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   22.886375][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   22.894379][  T313] bridge0: port 2(bridge_slave_1) entered blocking state
[   22.901223][  T313] bridge0: port 2(bridge_slave_1) entered forwarding state
[   22.908474][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   22.916234][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   22.924172][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   22.932063][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   22.939972][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   22.947965][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   22.957304][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   22.964543][  T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   22.987934][  T309] device veth0_vlan entered promiscuous mode
[   22.995132][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   23.002677][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   23.010045][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   23.018903][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   23.026806][  T317] bridge0: port 1(bridge_slave_0) entered blocking state
[   23.033578][  T317] bridge0: port 1(bridge_slave_0) entered forwarding state
[   23.040771][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   23.048899][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   23.056804][  T317] bridge0: port 2(bridge_slave_1) entered blocking state
[   23.063683][  T317] bridge0: port 2(bridge_slave_1) entered forwarding state
[   23.070935][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.079130][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.087248][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.095429][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.103365][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   23.111282][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   23.120271][  T310] device veth1_macvtap entered promiscuous mode
[   23.135679][  T307] device veth0_vlan entered promiscuous mode
[   23.144273][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.151661][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.159084][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   23.166920][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   23.175241][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.183369][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.191576][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.199332][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.207430][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.214703][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.233454][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.241759][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.249870][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.261928][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.270062][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.278322][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.286264][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.295405][  T309] device veth1_macvtap entered promiscuous mode
[   23.311068][  T307] device veth1_macvtap entered promiscuous mode
[   23.324075][  T312] device veth0_vlan entered promiscuous mode
[   23.331262][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.339467][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.346802][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.354468][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   23.362602][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.370538][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   23.378009][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.386081][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.394324][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.402320][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.410516][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   23.418597][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   23.438494][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.451450][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.460150][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.468370][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.484310][  T312] device veth1_macvtap entered promiscuous mode
[   23.501451][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.553963][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.557203][    C1] hrtimer: interrupt took 34861 ns
[   23.562567][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.576096][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.584826][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   23.596581][  T311] device veth0_vlan entered promiscuous mode
[   23.619066][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   23.631625][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   23.673942][  T311] device veth1_macvtap entered promiscuous mode
[   23.695038][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   23.711152][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   23.738471][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   23.771991][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   23.799692][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   23.826097][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   23.852084][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   24.299393][  T356] geneve1: tun_chr_ioctl cmd 1074025692
[   25.058720][  T393] syz-executor.2[393] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   25.058818][  T393] syz-executor.2[393] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   25.651969][  T411] geneve1: tun_chr_ioctl cmd 1074025692
[   26.033656][   T30] kauditd_printk_skb: 32 callbacks suppressed
[   26.033673][   T30] audit: type=1400 audit(1717991212.280:108): avc:  denied  { setopt } for  pid=432 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1
[   26.466292][  T454] bond_slave_1: mtu greater than device maximum
[   27.303300][   T30] audit: type=1400 audit(1717991213.550:109): avc:  denied  { read write } for  pid=483 comm="syz-executor.2" name="ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   27.383060][   T30] audit: type=1400 audit(1717991213.550:110): avc:  denied  { open } for  pid=483 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   27.408676][   T30] audit: type=1400 audit(1717991213.580:111): avc:  denied  { ioctl } for  pid=483 comm="syz-executor.2" path="/dev/ppp" dev="devtmpfs" ino=134 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1
[   28.459686][   T30] audit: type=1400 audit(1717991214.700:112): avc:  denied  { write } for  pid=536 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   28.515984][   T30] audit: type=1400 audit(1717991214.760:113): avc:  denied  { create } for  pid=536 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1
[   28.837817][   T30] audit: type=1400 audit(1717991215.090:114): avc:  denied  { relabelfrom } for  pid=564 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[   28.879738][   T30] audit: type=1400 audit(1717991215.090:115): avc:  denied  { relabelto } for  pid=564 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1
[   29.694709][   T30] audit: type=1400 audit(1717991215.940:116): avc:  denied  { create } for  pid=580 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   29.826268][  T599] bridge0: port 2(bridge_slave_1) entered disabled state
[   29.833339][  T599] bridge0: port 1(bridge_slave_0) entered disabled state
[   30.810835][  T618] device pim6reg1 entered promiscuous mode
[   31.152044][  T637] syz-executor.2[637] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   31.152142][  T637] syz-executor.2[637] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   32.312161][  T667] syz-executor.0[667] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   32.329702][  T667] syz-executor.0[667] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   32.329709][  T664] device pim6reg1 entered promiscuous mode
[   32.425576][  T670] syz-executor.1 (670) used greatest stack depth: 21616 bytes left
[   32.497688][   T30] audit: type=1400 audit(1717991218.750:117): avc:  denied  { create } for  pid=693 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[   34.392188][   T30] audit: type=1400 audit(1717991220.640:118): avc:  denied  { create } for  pid=795 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[   34.843990][  T808] device pim6reg1 entered promiscuous mode
[   35.515678][  T850] device pim6reg1 entered promiscuous mode
[   37.027176][    C0] sched: RT throttling activated
[   39.157016][  T885] bridge0: port 1(bridge_slave_0) entered blocking state
[   39.200398][  T885] bridge0: port 1(bridge_slave_0) entered disabled state
[   39.222691][  T885] device bridge_slave_0 entered promiscuous mode
[   39.259178][  T312] syz-executor.4 (312) used greatest stack depth: 20880 bytes left
[   39.294810][  T885] bridge0: port 2(bridge_slave_1) entered blocking state
[   39.375145][  T885] bridge0: port 2(bridge_slave_1) entered disabled state
[   39.451448][  T885] device bridge_slave_1 entered promiscuous mode
[   39.816943][  T925] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   39.892980][  T885] bridge0: port 2(bridge_slave_1) entered blocking state
[   39.899877][  T885] bridge0: port 2(bridge_slave_1) entered forwarding state
[   39.907039][  T885] bridge0: port 1(bridge_slave_0) entered blocking state
[   39.913853][  T885] bridge0: port 1(bridge_slave_0) entered forwarding state
[   39.997057][   T42] bridge0: port 1(bridge_slave_0) entered disabled state
[   40.010727][   T42] bridge0: port 2(bridge_slave_1) entered disabled state
[   40.028713][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   40.078102][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   40.127469][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   40.162321][  T902] bridge0: port 1(bridge_slave_0) entered blocking state
[   40.169223][  T902] bridge0: port 1(bridge_slave_0) entered forwarding state
[   40.207636][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   40.215784][  T902] bridge0: port 2(bridge_slave_1) entered blocking state
[   40.222778][  T902] bridge0: port 2(bridge_slave_1) entered forwarding state
[   40.230333][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   40.242698][  T957] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   40.253463][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   40.269120][  T958] device veth0_vlan left promiscuous mode
[   40.275122][  T958] device veth0_vlan entered promiscuous mode
[   40.297256][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   40.305309][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   40.317022][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   40.346778][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   40.355293][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   40.399126][  T885] device veth0_vlan entered promiscuous mode
[   40.409212][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   40.409255][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.417005][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.429333][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   40.455721][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.455782][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.471847][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.483550][  T967] syz-executor.2[967] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   40.539580][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   40.647977][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   40.657431][   T10] device bridge_slave_1 left promiscuous mode
[   40.663464][   T10] bridge0: port 2(bridge_slave_1) entered disabled state
[   40.735902][   T10] device bridge_slave_0 left promiscuous mode
[   40.782788][   T10] bridge0: port 1(bridge_slave_0) entered disabled state
[   40.813599][   T10] device veth1_macvtap left promiscuous mode
[   40.874803][   T10] device veth0_vlan left promiscuous mode
[   41.356218][  T885] device veth1_macvtap entered promiscuous mode
[   41.436495][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   41.447985][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   41.456009][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   41.522651][  T997] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   41.551057][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   41.559160][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   41.567419][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   41.575589][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   42.345278][ T1036] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   43.261495][ T1083] device pim6reg1 entered promiscuous mode
[   44.327449][ T1129] device pim6reg1 entered promiscuous mode
[   44.542943][ T1145] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1
[   46.279496][ T1206] device pim6reg1 entered promiscuous mode
[   48.011217][   T30] audit: type=1400 audit(1717991234.260:119): avc:  denied  { create } for  pid=1274 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1
[   48.055815][ T1273] device sit0 entered promiscuous mode
[   48.457222][ T1301] device pim6reg1 entered promiscuous mode
[   49.419941][  T384] device bridge_slave_1 left promiscuous mode
[   49.425996][  T384] bridge0: port 2(bridge_slave_1) entered disabled state
[   49.443637][  T384] device bridge_slave_0 left promiscuous mode
[   49.449688][  T384] bridge0: port 1(bridge_slave_0) entered disabled state
[   49.457858][  T384] device veth1_macvtap left promiscuous mode
[   49.463744][  T384] device veth0_vlan left promiscuous mode
[   49.942299][ T1318] bridge0: port 1(bridge_slave_0) entered blocking state
[   49.975511][ T1318] bridge0: port 1(bridge_slave_0) entered disabled state
[   49.988875][ T1318] device bridge_slave_0 entered promiscuous mode
[   49.996453][ T1318] bridge0: port 2(bridge_slave_1) entered blocking state
[   50.003707][ T1318] bridge0: port 2(bridge_slave_1) entered disabled state
[   50.040858][ T1318] device bridge_slave_1 entered promiscuous mode
[   50.466335][ T1351] device veth0_vlan left promiscuous mode
[   50.479295][ T1351] device veth0_vlan entered promiscuous mode
[   50.526375][  T890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   50.535278][  T890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   50.542729][  T890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   50.691492][    C0] ------------[ cut here ]------------
[   50.696781][    C0] WARNING: CPU: 0 PID: 1348 at kernel/softirq.c:358 __local_bh_enable_ip+0x6c/0x80
[   50.700388][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   50.705895][    C0] Modules linked in:
[   50.705917][    C0] CPU: 0 PID: 1348 Comm: syz-executor.1 Not tainted 5.15.149-syzkaller-00131-g79bd336c7a94 #0
[   50.713512][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   50.716650][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[   50.716670][    C0] RIP: 0010:__local_bh_enable_ip+0x6c/0x80
[   50.749653][    C0] Code: 66 8b 05 27 89 c0 7e 66 85 c0 75 22 bf 01 00 00 00 e8 98 42 09 00 65 8b 05 99 86 bf 7e 85 c0 74 02 5d c3 e8 9a 9a bd ff 5d c3 <0f> 0b eb a2 e8 0b 00 00 00 eb d7 66 0f 1f 84 00 00 00 00 00 55 48
[   50.769072][    C0] RSP: 0018:ffffc900000077c0 EFLAGS: 00010006
[   50.774973][    C0] RAX: 0000000080010204 RBX: ffff888100b9d558 RCX: dffffc0000000000
[   50.782871][    C0] RDX: 0000000080010204 RSI: 0000000000000201 RDI: ffffffff83fe68e2
[   50.790771][    C0] RBP: ffffc900000077c0 R08: ffffffff83fe673f R09: 0000000000000003
[   50.798582][    C0] R10: fffff52000000eec R11: dffffc0000000001 R12: 0000000000000000
[   50.806393][    C0] R13: dffffc0000000000 R14: 00000000fffffffe R15: ffff88810ac2c710
[   50.814205][    C0] FS:  00007fa34b8356c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[   50.822969][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   50.829394][    C0] CR2: 000000000000000b CR3: 0000000125f9f000 CR4: 00000000003506b0
[   50.837206][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   50.845018][    C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   50.852841][    C0] Call Trace:
[   50.855952][    C0]  <IRQ>
[   50.858645][    C0]  ? show_regs+0x58/0x60
[   50.862725][    C0]  ? __warn+0x160/0x2f0
[   50.866716][    C0]  ? __local_bh_enable_ip+0x6c/0x80
[   50.871753][    C0]  ? report_bug+0x3d9/0x5b0
[   50.876097][    C0]  ? __local_bh_enable_ip+0x6c/0x80
[   50.881124][    C0]  ? handle_bug+0x41/0x70
[   50.885291][    C0]  ? exc_invalid_op+0x1b/0x50
[   50.889805][    C0]  ? asm_exc_invalid_op+0x1b/0x20
[   50.894663][    C0]  ? sock_hash_delete_elem+0xff/0x2f0
[   50.899871][    C0]  ? sock_hash_delete_elem+0x2a2/0x2f0
[   50.905169][    C0]  ? __local_bh_enable_ip+0x6c/0x80
[   50.910201][    C0]  _raw_spin_unlock_bh+0x51/0x60
[   50.914971][    C0]  sock_hash_delete_elem+0x2a2/0x2f0
[   50.920096][    C0]  bpf_prog_bc4ba9860fbb0da4+0x3e/0x54c
[   50.925475][    C0]  bpf_trace_run4+0x13f/0x270
[   50.930078][    C0]  ? bpf_trace_run3+0x250/0x250
[   50.934763][    C0]  ? __alloc_pages+0x8f0/0x8f0
[   50.939366][    C0]  __bpf_trace_mm_page_alloc+0xbf/0xf0
[   50.944658][    C0]  __traceiter_mm_page_alloc+0x3a/0x60
[   50.949952][    C0]  __alloc_pages+0x3cb/0x8f0
[   50.954378][    C0]  ? prep_new_page+0x110/0x110
[   50.958978][    C0]  ? __this_cpu_preempt_check+0x13/0x20
[   50.964361][    C0]  ? hrtimer_forward+0x1a6/0x2c0
[   50.969135][    C0]  new_slab+0x9a/0x4e0
[   50.973044][    C0]  ___slab_alloc+0x39e/0x830
[   50.977477][    C0]  ? cpu_clock_event_read+0x50/0x50
[   50.982498][    C0]  ? __sigqueue_alloc+0x130/0x200
[   50.987361][    C0]  ? __sigqueue_alloc+0x130/0x200
[   50.992221][    C0]  __slab_alloc+0x4a/0x90
[   50.996386][    C0]  ? __sigqueue_alloc+0x130/0x200
[   51.001246][    C0]  kmem_cache_alloc+0x134/0x200
[   51.005938][    C0]  __sigqueue_alloc+0x130/0x200
[   51.010622][    C0]  __send_signal+0x1fd/0xcb0
[   51.015048][    C0]  send_signal+0x43a/0x590
[   51.019301][    C0]  do_send_sig_info+0xde/0x230
[   51.023909][    C0]  group_send_sig_info+0x113/0x460
[   51.028848][    C0]  ? __lock_task_sighand+0x100/0x100
[   51.033975][    C0]  ? clockevents_program_event+0x22f/0x300
[   51.039611][    C0]  do_bpf_send_signal+0x8c/0x150
[   51.044385][    C0]  irq_work_run_list+0x1c2/0x290
[   51.049160][    C0]  ? irq_work_run+0xf0/0xf0
[   51.053522][    C0]  irq_work_run+0x69/0xf0
[   51.057663][    C0]  __sysvec_irq_work+0x63/0x1b0
[   51.062355][    C0]  sysvec_irq_work+0x92/0xb0
[   51.066863][    C0]  </IRQ>
[   51.069642][    C0]  <TASK>
[   51.072417][    C0]  asm_sysvec_irq_work+0x1b/0x20
[   51.077192][    C0] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70
[   51.082833][    C0] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 <e8> 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57
[   51.102277][    C0] RSP: 0018:ffffc9000380fbb8 EFLAGS: 00000246
[   51.108179][    C0] RAX: 0000000000000001 RBX: ffff88813f9fbd40 RCX: dffffc0000000000
[   51.116074][    C0] RDX: ffffc9000170f000 RSI: 000000000003ffff RDI: 0000000000000001
[   51.123887][    C0] RBP: ffffc9000380fbc0 R08: ffffffff81456d9a R09: fffff52000701fc0
[   51.131702][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88813f9fbd40
[   51.139507][    C0] R13: ffff88813f9fc160 R14: 0000000000000021 R15: dffffc0000000000
[   51.147326][    C0]  ? get_signal+0x151a/0x1630
[   51.151836][    C0]  ? _raw_spin_unlock_irq+0x41/0x70
[   51.156870][    C0]  get_signal+0x1562/0x1630
[   51.161212][    C0]  arch_do_signal_or_restart+0xbd/0x1680
[   51.166676][    C0]  ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0
[   51.172926][    C0]  ? _raw_spin_lock_irq+0xa5/0x1b0
[   51.177877][    C0]  ? __kasan_check_write+0x14/0x20
[   51.182821][    C0]  ? _copy_from_user+0x96/0xd0
[   51.187423][    C0]  ? restore_altstack+0x274/0x400
[   51.192283][    C0]  ? get_sigframe_size+0x10/0x10
[   51.197054][    C0]  ? __ia32_sys_sigaltstack+0x70/0x70
[   51.202266][    C0]  ? __do_sys_rt_sigreturn+0x160/0x1e0
[   51.207604][    C0]  exit_to_user_mode_loop+0xa0/0xe0
[   51.212589][    C0]  exit_to_user_mode_prepare+0x5a/0xa0
[   51.217887][    C0]  syscall_exit_to_user_mode+0x26/0x160
[   51.223265][    C0]  do_syscall_64+0x49/0xb0
[   51.227521][    C0]  ? sysvec_apic_timer_interrupt+0x55/0xc0
[   51.233192][    C0]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   51.238889][    C0] RIP: 0033:0x7fa34c465880
[   51.243146][    C0] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31
[   51.262587][    C0] RSP: 002b:00007fa34b8342b8 EFLAGS: 00000283
[   51.268486][    C0] RAX: 0000000000000000 RBX: 00007fa34b834dc0 RCX: 00007fa34c5bbbc0
[   51.276297][    C0] RDX: 00007fa34b8342c0 RSI: 00007fa34b8343f0 RDI: 000000000000000b
[   51.284194][    C0] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000
[   51.292008][    C0] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073
[   51.299817][    C0] R13: 00007fa34b834f40 R14: 9999999999999999 R15: 0000000000000000
[   51.307634][    C0]  </TASK>
[   51.310492][    C0] ---[ end trace 78a9421c7c2f46e4 ]---
[   51.360482][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   51.385114][  T902] bridge0: port 1(bridge_slave_0) entered blocking state
[   51.392013][  T902] bridge0: port 1(bridge_slave_0) entered forwarding state
[   51.402869][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   51.477504][  T902] bridge0: port 2(bridge_slave_1) entered blocking state
[   51.484365][  T902] bridge0: port 2(bridge_slave_1) entered forwarding state
[   51.537385][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   51.563668][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   51.598020][  T902] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   51.640865][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[   51.650076][    T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   51.666403][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[   51.682763][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   51.691447][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   51.701973][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   51.710022][ T1318] device veth0_vlan entered promiscuous mode
[   51.734124][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[   51.759011][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   51.767476][ T1318] device veth1_macvtap entered promiscuous mode
[   51.800944][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[   51.835650][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[   51.843918][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   51.852109][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[   51.860182][  T330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[   52.500109][ T1398] device syzkaller0 entered promiscuous mode
[   57.477699][ T1567] device pim6reg1 entered promiscuous mode
[   57.671739][   T30] audit: type=1400 audit(1717991243.920:120): avc:  denied  { tracepoint } for  pid=1593 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1
[   58.283348][ T1633] device veth0_vlan left promiscuous mode
[   58.293864][ T1633] device veth0_vlan entered promiscuous mode
[   58.321613][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   58.330677][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   58.342093][  T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   58.371903][ T1635] device wg2 entered promiscuous mode
[   58.499184][ T1639] ������: renamed from vlan0
[   58.921467][ T1660] device wg2 entered promiscuous mode
[   58.982231][ T1663] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   59.099781][ T1681] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   59.145764][   T30] audit: type=1400 audit(1717991245.390:121): avc:  denied  { create } for  pid=1686 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[   59.325772][ T1696] device veth0_vlan left promiscuous mode
[   59.340515][ T1696] device veth0_vlan entered promiscuous mode
[   59.434374][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   59.442616][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   59.453216][   T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   59.463862][ T1704] device veth0_vlan left promiscuous mode
[   59.505937][ T1704] device veth0_vlan entered promiscuous mode
[   59.528575][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   59.540079][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): ������: link becomes ready
[   59.560734][  T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   59.609430][ T1709] device wg2 entered promiscuous mode
[   59.767501][ T1732] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET)
[   59.884427][ T1736] device bridge0 entered promiscuous mode
[   60.222728][ T1769] device wg2 entered promiscuous mode
[   60.723265][ T1803] syz-executor.1[1803] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   60.723339][ T1803] syz-executor.1[1803] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   60.912151][ T1811] device wg2 left promiscuous mode
[   60.994178][ T1811] device wg2 entered promiscuous mode
[   61.728748][ T1866] device veth0_vlan left promiscuous mode
[   61.742790][ T1866] device veth0_vlan entered promiscuous mode
[   61.764791][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   61.808320][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   61.856500][   T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   62.694122][ T1927] device wg2 left promiscuous mode
[   65.129381][   T30] audit: type=1400 audit(1717991251.380:122): avc:  denied  { ioctl } for  pid=2072 comm="syz-executor.1" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[   65.648943][ T2099] syz-executor.4[2099] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   65.649017][ T2099] syz-executor.4[2099] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   66.254017][ T2141] syz-executor.3[2141] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   66.265836][ T2141] syz-executor.3[2141] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   66.387628][ T2144] device sit0 entered promiscuous mode
[   66.939218][ T2154] device wg2 entered promiscuous mode
[   67.166321][ T2176] device sit0 entered promiscuous mode
[   67.876297][   T30] audit: type=1400 audit(1717991254.120:123): avc:  denied  { create } for  pid=2192 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[   68.372433][ T2219] device sit0 left promiscuous mode
[   68.509756][ T2219] device sit0 entered promiscuous mode
[   69.652394][ T2275] device sit0 entered promiscuous mode
[   69.991266][ T2280] syz-executor.4[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   69.991342][ T2280] syz-executor.4[2280] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   70.212542][ T2293] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   70.693134][ T2314] device sit0 left promiscuous mode
[   70.828639][ T2315] device sit0 entered promiscuous mode
[   72.193618][ T2345] device syzkaller0 entered promiscuous mode
[   74.928376][ T2470] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   76.322747][ T2567] vlan0: mtu less than device minimum
[   78.590205][ T2658] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 1 (only 8 groups)
[   78.761030][   T30] audit: type=1400 audit(1717991265.010:124): avc:  denied  { create } for  pid=2681 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1
[   78.847572][   T30] audit: type=1400 audit(1717991265.100:125): avc:  denied  { read } for  pid=82 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[   82.060003][   T30] audit: type=1400 audit(1717991268.300:126): avc:  denied  { create } for  pid=2811 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[   82.351287][ T2816] device syzkaller0 entered promiscuous mode
[   82.675476][ T2824] device veth0_vlan left promiscuous mode
[   82.681402][ T2824] device veth0_vlan entered promiscuous mode
[   82.704304][ T2836] device pim6reg1 entered promiscuous mode
[   82.710914][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   82.719726][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   82.728996][ T1741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   83.366795][ T2860] device sit0 left promiscuous mode
[   83.832198][ T2878] device syzkaller0 entered promiscuous mode
[   84.303249][ T2888] device syzkaller0 entered promiscuous mode
[   84.688862][ T2920] syz-executor.0[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   84.688930][ T2920] syz-executor.0[2920] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   84.718033][ T2921] syz-executor.0[2921] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   84.777245][ T2921] syz-executor.0[2921] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   85.365840][ T2947] device syzkaller0 entered promiscuous mode
[   85.654968][ T2949] device syzkaller0 entered promiscuous mode
[   85.872377][ T2962] device syzkaller0 entered promiscuous mode
[   86.428950][ T2991] syz-executor.1[2991] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   86.429014][ T2991] syz-executor.1[2991] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   86.763969][ T2998] device syzkaller0 entered promiscuous mode
[   87.047107][ T3013] device syzkaller0 entered promiscuous mode
[   88.275476][ T3071] device wg2 entered promiscuous mode
[   88.509853][ T3065] device syzkaller0 entered promiscuous mode
[   89.680872][   T30] audit: type=1400 audit(1717991275.930:127): avc:  denied  { create } for  pid=3110 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[   90.510341][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.510408][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.522826][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.534548][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.654868][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.687329][ T3146] syz-executor.4[3146] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   90.747434][ T3155] device wg2 left promiscuous mode
[   92.492889][ T3245] syz-executor.0[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   92.492951][ T3245] syz-executor.0[3245] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   92.535742][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   92.572258][ T3247] syz-executor.3[3247] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   92.827914][ T3279] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups)
[   93.121479][ T3313] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further
[   93.382482][ T3334] device wg2 left promiscuous mode
[   93.470516][   T30] audit: type=1400 audit(1717991279.720:128): avc:  denied  { create } for  pid=3339 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[   93.860505][   T30] audit: type=1400 audit(1717991280.110:129): avc:  denied  { create } for  pid=3377 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[   93.893171][ T3378] device syzkaller0 entered promiscuous mode
[   94.091161][ T3402] device syzkaller0 entered promiscuous mode
[   95.729374][ T3498] bpf_get_probe_write_proto: 2 callbacks suppressed
[   95.729390][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.735946][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.748693][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.765388][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.792527][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   95.837484][ T3498] syz-executor.3[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   96.629107][   T30] audit: type=1400 audit(1717991282.880:130): avc:  denied  { create } for  pid=3593 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[   96.882501][   T30] audit: type=1400 audit(1717991283.130:131): avc:  denied  { create } for  pid=3615 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[   96.992357][ T3623] EXT4-fs warning (device sda1): __ext4_ioctl:881: Setting inode version is not supported with metadata_csum enabled.
[   98.265563][ T3695] device veth1_macvtap left promiscuous mode
[   98.274790][ T3695] device veth1_macvtap entered promiscuous mode
[   98.281312][ T3695] device macsec0 entered promiscuous mode
[   99.042187][ T3762] device veth0_vlan left promiscuous mode
[   99.065050][ T3762] device veth0_vlan entered promiscuous mode
[   99.648343][ T3824] syz-executor.3[3824] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[   99.648399][ T3824] syz-executor.3[3824] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  101.073350][   T30] audit: type=1400 audit(1717991287.320:132): avc:  denied  { create } for  pid=3926 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  102.079721][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.079782][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.096673][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.108389][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.145102][ T4000] sit0: mtu greater than device maximum
[  102.175346][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  102.175433][ T3999] syz-executor.3[3999] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  103.378954][ T4078] device syzkaller0 entered promiscuous mode
[  103.662604][ T4117] device pim6reg1 entered promiscuous mode
[  104.320361][ T4159] device syzkaller0 entered promiscuous mode
[  105.219242][ T4214] device syzkaller0 entered promiscuous mode
[  105.253119][ T4221] EXT4-fs warning (device sda1): ext4_group_extend:1830: need to use ext2online to resize further
[  105.515891][   T30] audit: type=1400 audit(1717991291.750:133): avc:  denied  { create } for  pid=4245 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1
[  105.753438][ T4279] syz-executor.1[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  105.753498][ T4279] syz-executor.1[4279] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  105.777445][ T4278] syz-executor.1[4278] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  105.794626][ T4278] syz-executor.1[4278] is installing a program with bpf_probe_write_user helper that may corrupt user memory!
[  105.807044][ T4275] device syzkaller0 entered promiscuous mode
[  107.786125][ T4413] device bridge0 entered promiscuous mode
[  114.630580][ T4636] device syzkaller0 entered promiscuous mode
[  116.113051][ T4710] device syzkaller0 entered promiscuous mode
[  117.973418][ T4799] ������: renamed from vlan0
[  120.858012][ T4912] tap0: tun_chr_ioctl cmd 1074025678
[  120.863311][ T4912] tap0: group set to 0
[  121.032932][ T4928] device veth0_vlan left promiscuous mode
[  121.084997][ T4928] device veth0_vlan entered promiscuous mode
[  121.175335][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  121.184778][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): ������: link becomes ready
[  121.195633][ T2553] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  222.947159][    C0] rcu: INFO: rcu_preempt self-detected stall on CPU
[  222.953601][    C0] rcu: 	0-...!: (10001 ticks this GP) idle=619/1/0x4000000000000000 softirq=18776/18776 fqs=0 last_accelerate: ba7f/e19a dyntick_enabled: 1
[  222.967652][    C0] 	(t=10001 jiffies g=18777 q=132)
[  222.972583][    C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10000 jiffies! g18777 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402
[  222.984728][    C0] rcu: 	Possible timer handling issue on cpu=0 timer-softirq=4709
[  222.992367][    C0] rcu: rcu_preempt kthread starved for 10001 jiffies! g18777 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0
[  223.003562][    C0] rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
[  223.013370][    C0] rcu: RCU grace-period kthread stack dump:
[  223.019099][    C0] task:rcu_preempt     state:I stack:28328 pid:   14 ppid:     2 flags:0x00004000
[  223.028131][    C0] Call Trace:
[  223.031251][    C0]  <TASK>
[  223.034033][    C0]  __schedule+0xccc/0x1590
[  223.038284][    C0]  ? __sched_text_start+0x8/0x8
[  223.042971][    C0]  ? __kasan_check_write+0x14/0x20
[  223.047916][    C0]  schedule+0x11f/0x1e0
[  223.051995][    C0]  schedule_timeout+0x18c/0x370
[  223.056683][    C0]  ? _raw_spin_unlock_irq+0x4e/0x70
[  223.061717][    C0]  ? console_conditional_schedule+0x30/0x30
[  223.067445][    C0]  ? update_process_times+0x200/0x200
[  223.072652][    C0]  ? prepare_to_swait_event+0x308/0x320
[  223.078063][    C0]  rcu_gp_fqs_loop+0x2af/0xf80
[  223.082799][    C0]  ? debug_smp_processor_id+0x17/0x20
[  223.087932][    C0]  ? __note_gp_changes+0x4ab/0x920
[  223.092876][    C0]  ? rcu_gp_init+0xc30/0xc30
[  223.097417][    C0]  ? _raw_spin_unlock_irq+0x4e/0x70
[  223.102449][    C0]  ? rcu_gp_init+0x9cf/0xc30
[  223.106886][    C0]  rcu_gp_kthread+0xa4/0x350
[  223.111304][    C0]  ? _raw_spin_lock+0x1b0/0x1b0
[  223.115990][    C0]  ? wake_nocb_gp+0x1e0/0x1e0
[  223.120502][    C0]  ? __kasan_check_read+0x11/0x20
[  223.125374][    C0]  ? __kthread_parkme+0xb2/0x200
[  223.130139][    C0]  kthread+0x421/0x510
[  223.134044][    C0]  ? wake_nocb_gp+0x1e0/0x1e0
[  223.138559][    C0]  ? kthread_blkcg+0xd0/0xd0
[  223.142984][    C0]  ret_from_fork+0x1f/0x30
[  223.147237][    C0]  </TASK>
[  223.150103][    C0] rcu: Stack dump where RCU GP kthread last ran:
[  223.156273][    C0] NMI backtrace for cpu 0
[  223.160433][    C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G        W         5.15.149-syzkaller-00131-g79bd336c7a94 #0
[  223.171888][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  223.181779][    C0] Call Trace:
[  223.184903][    C0]  <IRQ>
[  223.187594][    C0]  dump_stack_lvl+0x151/0x1b7
[  223.192223][    C0]  ? io_uring_drop_tctx_refs+0x190/0x190
[  223.197696][    C0]  dump_stack+0x15/0x17
[  223.201691][    C0]  nmi_cpu_backtrace+0x2f7/0x300
[  223.206545][    C0]  ? nmi_trigger_cpumask_backtrace+0x270/0x270
[  223.212534][    C0]  ? panic+0x751/0x751
[  223.216437][    C0]  ? arch_trigger_cpumask_backtrace+0x20/0x20
[  223.222343][    C0]  nmi_trigger_cpumask_backtrace+0x15d/0x270
[  223.228152][    C0]  ? arch_trigger_cpumask_backtrace+0x20/0x20
[  223.234056][    C0]  arch_trigger_cpumask_backtrace+0x10/0x20
[  223.239784][    C0]  rcu_check_gp_kthread_starvation+0x1e3/0x250
[  223.245779][    C0]  ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230
[  223.252543][    C0]  print_cpu_stall+0x310/0x5f0
[  223.257154][    C0]  rcu_sched_clock_irq+0x989/0x12f0
[  223.262179][    C0]  ? rcu_boost_kthread_setaffinity+0x340/0x340
[  223.268169][    C0]  ? hrtimer_run_queues+0x15f/0x440
[  223.273202][    C0]  update_process_times+0x198/0x200
[  223.278237][    C0]  tick_sched_timer+0x188/0x240
[  223.282920][    C0]  ? tick_setup_sched_timer+0x480/0x480
[  223.288303][    C0]  __hrtimer_run_queues+0x41a/0xad0
[  223.293339][    C0]  ? hrtimer_interrupt+0xaa0/0xaa0
[  223.298283][    C0]  ? clockevents_program_event+0x22f/0x300
[  223.303922][    C0]  ? ktime_get_update_offsets_now+0x2ba/0x2d0
[  223.309828][    C0]  hrtimer_interrupt+0x40c/0xaa0
[  223.314605][    C0]  __sysvec_apic_timer_interrupt+0xfd/0x3c0
[  223.320329][    C0]  sysvec_apic_timer_interrupt+0x95/0xc0
[  223.325795][    C0]  </IRQ>
[  223.328575][    C0]  <TASK>
[  223.331351][    C0]  asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  223.337171][    C0] RIP: 0010:kvm_wait+0x147/0x180
[  223.342139][    C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 <e9> 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c
[  223.361745][    C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246
[  223.367653][    C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f
[  223.375538][    C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090
[  223.383346][    C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213
[  223.391158][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  223.398972][    C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34
[  223.406809][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  223.412861][    C0]  ? asm_common_interrupt+0x27/0x40
[  223.417892][    C0]  ? kvm_arch_para_hints+0x30/0x30
[  223.422842][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  223.428917][    C0]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  223.434819][    C0]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  223.441083][    C0]  ? __kasan_check_write+0x14/0x20
[  223.446014][    C0]  _raw_spin_lock_bh+0x139/0x1b0
[  223.450787][    C0]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  223.455823][    C0]  ? __local_bh_enable_ip+0x58/0x80
[  223.460858][    C0]  ? lock_sock_nested+0x266/0x300
[  223.465811][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.470315][    C0]  sk_psock_link_pop+0x2e/0x170
[  223.475001][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.479430][    C0]  sock_map_remove_links+0x25/0x570
[  223.484465][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.488890][    C0]  sock_map_close+0x2ac/0x4c0
[  223.493403][    C0]  ? sock_map_remove_links+0x570/0x570
[  223.498699][    C0]  ? rwsem_mark_wake+0x6b0/0x6b0
[  223.503481][    C0]  unix_release+0x82/0xc0
[  223.507637][    C0]  sock_close+0xdf/0x270
[  223.511717][    C0]  ? sock_mmap+0xa0/0xa0
[  223.515795][    C0]  __fput+0x3fe/0x910
[  223.519616][    C0]  ____fput+0x15/0x20
[  223.523431][    C0]  task_work_run+0x129/0x190
[  223.527863][    C0]  exit_to_user_mode_loop+0xc4/0xe0
[  223.532979][    C0]  exit_to_user_mode_prepare+0x5a/0xa0
[  223.538275][    C0]  syscall_exit_to_user_mode+0x26/0x160
[  223.543658][    C0]  do_syscall_64+0x49/0xb0
[  223.547910][    C0]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  223.553637][    C0] RIP: 0033:0x7f7351c00e5a
[  223.557897][    C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24
[  223.577335][    C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  223.585580][    C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a
[  223.593393][    C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  223.601200][    C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001
[  223.609013][    C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80
[  223.616910][    C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980
[  223.624725][    C0]  </TASK>
[  223.627623][    C0] NMI backtrace for cpu 0
[  223.631754][    C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G        W         5.15.149-syzkaller-00131-g79bd336c7a94 #0
[  223.643211][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  223.653191][    C0] Call Trace:
[  223.656318][    C0]  <IRQ>
[  223.659006][    C0]  dump_stack_lvl+0x151/0x1b7
[  223.663522][    C0]  ? io_uring_drop_tctx_refs+0x190/0x190
[  223.668987][    C0]  ? ttwu_do_wakeup+0x187/0x430
[  223.673675][    C0]  dump_stack+0x15/0x17
[  223.677675][    C0]  nmi_cpu_backtrace+0x2f7/0x300
[  223.682442][    C0]  ? nmi_trigger_cpumask_backtrace+0x270/0x270
[  223.688470][    C0]  ? _raw_spin_lock_irqsave+0xf9/0x210
[  223.693724][    C0]  ? __kasan_check_write+0x14/0x20
[  223.698673][    C0]  ? _raw_spin_lock+0x1b0/0x1b0
[  223.703358][    C0]  ? arch_trigger_cpumask_backtrace+0x20/0x20
[  223.709269][    C0]  nmi_trigger_cpumask_backtrace+0x15d/0x270
[  223.715075][    C0]  ? arch_trigger_cpumask_backtrace+0x20/0x20
[  223.720978][    C0]  arch_trigger_cpumask_backtrace+0x10/0x20
[  223.726706][    C0]  rcu_dump_cpu_stacks+0x1d8/0x330
[  223.731656][    C0]  print_cpu_stall+0x315/0x5f0
[  223.736256][    C0]  rcu_sched_clock_irq+0x989/0x12f0
[  223.741329][    C0]  ? rcu_boost_kthread_setaffinity+0x340/0x340
[  223.747279][    C0]  ? hrtimer_run_queues+0x15f/0x440
[  223.752322][    C0]  update_process_times+0x198/0x200
[  223.757347][    C0]  tick_sched_timer+0x188/0x240
[  223.762032][    C0]  ? tick_setup_sched_timer+0x480/0x480
[  223.767413][    C0]  __hrtimer_run_queues+0x41a/0xad0
[  223.772450][    C0]  ? hrtimer_interrupt+0xaa0/0xaa0
[  223.777394][    C0]  ? clockevents_program_event+0x22f/0x300
[  223.783049][    C0]  ? ktime_get_update_offsets_now+0x2ba/0x2d0
[  223.789092][    C0]  hrtimer_interrupt+0x40c/0xaa0
[  223.793868][    C0]  __sysvec_apic_timer_interrupt+0xfd/0x3c0
[  223.799670][    C0]  sysvec_apic_timer_interrupt+0x95/0xc0
[  223.805140][    C0]  </IRQ>
[  223.807913][    C0]  <TASK>
[  223.810690][    C0]  asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  223.816638][    C0] RIP: 0010:kvm_wait+0x147/0x180
[  223.821405][    C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 <e9> 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c
[  223.840848][    C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246
[  223.846747][    C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f
[  223.854572][    C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090
[  223.862370][    C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213
[  223.870181][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  223.877993][    C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34
[  223.885824][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  223.891883][    C0]  ? asm_common_interrupt+0x27/0x40
[  223.897027][    C0]  ? kvm_arch_para_hints+0x30/0x30
[  223.901960][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  223.908025][    C0]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  223.913928][    C0]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  223.920184][    C0]  ? __kasan_check_write+0x14/0x20
[  223.925124][    C0]  _raw_spin_lock_bh+0x139/0x1b0
[  223.929897][    C0]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  223.934930][    C0]  ? __local_bh_enable_ip+0x58/0x80
[  223.939965][    C0]  ? lock_sock_nested+0x266/0x300
[  223.944825][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.949253][    C0]  sk_psock_link_pop+0x2e/0x170
[  223.953937][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.958366][    C0]  sock_map_remove_links+0x25/0x570
[  223.963403][    C0]  ? unix_peer_get+0xe0/0xe0
[  223.967923][    C0]  sock_map_close+0x2ac/0x4c0
[  223.972451][    C0]  ? sock_map_remove_links+0x570/0x570
[  223.977730][    C0]  ? rwsem_mark_wake+0x6b0/0x6b0
[  223.982506][    C0]  unix_release+0x82/0xc0
[  223.986668][    C0]  sock_close+0xdf/0x270
[  223.990757][    C0]  ? sock_mmap+0xa0/0xa0
[  223.994970][    C0]  __fput+0x3fe/0x910
[  223.998765][    C0]  ____fput+0x15/0x20
[  224.002586][    C0]  task_work_run+0x129/0x190
[  224.007015][    C0]  exit_to_user_mode_loop+0xc4/0xe0
[  224.012038][    C0]  exit_to_user_mode_prepare+0x5a/0xa0
[  224.017334][    C0]  syscall_exit_to_user_mode+0x26/0x160
[  224.022714][    C0]  do_syscall_64+0x49/0xb0
[  224.026967][    C0]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  224.032696][    C0] RIP: 0033:0x7f7351c00e5a
[  224.036953][    C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24
[  224.056478][    C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  224.064729][    C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a
[  224.072532][    C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  224.080358][    C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001
[  224.088178][    C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80
[  224.095968][    C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980
[  224.103791][    C0]  </TASK>
[  224.106648][    C0] Sending NMI from CPU 0 to CPUs 1:
[  224.111753][    C1] NMI backtrace for cpu 1
[  224.111764][    C1] CPU: 1 PID: 4993 Comm: syz-executor.2 Tainted: G        W         5.15.149-syzkaller-00131-g79bd336c7a94 #0
[  224.111784][    C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  224.111793][    C1] RIP: 0010:kvm_wait+0x117/0x180
[  224.111813][    C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d fa 03 f3 03 f4 <e9> 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b
[  224.111827][    C1] RSP: 0018:ffffc900001cf800 EFLAGS: 00000046
[  224.111841][    C1] RAX: 0000000000000003 RBX: 1ffff92000039f04 RCX: ffffffff8154fa3f
[  224.111853][    C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127454928
[  224.111865][    C1] RBP: ffffc900001cf8b0 R08: dffffc0000000000 R09: ffffed1024e8a926
[  224.111878][    C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  224.111889][    C1] R13: ffff888127454928 R14: 0000000000000003 R15: 1ffff92000039f08
[  224.111901][    C1] FS:  00007fa1543766c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  224.111916][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  224.111928][    C1] CR2: 00007ffefa99ee38 CR3: 000000012d333000 CR4: 00000000003506a0
[  224.111944][    C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  224.111954][    C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  224.111964][    C1] Call Trace:
[  224.111971][    C1]  <NMI>
[  224.111978][    C1]  ? show_regs+0x58/0x60
[  224.112005][    C1]  ? nmi_cpu_backtrace+0x29f/0x300
[  224.112038][    C1]  ? nmi_trigger_cpumask_backtrace+0x270/0x270
[  224.112067][    C1]  ? kvm_wait+0x117/0x180
[  224.112086][    C1]  ? kvm_wait+0x117/0x180
[  224.112101][    C1]  ? nmi_cpu_backtrace_handler+0xc/0x20
[  224.112120][    C1]  ? nmi_handle+0xa8/0x280
[  224.112141][    C1]  ? kvm_wait+0x117/0x180
[  224.112161][    C1]  ? default_do_nmi+0x69/0x160
[  224.112178][    C1]  ? exc_nmi+0xaf/0x120
[  224.112194][    C1]  ? end_repeat_nmi+0x16/0x31
[  224.112212][    C1]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  224.112237][    C1]  ? kvm_wait+0x117/0x180
[  224.112252][    C1]  ? kvm_wait+0x117/0x180
[  224.112268][    C1]  ? kvm_wait+0x117/0x180
[  224.112283][    C1]  </NMI>
[  224.112287][    C1]  <IRQ>
[  224.112292][    C1]  ? __set_page_owner+0x2c7/0x2e0
[  224.112309][    C1]  ? kvm_arch_para_hints+0x30/0x30
[  224.112326][    C1]  ? pv_hash+0x86/0x150
[  224.112343][    C1]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  224.112365][    C1]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  224.112386][    C1]  _raw_spin_lock_bh+0x139/0x1b0
[  224.112406][    C1]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  224.112427][    C1]  sock_map_delete_elem+0x99/0x130
[  224.112446][    C1]  bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  224.112460][    C1]  bpf_trace_run4+0x13f/0x270
[  224.112480][    C1]  ? bpf_trace_run3+0x250/0x250
[  224.112502][    C1]  __bpf_trace_mm_page_alloc+0xbf/0xf0
[  224.112521][    C1]  __alloc_pages+0x3cb/0x8f0
[  224.112539][    C1]  ? prep_new_page+0x110/0x110
[  224.112557][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  224.112575][    C1]  ? stack_trace_save+0x113/0x1c0
[  224.112594][    C1]  __stack_depot_save+0x38d/0x470
[  224.112616][    C1]  stack_depot_save+0xe/0x10
[  224.112630][    C1]  save_stack+0x104/0x1e0
[  224.112645][    C1]  ? __reset_page_owner+0x190/0x190
[  224.112661][    C1]  ? post_alloc_hook+0x1a3/0x1b0
[  224.112677][    C1]  ? prep_new_page+0x1b/0x110
[  224.112694][    C1]  ? get_page_from_freelist+0x3550/0x35d0
[  224.112712][    C1]  ? __alloc_pages+0x27e/0x8f0
[  224.112735][    C1]  ? __stack_depot_save+0x38d/0x470
[  224.112753][    C1]  ? kasan_set_track+0x5d/0x70
[  224.112768][    C1]  ? kasan_set_free_info+0x23/0x40
[  224.112785][    C1]  ? ____kasan_slab_free+0x126/0x160
[  224.112801][    C1]  ? __kasan_slab_free+0x11/0x20
[  224.112816][    C1]  ? slab_free_freelist_hook+0xbd/0x190
[  224.112835][    C1]  ? kfree+0xc8/0x220
[  224.112851][    C1]  ? sock_map_unref+0x352/0x4d0
[  224.112868][    C1]  ? sock_map_delete_elem+0xc1/0x130
[  224.112885][    C1]  ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  224.112898][    C1]  ? bpf_trace_run4+0x13f/0x270
[  224.112915][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  224.112934][    C1]  __set_page_owner+0x28/0x2e0
[  224.112950][    C1]  ? kernel_init_free_pages+0xda/0xf0
[  224.112968][    C1]  post_alloc_hook+0x1a3/0x1b0
[  224.112987][    C1]  prep_new_page+0x1b/0x110
[  224.113004][    C1]  get_page_from_freelist+0x3550/0x35d0
[  224.113023][    C1]  ? __kasan_check_read+0x11/0x20
[  224.113049][    C1]  ? lruvec_init+0x150/0x150
[  224.113066][    C1]  ? update_stack_state+0x15d/0x460
[  224.113086][    C1]  ? __alloc_pages+0x8f0/0x8f0
[  224.113105][    C1]  ? __alloc_pages_bulk+0xe40/0xe40
[  224.113123][    C1]  ? stack_trace_save+0x1c0/0x1c0
[  224.113142][    C1]  __alloc_pages+0x27e/0x8f0
[  224.113159][    C1]  ? prep_new_page+0x110/0x110
[  224.113179][    C1]  ? stack_trace_save+0x113/0x1c0
[  224.113196][    C1]  ? stack_trace_snprint+0xf0/0xf0
[  224.113213][    C1]  ? stack_trace_save+0x113/0x1c0
[  224.113230][    C1]  __stack_depot_save+0x38d/0x470
[  224.113250][    C1]  ? kfree+0xc8/0x220
[  224.113267][    C1]  kasan_set_track+0x5d/0x70
[  224.113281][    C1]  ? kasan_set_track+0x4b/0x70
[  224.113296][    C1]  ? kasan_set_free_info+0x23/0x40
[  224.113312][    C1]  ? ____kasan_slab_free+0x126/0x160
[  224.113328][    C1]  ? __kasan_slab_free+0x11/0x20
[  224.113343][    C1]  ? slab_free_freelist_hook+0xbd/0x190
[  224.113367][    C1]  ? kfree+0xc8/0x220
[  224.113383][    C1]  ? sock_map_unref+0x352/0x4d0
[  224.113399][    C1]  ? sock_map_delete_elem+0xc1/0x130
[  224.113417][    C1]  ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  224.113429][    C1]  ? bpf_trace_run4+0x13f/0x270
[  224.113446][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  224.113462][    C1]  ? __alloc_pages+0x3cb/0x8f0
[  224.113479][    C1]  ? new_slab+0x9a/0x4e0
[  224.113493][    C1]  ? ___slab_alloc+0x39e/0x830
[  224.113510][    C1]  ? __slab_alloc+0x4a/0x90
[  224.113527][    C1]  ? kmem_cache_alloc+0x134/0x200
[  224.113544][    C1]  ? __sigqueue_alloc+0x130/0x200
[  224.113561][    C1]  ? __send_signal+0x1fd/0xcb0
[  224.113577][    C1]  ? send_signal+0x43a/0x590
[  224.113592][    C1]  ? do_send_sig_info+0xde/0x230
[  224.113608][    C1]  ? group_send_sig_info+0x113/0x460
[  224.113624][    C1]  ? do_bpf_send_signal+0x8c/0x150
[  224.113642][    C1]  ? irq_work_run_list+0x1c2/0x290
[  224.113659][    C1]  ? irq_work_run+0x69/0xf0
[  224.113676][    C1]  ? __sysvec_irq_work+0x63/0x1b0
[  224.113693][    C1]  ? sysvec_irq_work+0x92/0xb0
[  224.113710][    C1]  ? asm_sysvec_irq_work+0x1b/0x20
[  224.113730][    C1]  ? _raw_spin_unlock_irq+0x49/0x70
[  224.113745][    C1]  ? get_signal+0x1562/0x1630
[  224.113761][    C1]  ? arch_do_signal_or_restart+0xbd/0x1680
[  224.113777][    C1]  ? exit_to_user_mode_loop+0xa0/0xe0
[  224.113793][    C1]  ? exit_to_user_mode_prepare+0x5a/0xa0
[  224.113810][    C1]  ? syscall_exit_to_user_mode+0x26/0x160
[  224.113828][    C1]  ? do_syscall_64+0x49/0xb0
[  224.113843][    C1]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  224.113866][    C1]  kasan_set_free_info+0x23/0x40
[  224.113883][    C1]  ____kasan_slab_free+0x126/0x160
[  224.113900][    C1]  __kasan_slab_free+0x11/0x20
[  224.113915][    C1]  slab_free_freelist_hook+0xbd/0x190
[  224.113935][    C1]  ? sock_map_unref+0x352/0x4d0
[  224.113952][    C1]  kfree+0xc8/0x220
[  224.113970][    C1]  sock_map_unref+0x352/0x4d0
[  224.113990][    C1]  sock_map_delete_elem+0xc1/0x130
[  224.114008][    C1]  bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  224.114021][    C1]  bpf_trace_run4+0x13f/0x270
[  224.114039][    C1]  ? bpf_trace_run3+0x250/0x250
[  224.114060][    C1]  __bpf_trace_mm_page_alloc+0xbf/0xf0
[  224.114078][    C1]  __alloc_pages+0x3cb/0x8f0
[  224.114094][    C1]  ? sysvec_irq_work+0x92/0xb0
[  224.114112][    C1]  ? prep_new_page+0x110/0x110
[  224.114128][    C1]  ? syscall_exit_to_user_mode+0x26/0x160
[  224.114146][    C1]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  224.114165][    C1]  ? try_to_wake_up+0x697/0x1160
[  224.114184][    C1]  new_slab+0x9a/0x4e0
[  224.114199][    C1]  ___slab_alloc+0x39e/0x830
[  224.114216][    C1]  ? __sigqueue_alloc+0x130/0x200
[  224.114235][    C1]  ? __sigqueue_alloc+0x130/0x200
[  224.114251][    C1]  __slab_alloc+0x4a/0x90
[  224.114269][    C1]  ? __sigqueue_alloc+0x130/0x200
[  224.114285][    C1]  kmem_cache_alloc+0x134/0x200
[  224.114303][    C1]  __sigqueue_alloc+0x130/0x200
[  224.114321][    C1]  __send_signal+0x1fd/0xcb0
[  224.114339][    C1]  send_signal+0x43a/0x590
[  224.114356][    C1]  do_send_sig_info+0xde/0x230
[  224.114373][    C1]  group_send_sig_info+0x113/0x460
[  224.114391][    C1]  ? __lock_task_sighand+0x100/0x100
[  224.114407][    C1]  ? clockevents_program_event+0x22f/0x300
[  224.114427][    C1]  do_bpf_send_signal+0x8c/0x150
[  224.114446][    C1]  irq_work_run_list+0x1c2/0x290
[  224.114464][    C1]  ? irq_work_run+0xf0/0xf0
[  224.114484][    C1]  irq_work_run+0x69/0xf0
[  224.114501][    C1]  __sysvec_irq_work+0x63/0x1b0
[  224.114520][    C1]  sysvec_irq_work+0x92/0xb0
[  224.114537][    C1]  </IRQ>
[  224.114542][    C1]  <TASK>
[  224.114547][    C1]  asm_sysvec_irq_work+0x1b/0x20
[  224.114563][    C1] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70
[  224.114579][    C1] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 <e8> 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57
[  224.114592][    C1] RSP: 0018:ffffc90000d4fbb8 EFLAGS: 00000246
[  224.114606][    C1] RAX: 0000000000000001 RBX: ffff8881449ea300 RCX: dffffc0000000000
[  224.114617][    C1] RDX: ffffc9000231e000 RSI: 000000000003ffff RDI: 0000000000000001
[  224.114628][    C1] RBP: ffffc90000d4fbc0 R08: ffffffff81456d9a R09: fffff520001a9fc0
[  224.114641][    C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881449ea300
[  224.114667][    C1] R13: ffff8881449ea720 R14: 0000000000000021 R15: dffffc0000000000
[  224.114681][    C1]  ? get_signal+0x151a/0x1630
[  224.114700][    C1]  ? _raw_spin_unlock_irq+0x41/0x70
[  224.114715][    C1]  get_signal+0x1562/0x1630
[  224.114741][    C1]  arch_do_signal_or_restart+0xbd/0x1680
[  224.114757][    C1]  ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0
[  224.114775][    C1]  ? _raw_spin_lock_irq+0xa5/0x1b0
[  224.114795][    C1]  ? __kasan_check_write+0x14/0x20
[  224.114812][    C1]  ? _copy_from_user+0x96/0xd0
[  224.114828][    C1]  ? restore_altstack+0x274/0x400
[  224.114847][    C1]  ? get_sigframe_size+0x10/0x10
[  224.114862][    C1]  ? __ia32_sys_sigaltstack+0x70/0x70
[  224.114885][    C1]  ? __do_sys_rt_sigreturn+0x160/0x1e0
[  224.114903][    C1]  exit_to_user_mode_loop+0xa0/0xe0
[  224.114920][    C1]  exit_to_user_mode_prepare+0x5a/0xa0
[  224.114942][    C1]  syscall_exit_to_user_mode+0x26/0x160
[  224.114961][    C1]  do_syscall_64+0x49/0xb0
[  224.114976][    C1]  ? sysvec_call_function_single+0x52/0xb0
[  224.114994][    C1]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  224.115011][    C1] RIP: 0033:0x7fa154fa6880
[  224.115024][    C1] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31
[  224.115037][    C1] RSP: 002b:00007fa1543752b8 EFLAGS: 00000283
[  224.115049][    C1] RAX: 0000000000000000 RBX: 00007fa154375dc0 RCX: 00007fa1550fcbc0
[  224.115060][    C1] RDX: 00007fa1543752c0 RSI: 00007fa1543753f0 RDI: 000000000000000b
[  224.115071][    C1] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000
[  224.115081][    C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073
[  224.115091][    C1] R13: 00007fa154375f40 R14: 9999999999999999 R15: 0000000000000000
[  224.115107][    C1]  </TASK>
[  375.029254][    C0] watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [syz-executor.0:4996]
[  375.037687][    C0] Modules linked in:
[  375.041402][    C0] CPU: 0 PID: 4996 Comm: syz-executor.0 Tainted: G        W         5.15.149-syzkaller-00131-g79bd336c7a94 #0
[  375.052854][    C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  375.062749][    C0] RIP: 0010:kvm_wait+0x147/0x180
[  375.067527][    C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d cb 03 f3 03 fb f4 <e9> 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c
[  375.087485][    C0] RSP: 0018:ffffc90000e67960 EFLAGS: 00000246
[  375.093393][    C0] RAX: 0000000000000003 RBX: 1ffff920001ccf30 RCX: ffffffff8154fa3f
[  375.101198][    C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881274f9090
[  375.109011][    C0] RBP: ffffc90000e67a10 R08: dffffc0000000000 R09: ffffed1024e9f213
[  375.116821][    C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  375.124634][    C0] R13: ffff8881274f9090 R14: 0000000000000003 R15: 1ffff920001ccf34
[  375.132443][    C0] FS:  000055555685f480(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
[  375.141217][    C0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  375.147634][    C0] CR2: 0000001b2ed24000 CR3: 0000000129f48000 CR4: 00000000003506b0
[  375.155446][    C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  375.163258][    C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[  375.171158][    C0] Call Trace:
[  375.174279][    C0]  <IRQ>
[  375.176974][    C0]  ? show_regs+0x58/0x60
[  375.181060][    C0]  ? watchdog_timer_fn+0x4b1/0x5f0
[  375.186082][    C0]  ? proc_watchdog_cpumask+0xd0/0xd0
[  375.191210][    C0]  ? __hrtimer_run_queues+0x41a/0xad0
[  375.196417][    C0]  ? hrtimer_interrupt+0xaa0/0xaa0
[  375.201451][    C0]  ? clockevents_program_event+0x22f/0x300
[  375.207095][    C0]  ? ktime_get_update_offsets_now+0x2ba/0x2d0
[  375.213002][    C0]  ? hrtimer_interrupt+0x40c/0xaa0
[  375.217944][    C0]  ? __sysvec_apic_timer_interrupt+0xfd/0x3c0
[  375.223843][    C0]  ? sysvec_apic_timer_interrupt+0x95/0xc0
[  375.229486][    C0]  </IRQ>
[  375.232263][    C0]  <TASK>
[  375.235039][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.241033][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  375.247106][    C0]  ? kvm_wait+0x147/0x180
[  375.251275][    C0]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  375.257261][    C0]  ? kvm_arch_para_hints+0x30/0x30
[  375.262212][    C0]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  375.268283][    C0]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  375.274189][    C0]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  375.280446][    C0]  ? __kasan_check_write+0x14/0x20
[  375.285384][    C0]  _raw_spin_lock_bh+0x139/0x1b0
[  375.290155][    C0]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  375.295189][    C0]  ? __local_bh_enable_ip+0x58/0x80
[  375.300223][    C0]  ? lock_sock_nested+0x266/0x300
[  375.305084][    C0]  ? unix_peer_get+0xe0/0xe0
[  375.309511][    C0]  sk_psock_link_pop+0x2e/0x170
[  375.314197][    C0]  ? unix_peer_get+0xe0/0xe0
[  375.318623][    C0]  sock_map_remove_links+0x25/0x570
[  375.323658][    C0]  ? unix_peer_get+0xe0/0xe0
[  375.328085][    C0]  sock_map_close+0x2ac/0x4c0
[  375.332599][    C0]  ? sock_map_remove_links+0x570/0x570
[  375.337894][    C0]  ? rwsem_mark_wake+0x6b0/0x6b0
[  375.342667][    C0]  unix_release+0x82/0xc0
[  375.346834][    C0]  sock_close+0xdf/0x270
[  375.350912][    C0]  ? sock_mmap+0xa0/0xa0
[  375.355008][    C0]  __fput+0x3fe/0x910
[  375.358811][    C0]  ____fput+0x15/0x20
[  375.362629][    C0]  task_work_run+0x129/0x190
[  375.367057][    C0]  exit_to_user_mode_loop+0xc4/0xe0
[  375.372089][    C0]  exit_to_user_mode_prepare+0x5a/0xa0
[  375.377385][    C0]  syscall_exit_to_user_mode+0x26/0x160
[  375.382763][    C0]  do_syscall_64+0x49/0xb0
[  375.387018][    C0]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  375.392763][    C0] RIP: 0033:0x7f7351c00e5a
[  375.397010][    C0] Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24
[  375.416441][    C0] RSP: 002b:00007ffefa99ed40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  375.424687][    C0] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f7351c00e5a
[  375.432499][    C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  375.440309][    C0] RBP: ffffffffffffffff R08: 00007f7351b85000 R09: 0000000000000001
[  375.448121][    C0] R10: 0000000000000001 R11: 0000000000000293 R12: 00007f7351d38f80
[  375.455934][    C0] R13: 00007f7351d38f8c R14: 0000000000000032 R15: 00007f7351d3a980
[  375.463745][    C0]  </TASK>
[  375.466608][    C0] Sending NMI from CPU 0 to CPUs 1:
[  375.471696][    C1] NMI backtrace for cpu 1
[  375.471706][    C1] CPU: 1 PID: 4993 Comm: syz-executor.2 Tainted: G        W         5.15.149-syzkaller-00131-g79bd336c7a94 #0
[  375.471725][    C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
[  375.471734][    C1] RIP: 0010:kvm_wait+0x117/0x180
[  375.471754][    C1] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d fa 03 f3 03 f4 <e9> 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b
[  375.471767][    C1] RSP: 0018:ffffc900001cf800 EFLAGS: 00000046
[  375.471781][    C1] RAX: 0000000000000003 RBX: 1ffff92000039f04 RCX: ffffffff8154fa3f
[  375.471793][    C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff888127454928
[  375.471805][    C1] RBP: ffffc900001cf8b0 R08: dffffc0000000000 R09: ffffed1024e8a926
[  375.471818][    C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
[  375.471829][    C1] R13: ffff888127454928 R14: 0000000000000003 R15: 1ffff92000039f08
[  375.471841][    C1] FS:  00007fa1543766c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000
[  375.471856][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  375.471869][    C1] CR2: 00007ffefa99ee38 CR3: 000000012d333000 CR4: 00000000003506a0
[  375.471884][    C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  375.471893][    C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  375.471904][    C1] Call Trace:
[  375.471910][    C1]  <NMI>
[  375.471916][    C1]  ? show_regs+0x58/0x60
[  375.471943][    C1]  ? nmi_cpu_backtrace+0x29f/0x300
[  375.471976][    C1]  ? nmi_trigger_cpumask_backtrace+0x270/0x270
[  375.472010][    C1]  ? kvm_wait+0x117/0x180
[  375.472032][    C1]  ? kvm_wait+0x117/0x180
[  375.472048][    C1]  ? nmi_cpu_backtrace_handler+0xc/0x20
[  375.472068][    C1]  ? nmi_handle+0xa8/0x280
[  375.472085][    C1]  ? kvm_wait+0x117/0x180
[  375.472099][    C1]  ? kvm_wait+0x117/0x180
[  375.472114][    C1]  ? default_do_nmi+0x69/0x160
[  375.472132][    C1]  ? exc_nmi+0xaf/0x120
[  375.472148][    C1]  ? end_repeat_nmi+0x16/0x31
[  375.472166][    C1]  ? __pv_queued_spin_lock_slowpath+0x65f/0xc40
[  375.472186][    C1]  ? kvm_wait+0x117/0x180
[  375.472202][    C1]  ? kvm_wait+0x117/0x180
[  375.472217][    C1]  ? kvm_wait+0x117/0x180
[  375.472232][    C1]  </NMI>
[  375.472237][    C1]  <IRQ>
[  375.472241][    C1]  ? __set_page_owner+0x2c7/0x2e0
[  375.472258][    C1]  ? kvm_arch_para_hints+0x30/0x30
[  375.472275][    C1]  ? pv_hash+0x86/0x150
[  375.472309][    C1]  __pv_queued_spin_lock_slowpath+0x6bc/0xc40
[  375.472331][    C1]  ? __pv_queued_spin_unlock_slowpath+0x310/0x310
[  375.472353][    C1]  _raw_spin_lock_bh+0x139/0x1b0
[  375.472372][    C1]  ? _raw_spin_lock_irq+0x1b0/0x1b0
[  375.472393][    C1]  sock_map_delete_elem+0x99/0x130
[  375.472412][    C1]  bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  375.472426][    C1]  bpf_trace_run4+0x13f/0x270
[  375.472445][    C1]  ? bpf_trace_run3+0x250/0x250
[  375.472466][    C1]  __bpf_trace_mm_page_alloc+0xbf/0xf0
[  375.472485][    C1]  __alloc_pages+0x3cb/0x8f0
[  375.472503][    C1]  ? prep_new_page+0x110/0x110
[  375.472521][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  375.472539][    C1]  ? stack_trace_save+0x113/0x1c0
[  375.472557][    C1]  __stack_depot_save+0x38d/0x470
[  375.472579][    C1]  stack_depot_save+0xe/0x10
[  375.472593][    C1]  save_stack+0x104/0x1e0
[  375.472608][    C1]  ? __reset_page_owner+0x190/0x190
[  375.472623][    C1]  ? post_alloc_hook+0x1a3/0x1b0
[  375.472639][    C1]  ? prep_new_page+0x1b/0x110
[  375.472656][    C1]  ? get_page_from_freelist+0x3550/0x35d0
[  375.472674][    C1]  ? __alloc_pages+0x27e/0x8f0
[  375.472690][    C1]  ? __stack_depot_save+0x38d/0x470
[  375.472708][    C1]  ? kasan_set_track+0x5d/0x70
[  375.472723][    C1]  ? kasan_set_free_info+0x23/0x40
[  375.472739][    C1]  ? ____kasan_slab_free+0x126/0x160
[  375.472755][    C1]  ? __kasan_slab_free+0x11/0x20
[  375.472770][    C1]  ? slab_free_freelist_hook+0xbd/0x190
[  375.472789][    C1]  ? kfree+0xc8/0x220
[  375.472805][    C1]  ? sock_map_unref+0x352/0x4d0
[  375.472821][    C1]  ? sock_map_delete_elem+0xc1/0x130
[  375.472838][    C1]  ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  375.472851][    C1]  ? bpf_trace_run4+0x13f/0x270
[  375.472868][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  375.472887][    C1]  __set_page_owner+0x28/0x2e0
[  375.472902][    C1]  ? kernel_init_free_pages+0xda/0xf0
[  375.472920][    C1]  post_alloc_hook+0x1a3/0x1b0
[  375.472938][    C1]  prep_new_page+0x1b/0x110
[  375.472955][    C1]  get_page_from_freelist+0x3550/0x35d0
[  375.472974][    C1]  ? __kasan_check_read+0x11/0x20
[  375.472999][    C1]  ? lruvec_init+0x150/0x150
[  375.473017][    C1]  ? update_stack_state+0x15d/0x460
[  375.473038][    C1]  ? __alloc_pages+0x8f0/0x8f0
[  375.473057][    C1]  ? __alloc_pages_bulk+0xe40/0xe40
[  375.473074][    C1]  ? stack_trace_save+0x1c0/0x1c0
[  375.473093][    C1]  __alloc_pages+0x27e/0x8f0
[  375.473111][    C1]  ? prep_new_page+0x110/0x110
[  375.473131][    C1]  ? stack_trace_save+0x113/0x1c0
[  375.473148][    C1]  ? stack_trace_snprint+0xf0/0xf0
[  375.473165][    C1]  ? stack_trace_save+0x113/0x1c0
[  375.473182][    C1]  __stack_depot_save+0x38d/0x470
[  375.473202][    C1]  ? kfree+0xc8/0x220
[  375.473219][    C1]  kasan_set_track+0x5d/0x70
[  375.473233][    C1]  ? kasan_set_track+0x4b/0x70
[  375.473248][    C1]  ? kasan_set_free_info+0x23/0x40
[  375.473264][    C1]  ? ____kasan_slab_free+0x126/0x160
[  375.473286][    C1]  ? __kasan_slab_free+0x11/0x20
[  375.473301][    C1]  ? slab_free_freelist_hook+0xbd/0x190
[  375.473319][    C1]  ? kfree+0xc8/0x220
[  375.473335][    C1]  ? sock_map_unref+0x352/0x4d0
[  375.473352][    C1]  ? sock_map_delete_elem+0xc1/0x130
[  375.473369][    C1]  ? bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  375.473382][    C1]  ? bpf_trace_run4+0x13f/0x270
[  375.473399][    C1]  ? __bpf_trace_mm_page_alloc+0xbf/0xf0
[  375.473415][    C1]  ? __alloc_pages+0x3cb/0x8f0
[  375.473431][    C1]  ? new_slab+0x9a/0x4e0
[  375.473444][    C1]  ? ___slab_alloc+0x39e/0x830
[  375.473461][    C1]  ? __slab_alloc+0x4a/0x90
[  375.473478][    C1]  ? kmem_cache_alloc+0x134/0x200
[  375.473495][    C1]  ? __sigqueue_alloc+0x130/0x200
[  375.473511][    C1]  ? __send_signal+0x1fd/0xcb0
[  375.473527][    C1]  ? send_signal+0x43a/0x590
[  375.473542][    C1]  ? do_send_sig_info+0xde/0x230
[  375.473558][    C1]  ? group_send_sig_info+0x113/0x460
[  375.473574][    C1]  ? do_bpf_send_signal+0x8c/0x150
[  375.473592][    C1]  ? irq_work_run_list+0x1c2/0x290
[  375.473609][    C1]  ? irq_work_run+0x69/0xf0
[  375.473625][    C1]  ? __sysvec_irq_work+0x63/0x1b0
[  375.473642][    C1]  ? sysvec_irq_work+0x92/0xb0
[  375.473658][    C1]  ? asm_sysvec_irq_work+0x1b/0x20
[  375.473674][    C1]  ? _raw_spin_unlock_irq+0x49/0x70
[  375.473688][    C1]  ? get_signal+0x1562/0x1630
[  375.473704][    C1]  ? arch_do_signal_or_restart+0xbd/0x1680
[  375.473720][    C1]  ? exit_to_user_mode_loop+0xa0/0xe0
[  375.473737][    C1]  ? exit_to_user_mode_prepare+0x5a/0xa0
[  375.473753][    C1]  ? syscall_exit_to_user_mode+0x26/0x160
[  375.473771][    C1]  ? do_syscall_64+0x49/0xb0
[  375.473786][    C1]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  375.473810][    C1]  kasan_set_free_info+0x23/0x40
[  375.473826][    C1]  ____kasan_slab_free+0x126/0x160
[  375.473843][    C1]  __kasan_slab_free+0x11/0x20
[  375.473858][    C1]  slab_free_freelist_hook+0xbd/0x190
[  375.473879][    C1]  ? sock_map_unref+0x352/0x4d0
[  375.473896][    C1]  kfree+0xc8/0x220
[  375.473914][    C1]  sock_map_unref+0x352/0x4d0
[  375.473933][    C1]  sock_map_delete_elem+0xc1/0x130
[  375.473951][    C1]  bpf_prog_2c29ac5cdc6b1842+0x3a/0xc14
[  375.473964][    C1]  bpf_trace_run4+0x13f/0x270
[  375.473983][    C1]  ? bpf_trace_run3+0x250/0x250
[  375.474004][    C1]  __bpf_trace_mm_page_alloc+0xbf/0xf0
[  375.474022][    C1]  __alloc_pages+0x3cb/0x8f0
[  375.474039][    C1]  ? sysvec_irq_work+0x92/0xb0
[  375.474057][    C1]  ? prep_new_page+0x110/0x110
[  375.474073][    C1]  ? syscall_exit_to_user_mode+0x26/0x160
[  375.474092][    C1]  ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  375.474111][    C1]  ? try_to_wake_up+0x697/0x1160
[  375.474130][    C1]  new_slab+0x9a/0x4e0
[  375.474145][    C1]  ___slab_alloc+0x39e/0x830
[  375.474162][    C1]  ? __sigqueue_alloc+0x130/0x200
[  375.474181][    C1]  ? __sigqueue_alloc+0x130/0x200
[  375.474198][    C1]  __slab_alloc+0x4a/0x90
[  375.474216][    C1]  ? __sigqueue_alloc+0x130/0x200
[  375.474232][    C1]  kmem_cache_alloc+0x134/0x200
[  375.474251][    C1]  __sigqueue_alloc+0x130/0x200
[  375.474269][    C1]  __send_signal+0x1fd/0xcb0
[  375.474298][    C1]  send_signal+0x43a/0x590
[  375.474316][    C1]  do_send_sig_info+0xde/0x230
[  375.474333][    C1]  group_send_sig_info+0x113/0x460
[  375.474351][    C1]  ? __lock_task_sighand+0x100/0x100
[  375.474368][    C1]  ? clockevents_program_event+0x22f/0x300
[  375.474388][    C1]  do_bpf_send_signal+0x8c/0x150
[  375.474407][    C1]  irq_work_run_list+0x1c2/0x290
[  375.474425][    C1]  ? irq_work_run+0xf0/0xf0
[  375.474445][    C1]  irq_work_run+0x69/0xf0
[  375.474462][    C1]  __sysvec_irq_work+0x63/0x1b0
[  375.474480][    C1]  sysvec_irq_work+0x92/0xb0
[  375.474498][    C1]  </IRQ>
[  375.474502][    C1]  <TASK>
[  375.474507][    C1]  asm_sysvec_irq_work+0x1b/0x20
[  375.474523][    C1] RIP: 0010:_raw_spin_unlock_irq+0x49/0x70
[  375.474539][    C1] Code: 08 00 74 0c 48 c7 c7 d8 54 8d 86 e8 71 45 e9 fc 48 83 3d b1 2a c4 01 00 74 2a 48 89 df e8 e3 bb 8b fc 66 90 fb bf 01 00 00 00 <e8> 42 ff 82 fc 65 8b 05 43 43 39 7b 85 c0 74 03 5b 5d c3 e8 43 57
[  375.474552][    C1] RSP: 0018:ffffc90000d4fbb8 EFLAGS: 00000246
[  375.474565][    C1] RAX: 0000000000000001 RBX: ffff8881449ea300 RCX: dffffc0000000000
[  375.474577][    C1] RDX: ffffc9000231e000 RSI: 000000000003ffff RDI: 0000000000000001
[  375.474588][    C1] RBP: ffffc90000d4fbc0 R08: ffffffff81456d9a R09: fffff520001a9fc0
[  375.474601][    C1] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff8881449ea300
[  375.474612][    C1] R13: ffff8881449ea720 R14: 0000000000000021 R15: dffffc0000000000
[  375.474626][    C1]  ? get_signal+0x151a/0x1630
[  375.474645][    C1]  ? _raw_spin_unlock_irq+0x41/0x70
[  375.474660][    C1]  get_signal+0x1562/0x1630
[  375.474681][    C1]  arch_do_signal_or_restart+0xbd/0x1680
[  375.474697][    C1]  ? __do_compat_sys_x32_rt_sigreturn+0x1e0/0x1e0
[  375.474715][    C1]  ? _raw_spin_lock_irq+0xa5/0x1b0
[  375.474735][    C1]  ? __kasan_check_write+0x14/0x20
[  375.474752][    C1]  ? _copy_from_user+0x96/0xd0
[  375.474768][    C1]  ? restore_altstack+0x274/0x400
[  375.474787][    C1]  ? get_sigframe_size+0x10/0x10
[  375.474802][    C1]  ? __ia32_sys_sigaltstack+0x70/0x70
[  375.474824][    C1]  ? __do_sys_rt_sigreturn+0x160/0x1e0
[  375.474842][    C1]  exit_to_user_mode_loop+0xa0/0xe0
[  375.474859][    C1]  exit_to_user_mode_prepare+0x5a/0xa0
[  375.474877][    C1]  syscall_exit_to_user_mode+0x26/0x160
[  375.474896][    C1]  do_syscall_64+0x49/0xb0
[  375.474911][    C1]  ? sysvec_call_function_single+0x52/0xb0
[  375.474930][    C1]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[  375.474946][    C1] RIP: 0033:0x7fa154fa6880
[  375.474960][    C1] Code: 5b 5d c3 48 8d 3d fa 1b 0b 00 e8 ab fb ff ff 48 8d 3d fc 1b 0b 00 e8 9f fb ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <53> 89 fb 48 83 ec 10 64 8b 04 25 ac ff ff ff 85 c0 74 2a 89 fe 31
[  375.474972][    C1] RSP: 002b:00007fa1543752b8 EFLAGS: 00000283
[  375.474985][    C1] RAX: 0000000000000000 RBX: 00007fa154375dc0 RCX: 00007fa1550fcbc0
[  375.474996][    C1] RDX: 00007fa1543752c0 RSI: 00007fa1543753f0 RDI: 000000000000000b
[  375.475007][    C1] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000
[  375.475017][    C1] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073
[  375.475027][    C1] R13: 00007fa154375f40 R14: 9999999999999999 R15: 0000000000000000
[  375.475043][    C1]  </TASK>