last executing test programs: 9.390973099s ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 7.840898377s ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 5.727595281s ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 4.318707947s ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.82605639s ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 1.49295804s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000001980)=',(\xec\xef\x89.\nV\x96\xff\x84\xeb\xdf\xa8=\xc3\xea\xd2\x02b\xd1x\'\xc1\x82b\x93\xd7\x96\xca\xec\x04\x18KW\x94\xd7B\xa8\x0e\xb2\x89`>\x90\xfc\x7f\xa7o\xc2\xf5\x1fAZ\xac\xea\x84i\xd3P\xaeoW\x9f\xf6f\xd2\x1f\x1c~\xbb\x8a\xe0\xa3\nCXkI\xed\x14\x0e\xd8}\x1a\x98\x93s*\tH\x1a\xde7\xb9;\x02\xbb\'\xcd\xaf\xeav\xeb\x87@\f\xae\xc669\xfe\xbfh\xd4\xe1\x17\a|\xd6\f\xe4\xe3\x02\xb6E\xf5\xd0\xbf\x1bKuk\x91^\v]qR\xce\n\xf3M\xb0a\xa76\x14\x98\x8fy\x9a\x1a\x7f\x99\x1c\xa5\xeag\xb7\x9b\x12\x8b$\xeb\xcb@\xf8I\x93\xb1\xbe\f2$\xb4\x16ca\xedN@7\xae\xb6\x0e\x92O\x97') socketpair(0xa, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) 1.446152707s ago: executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(&(0x7f0000000100)='./cgroup.cpu/cpuset.cpus\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008088100b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 745.438565ms ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x0, 0xd1, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000010000107b8af8ff00000000bfa200000000000007020000f8ffffff000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r2, 0x4004662b, 0x20001412) unlink(0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r8 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x1f, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESOCT=r9, @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000600)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRES8=r1, @ANYRESHEX=r6, @ANYRESHEX=r9, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r7], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) 671.892616ms ago: executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) sendmsg(0xffffffffffffffff, 0x0, 0x4000) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='skb_copy_datagram_iovec\x00'}, 0x2c) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0x7bc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 640.745401ms ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 619.528085ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000900), 0x71, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='rxrpc_skb\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1ab8ff00000000bfa100000000000007010000f0ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='ext4_request_inode\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x31}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) 607.936296ms ago: executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5488, 0x6, 0x400, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000000), &(0x7f0000000080)='%pi6 \x00'}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000007000000070000000000000085000000080000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x893}, 0x28) 592.769739ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000001040)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000500000002000000010000060400000002000000000000000400610000"], &(0x7f00000011c0)=""/205, 0x31, 0xcd, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xa) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34f677969c599f24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x8204) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='ext4_mb_release_inode_pa\x00', r7}, 0x10) ioctl$TUNSETSTEERINGEBPF(r6, 0x800454e0, &(0x7f0000000300)=r5) write$cgroup_subtree(r6, 0x0, 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 580.840021ms ago: executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x1c, &(0x7f0000000040)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {0x4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x7b}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 579.723331ms ago: executing program 2: bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400894fb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 543.559536ms ago: executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x24bdb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 521.04961ms ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x7a0, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 504.196872ms ago: executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 485.111895ms ago: executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000340)='xen_mc_callback\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x2, 0x8, 0x8}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000001000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000d69200850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 479.858076ms ago: executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000001095"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.numa_stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={0xffffffffffffffff, &(0x7f0000000d40), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000003000000000000000000000004000000bb7f1a00c600feff01c27b6e9500000000000000910c301c1bd3a98fc7fae59feb91e3395bca8383debd33b44a4060eb265edc0ef4af5a2c9efc236551768e62b306370edc3ae3f39ac245ff83ec99d7eeb17fee34582c317b9700695d7f1e568c8ba8c11f73cca87213385685b5aaa8d30bbb5bf8c7afe4165e8f3784a60f9ef2dcb048c82d5692"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18009ccc619cfbe234195968d3fc000000000800", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5452, &(0x7f0000000a00)={'dvmrp0\x00', @random="63749f3b111e"}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000000), 0x4) 414.060586ms ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 351.774676ms ago: executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x1, 0x8, 0x3, 0x1010, r0, 0x7, '\x00', 0x0, r0, 0x5, 0x5, 0x2, 0x4}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r1}, &(0x7f0000000740), &(0x7f00000007c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='ext4_sync_file_enter\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000280)={r3, 0x0, 0x19, 0x0, &(0x7f0000000040)="619fbf8bff569031d08e795494f061b4804b7263effc976632", 0x0, 0x1, 0x0, 0x24, 0x0, &(0x7f0000000080)="e8af10e2b5733fecdf8971ecdbcc0d7eec0f21f202e5f3713c0456837f485c2dcacf5def", 0x0, 0x2, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd63"], 0xfdef) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r10}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='ext4_discard_blocks\x00', r12}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0xc0185879, &(0x7f0000000040)) 311.993682ms ago: executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x0, 0xa9, 0x65, &(0x7f0000000000)="f14b54f6cd7019a6995408552e1b0abd626b705f2574c55e3ec15803084273db7a49a3b2bc423d3e7b2d96866e876ab8a8d08d14c9d4e4f47d304276235953a71ac5fc7bd1faf773a2f2f2c6cfdcf74f3e0f58d069798a0b2ea57713cc3f95acf3cd6888ddbb1e739cddfe3e15b15899cbcc3747c96602bba4557cc64b9b4c0e0c4536d493b91e64bf95248163444f0cba2076f67773fae5d2f22ac1cebc0ecbaca584f0df79b88b6c", &(0x7f00000002c0)=""/101, 0xbf3, 0x0, 0xcb, 0xa7, &(0x7f0000000680)="861788bfeb808bce2f13e44abcd37a8cd67d0f1db300f9143589a433a5f4fffd5dd77bcf8406bf4ee617b34df784fb1f0e1775bb16f967a3fe29bd7f8cfa263acbb81c36af508a6eece50f6b23d9296885cbd5cbccdfec66b70e54b293f77977b26b3139fbbc60d6730e8bb867d68a89cd78700160a86d0d1494f8a7a75c2155f754603190249b0ec5054ced78ebbc0484b3a96fa3fbe165abd5875897a3573917291e995370e9dd0b494e2cb9905165e130ce24f5ff32efa01bd7c76bb55037123f6bab2b7b63181bebd9", &(0x7f0000000780)="d226257e4a18128dee06b00585b75d09954d30f37b77e7840fb48bfb15515e430f1485d6c8175a4b11c3ae7e2c80fce6be195eb309ca9530a818d0166dbd0d22bf89f2abb50ce171be1b41c796cf6204bd0acde8c93302a8c2e75b3765570f78f54dfd877e8b506ac980d8f9175e656e7036ffd532ae309b26265b5e55654682312c894fdb36c57841bff671abd9306524d13ae1821aa51ac6c6421c4fd0810c30bda95cf17285", 0x0, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r3, 0x20, &(0x7f0000000200)={&(0x7f00000009c0)=""/188, 0xbc, 0x0, &(0x7f0000000a80)=""/84, 0x54}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x12, 0x11, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x2}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x18d1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 255.94174ms ago: executing program 4: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000700)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x4, 0x8, 0x4, 0x12, r2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000e5850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0x8}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0xefdd000f}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1bc81a00}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x3, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x4}, {}, {0x4, 0x0, 0x2}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 83.089587ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x4008}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 57.742081ms ago: executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) mkdir(&(0x7f0000000040)='./file0\x00', 0xd6) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000007000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000e0083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='ext4_ext_rm_leaf\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="9fedcb7968ddc36c8f263408008daa"], 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x3, 0x20000196, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00'}, 0x90) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) 48.520302ms ago: executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000007b00b67018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1a, 0x0, 0x2, 0x4, 0x200, 0xffffffffffffffff, 0xb1, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x189, 0x0, &(0x7f0000000f80)="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", 0x0, 0x24, 0x60000000}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000020000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r10}, 0x10) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_update_log_tail\x00', r11}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0x4004662b, 0x20001412) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00'}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 34.148585ms ago: executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[{}], 0x8, 0x10, &(0x7f0000001a00), &(0x7f0000001400), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x0}}, 0x10) 17.553697ms ago: executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_int(r0, 0x0, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000d62b00006110600000000000c6"], 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ff5b00000000000000000002851000000600000018100000", @ANYRES32=r4, @ANYBLOB="00000000000000006608000000000000180000001000000000000000000000009500000000000000360a000000000000180000002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 0s ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000300)}, 0x39) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='jbd2_handle_stats\x00', r2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000180)='cpu.pressure\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0xff, 0x10001, 0x9, 0x1}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r5, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x40, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r8}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r6}, &(0x7f0000000040), &(0x7f0000000580)}, 0x20) write$cgroup_int(r9, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r9, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) kernel console output (not intermixed with test programs): th bpf_probe_write_user helper that may corrupt user memory! [ 181.453701][ T8730] syz-executor.0[8730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.517445][ T8730] syz-executor.0[8730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.534198][ T8728] device sit0 left promiscuous mode [ 181.705306][ T8742] device sit0 entered promiscuous mode [ 182.231991][ T8766] Â: renamed from pim6reg1 [ 183.470366][ T8835] device pim6reg1 entered promiscuous mode [ 183.781855][ T8854] syz-executor.4[8854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.782326][ T8854] syz-executor.4[8854] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.833103][ T8860] syz-executor.4[8860] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.594680][ T8932] syz-executor.0[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.651821][ T8932] syz-executor.0[8932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.666941][ T8938] Â: renamed from pim6reg1 [ 184.851773][ T8942] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.904966][ T8942] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.934141][ T8942] device bridge_slave_0 entered promiscuous mode [ 184.949688][ T8942] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.971239][ T8942] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.015989][ T8942] device bridge_slave_1 entered promiscuous mode [ 185.505884][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.516721][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.553578][ T8] device bridge_slave_1 left promiscuous mode [ 185.580290][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.595786][ T8] device bridge_slave_0 left promiscuous mode [ 185.618343][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.645741][ T8] device veth1_macvtap left promiscuous mode [ 186.099208][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.107900][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.116041][ T2799] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.123198][ T2799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.134732][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.143652][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.152007][ T2799] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.158889][ T2799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.197866][ T9005] device syzkaller0 entered promiscuous mode [ 186.253319][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.273302][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.283888][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.306007][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.325039][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.375129][ T8942] device veth0_vlan entered promiscuous mode [ 186.401697][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.416774][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.450445][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.498292][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.513147][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.560366][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.593162][ T8942] device veth1_macvtap entered promiscuous mode [ 186.622447][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.637895][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.656549][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.696913][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.714947][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.744690][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.767341][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.914690][ T9129] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.953502][ T9129] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.014598][ T9129] device bridge_slave_0 entered promiscuous mode [ 189.076161][ T9129] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.120826][ T9129] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.160638][ T9129] device bridge_slave_1 entered promiscuous mode [ 189.262703][ T9163] syz-executor.4[9163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.262782][ T9163] syz-executor.4[9163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.285573][ T8] device bridge_slave_1 left promiscuous mode [ 189.361302][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.389933][ T8] device bridge_slave_0 left promiscuous mode [ 189.431623][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.445127][ T8] device veth1_macvtap left promiscuous mode [ 189.461413][ T8] device veth0_vlan left promiscuous mode [ 189.538686][ T9173] syz-executor.0[9173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.538785][ T9173] syz-executor.0[9173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.245839][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.315820][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.362087][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.373901][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.382611][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.389490][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.396985][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.405908][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.423383][ T9200] syz-executor.4[9200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.423834][ T9200] syz-executor.4[9200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.437691][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.456108][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.514706][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.523760][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.566374][ T9129] device veth0_vlan entered promiscuous mode [ 190.615063][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.624166][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.634151][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.653799][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.662080][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.697168][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.725967][ T9129] device veth1_macvtap entered promiscuous mode [ 190.798936][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.849910][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.061493][ T9262] Â: renamed from pim6reg1 [ 192.325935][ T9286] Â: renamed from pim6reg1 [ 192.725595][ T9306] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 192.759147][ T9308] syz-executor.4[9308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.759227][ T9308] syz-executor.4[9308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.160852][ T9321] syz-executor.4[9321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.308325][ T9321] syz-executor.4[9321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.986297][ T9365] device bridge0 entered promiscuous mode [ 194.235001][ T9380] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 1025 (only 8 groups) [ 194.809297][ T9433] device syzkaller0 entered promiscuous mode [ 195.101470][ T9466] syz-executor.1[9466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.101544][ T9466] syz-executor.1[9466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.273255][ T9485] Â: renamed from pim6reg1 [ 195.302073][ T28] audit: type=1400 audit(1719236854.463:153): avc: denied { create } for pid=9482 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 195.701594][ T9520] Â: renamed from pim6reg1 [ 197.161926][ T9604] Â: renamed from pim6reg1 [ 197.334418][ T9614] : renamed from veth0_vlan [ 199.199101][ T9760] gretap0: mtu less than device minimum [ 199.544814][ T9775] device syzkaller0 entered promiscuous mode [ 200.117524][ T9795] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 200.754146][ T9816] device vxcan1 entered promiscuous mode [ 201.676328][ T9850] device syzkaller0 entered promiscuous mode [ 201.782317][ T9861] device vxcan1 entered promiscuous mode [ 202.758110][ T9907] device sit0 left promiscuous mode [ 202.900307][ T9909] device sit0 entered promiscuous mode [ 203.086118][ T9917] FAULT_INJECTION: forcing a failure. [ 203.086118][ T9917] name failslab, interval 1, probability 0, space 0, times 0 [ 203.178190][ T9917] CPU: 0 PID: 9917 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 203.188109][ T9917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 203.198105][ T9917] Call Trace: [ 203.201210][ T9917] [ 203.203985][ T9917] dump_stack_lvl+0x151/0x1b7 [ 203.208506][ T9917] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 203.213798][ T9917] ? __ext4_find_entry+0x17d6/0x1af0 [ 203.219005][ T9917] dump_stack+0x15/0x1b [ 203.222994][ T9917] should_fail_ex+0x3d0/0x520 [ 203.227509][ T9917] ? jbd2__journal_start+0x150/0x720 [ 203.232637][ T9917] __should_failslab+0xaf/0xf0 [ 203.237263][ T9917] should_failslab+0x9/0x20 [ 203.241667][ T9917] kmem_cache_alloc+0x3b/0x2c0 [ 203.246259][ T9917] jbd2__journal_start+0x150/0x720 [ 203.251208][ T9917] __ext4_journal_start_sb+0x24d/0x4b0 [ 203.256513][ T9917] __ext4_unlink+0x412/0xba0 [ 203.260930][ T9917] ? __ext4_read_dirblock+0x8f0/0x8f0 [ 203.266139][ T9917] ? rwsem_mark_wake+0x6b0/0x6b0 [ 203.270903][ T9917] ext4_unlink+0x142/0x3f0 [ 203.275156][ T9917] vfs_unlink+0x38c/0x630 [ 203.279349][ T9917] do_unlinkat+0x483/0x920 [ 203.283577][ T9917] ? fsnotify_link_count+0x100/0x100 [ 203.288697][ T9917] ? getname_flags+0x1fd/0x520 [ 203.293296][ T9917] __x64_sys_unlink+0x49/0x50 [ 203.297838][ T9917] do_syscall_64+0x3d/0xb0 [ 203.302148][ T9917] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 203.307874][ T9917] RIP: 0033:0x7f6e3707d0a9 [ 203.312126][ T9917] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 203.331842][ T9917] RSP: 002b:00007f6e37e920c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 203.340184][ T9917] RAX: ffffffffffffffda RBX: 00007f6e371b3f80 RCX: 00007f6e3707d0a9 [ 203.347994][ T9917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 203.355805][ T9917] RBP: 00007f6e37e92120 R08: 0000000000000000 R09: 0000000000000000 [ 203.363619][ T9917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.371538][ T9917] R13: 000000000000000b R14: 00007f6e371b3f80 R15: 00007ffccdda37a8 [ 203.379381][ T9917] [ 203.687215][ T9981] syz-executor.4[9981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.687290][ T9981] syz-executor.4[9981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.839474][ T9988] Â: renamed from pim6reg1 [ 204.261198][ T9995] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.308244][ T9995] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.352206][ T9995] device bridge_slave_0 entered promiscuous mode [ 204.416132][ T9995] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.468992][ T9995] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.476831][ T9995] device bridge_slave_1 entered promiscuous mode [ 204.484443][ T8] bridge0: port 3(gretap0) entered disabled state [ 204.518410][ T8] device gretap0 left promiscuous mode [ 204.539077][ T8] bridge0: port 3(gretap0) entered disabled state [ 204.786730][ T8] device bridge_slave_1 left promiscuous mode [ 204.798338][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.901268][ T8] device bridge_slave_0 left promiscuous mode [ 204.915795][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.954546][ T8] device veth1_macvtap left promiscuous mode [ 204.983914][ T8] device veth0_vlan left promiscuous mode [ 205.692860][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.702728][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.730945][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.752483][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.766502][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.773417][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.783150][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.800126][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.809853][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.817822][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.824692][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.831894][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.840140][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.848234][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.856193][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.870588][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.879263][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.893584][ T9995] device veth0_vlan entered promiscuous mode [ 205.901147][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.909464][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.924572][ T9995] device veth1_macvtap entered promiscuous mode [ 205.932040][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.940025][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.947452][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.016635][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.049342][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.211532][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.222022][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.231980][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.240569][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.290654][T10099] device bridge0 entered promiscuous mode [ 206.444831][T10123] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.467286][ T28] audit: type=1400 audit(1719236865.623:154): avc: denied { create } for pid=10125 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 206.481191][T10123] O3ãc¤±: renamed from bridge_slave_0 [ 207.638398][T10217] device wg2 entered promiscuous mode [ 207.657964][T10221] Â: renamed from pim6reg1 [ 207.765304][T10234] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 207.901650][T10242] device syzkaller0 entered promiscuous mode [ 207.915105][T10247] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.922249][T10247] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.944642][T10247] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.951570][T10247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.958751][T10247] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.965594][T10247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.976900][T10247] device bridge0 entered promiscuous mode [ 208.649574][T10295] device syzkaller0 entered promiscuous mode [ 209.304163][T10336] bridge0: port 3(veth1_macvtap) entered blocking state [ 209.321317][T10336] bridge0: port 3(veth1_macvtap) entered disabled state [ 209.727273][T10378] geneve1: tun_chr_ioctl cmd 1074025681 [ 209.856446][T10385] device veth1_macvtap left promiscuous mode [ 210.393958][T10436] device veth0_vlan left promiscuous mode [ 210.418643][T10436] device veth0_vlan entered promiscuous mode [ 213.397926][T10551] syz-executor.3[10551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.398008][T10551] syz-executor.3[10551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.817339][T10575] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 214.194184][T10598] device syzkaller0 entered promiscuous mode [ 214.344800][T10607] device syzkaller0 entered promiscuous mode [ 215.619599][T10683] syz-executor.4[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.619676][T10683] syz-executor.4[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.690163][T10683] syz-executor.4[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.728746][T10683] syz-executor.4[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.779961][T10697] syz-executor.0[10697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.858917][T10697] syz-executor.0[10697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.069946][T10717] Â: renamed from pim6reg1 [ 216.096374][T10722] Â: renamed from pim6reg1 [ 216.313566][ T102] udevd[102]: worker [1889] terminated by signal 33 (Unknown signal 33) [ 216.403160][T10761] syz-executor.2[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.403268][T10761] syz-executor.2[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.511692][T10779] Â: renamed from pim6reg1 [ 218.040284][ T28] audit: type=1400 audit(1719236877.203:155): avc: denied { create } for pid=10902 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 218.718881][ T28] audit: type=1400 audit(1719236877.883:156): avc: denied { append } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 218.874347][ T28] audit: type=1400 audit(1719236877.883:157): avc: denied { open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 219.069284][ T28] audit: type=1400 audit(1719236877.883:158): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 219.752953][T11006] device pim6reg1 entered promiscuous mode [ 221.258384][T11078] bpf_get_probe_write_proto: 2 callbacks suppressed [ 221.258405][T11078] syz-executor.2[11078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.277417][T11078] syz-executor.2[11078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.524991][T11090] syz-executor.3[11090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.563636][T11090] syz-executor.3[11090] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.736747][ T28] audit: type=1400 audit(1719236880.893:159): avc: denied { read write } for pid=11110 comm="syz-executor.4" name="cgroup.subtree_control" dev="cgroup2" ino=349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 221.807997][ T28] audit: type=1400 audit(1719236880.933:160): avc: denied { open } for pid=11110 comm="syz-executor.4" path="" dev="cgroup2" ino=349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 221.832162][ T28] audit: type=1400 audit(1719236880.943:161): avc: denied { ioctl } for pid=11110 comm="syz-executor.4" path="" dev="cgroup2" ino=349 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 222.357866][T11160] syz-executor.4[11160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.357946][T11160] syz-executor.4[11160] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.455012][T11166] veth1_macvtap: mtu greater than device maximum [ 222.630795][T11177] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 222.927174][T11214] Â: renamed from pim6reg1 [ 223.047741][T11230] syz-executor.3[11230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.047813][T11230] syz-executor.3[11230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.149778][T11240] Â: renamed from pim6reg1 [ 223.169813][T11242] syz-executor.3[11242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.169903][T11242] syz-executor.3[11242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.256587][T11246] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 225.282913][T11341] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 228.152322][ T28] audit: type=1400 audit(1719236887.313:162): avc: denied { create } for pid=11454 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 228.246454][T11469] syz-executor.3[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.246535][T11469] syz-executor.3[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.305397][T11469] syz-executor.3[11469] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.162934][T11606] syz-executor.1[11606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.185181][T11606] syz-executor.1[11606] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.799732][T11651] bridge0: port 3(dummy0) entered blocking state [ 230.866052][T11651] bridge0: port 3(dummy0) entered disabled state [ 230.906421][T11651] device dummy0 entered promiscuous mode [ 230.947234][T11651] bridge0: port 3(dummy0) entered blocking state [ 230.953456][T11651] bridge0: port 3(dummy0) entered forwarding state [ 231.054656][T11654] device dummy0 left promiscuous mode [ 231.080874][T11654] bridge0: port 3(dummy0) entered disabled state [ 233.098331][T11672] syz-executor.0[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.098415][T11672] syz-executor.0[11672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.566582][T11709] syz-executor.2[11709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.718403][T11709] syz-executor.2[11709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.905353][T11725] Â: renamed from pim6reg1 [ 235.881345][ T28] audit: type=1400 audit(1719236895.043:163): avc: denied { create } for pid=11849 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 237.100186][T11910] tap0: tun_chr_ioctl cmd 2147767520 [ 238.540707][T11963] Â: renamed from pim6reg1 [ 238.957389][T11999] device syzkaller0 entered promiscuous mode [ 239.142755][T12023] device veth0_virt_wifi entered promiscuous mode [ 239.821960][T12072] device syzkaller0 entered promiscuous mode [ 241.202483][T12157] device syzkaller0 entered promiscuous mode [ 241.696138][T12208] device pim6reg1 entered promiscuous mode [ 242.065097][T12209] device syzkaller0 entered promiscuous mode [ 242.525887][T12240] device pim6reg1 entered promiscuous mode [ 242.873334][T12272] FAULT_INJECTION: forcing a failure. [ 242.873334][T12272] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 242.892319][T12272] CPU: 0 PID: 12272 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 242.902329][T12272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 242.912222][T12272] Call Trace: [ 242.915342][T12272] [ 242.918125][T12272] dump_stack_lvl+0x151/0x1b7 [ 242.922640][T12272] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 242.927930][T12272] ? avc_has_extended_perms+0x90b/0x10f0 [ 242.933404][T12272] dump_stack+0x15/0x1b [ 242.937391][T12272] should_fail_ex+0x3d0/0x520 [ 242.941909][T12272] should_fail+0xb/0x10 [ 242.945895][T12272] should_fail_usercopy+0x1a/0x20 [ 242.950758][T12272] _copy_from_user+0x1e/0xc0 [ 242.955182][T12272] ip_tunnel_siocdevprivate+0xa3/0x1c0 [ 242.960479][T12272] ? ip_tunnel_update+0xc40/0xc40 [ 242.965338][T12272] ? do_vfs_ioctl+0xba7/0x29a0 [ 242.969940][T12272] ? kstrtouint_from_user+0x124/0x180 [ 242.975149][T12272] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 242.980788][T12272] ? cgroup_rstat_updated+0xe5/0x370 [ 242.985910][T12272] ? __alloc_pages+0x3a1/0x780 [ 242.990510][T12272] ? sit_tunnel_xmit+0x2510/0x2510 [ 242.995455][T12272] ? full_name_hash+0x9d/0xf0 [ 242.999969][T12272] dev_ifsioc+0xd40/0x1150 [ 243.004226][T12272] ? ioctl_has_perm+0x3f0/0x560 [ 243.008911][T12272] ? dev_ioctl+0xe60/0xe60 [ 243.013158][T12272] ? __kasan_check_write+0x14/0x20 [ 243.018105][T12272] ? mutex_lock+0xb1/0x1e0 [ 243.022360][T12272] ? bit_wait_io_timeout+0x120/0x120 [ 243.027487][T12272] dev_ioctl+0x5e9/0xe60 [ 243.031768][T12272] sock_ioctl+0x665/0x740 [ 243.035918][T12272] ? sock_poll+0x400/0x400 [ 243.040265][T12272] ? security_file_ioctl+0x84/0xb0 [ 243.045205][T12272] ? sock_poll+0x400/0x400 [ 243.049465][T12272] __se_sys_ioctl+0x114/0x190 [ 243.053982][T12272] __x64_sys_ioctl+0x7b/0x90 [ 243.058400][T12272] do_syscall_64+0x3d/0xb0 [ 243.062660][T12272] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 243.068376][T12272] RIP: 0033:0x7f986f87d0a9 [ 243.072630][T12272] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 243.092082][T12272] RSP: 002b:00007f98706320c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.100318][T12272] RAX: ffffffffffffffda RBX: 00007f986f9b3f80 RCX: 00007f986f87d0a9 [ 243.108320][T12272] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 243.116128][T12272] RBP: 00007f9870632120 R08: 0000000000000000 R09: 0000000000000000 [ 243.123951][T12272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.132013][T12272] R13: 000000000000000b R14: 00007f986f9b3f80 R15: 00007ffd2406b148 [ 243.139836][T12272] [ 243.176306][T12278] Â: renamed from pim6reg1 [ 243.296001][T12284] syz-executor.0[12284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.296518][T12284] syz-executor.0[12284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.488293][T12301] device pim6reg1 entered promiscuous mode [ 244.115921][T12335] Â: renamed from pim6reg1 [ 247.529658][T12498] Â: renamed from pim6reg1 [ 247.619927][T12509] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.627015][T12509] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.559667][T12572] EXT4-fs warning (device sda1): verify_group_input:175: Bad blocks count 0 [ 249.334089][T12633] syz-executor.3[12633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.334160][T12633] syz-executor.3[12633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.414700][T12710] device sit0 entered promiscuous mode [ 252.595303][T12781] syz-executor.2[12781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.595380][T12781] syz-executor.2[12781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.233483][T12812] device sit0 entered promiscuous mode [ 254.675455][T12902] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 254.692324][T12904] bridge0: port 3(veth1_macvtap) entered blocking state [ 254.739867][T12904] bridge0: port 3(veth1_macvtap) entered disabled state [ 254.823779][T12911] Â: renamed from pim6reg1 [ 254.869624][T12907] device sit0 left promiscuous mode [ 255.409494][T12939] syz-executor.0[12939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.409573][T12939] syz-executor.0[12939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.769848][T12959] device syzkaller0 entered promiscuous mode [ 256.062714][T12990] Â: renamed from pim6reg1 [ 257.016796][ T28] audit: type=1400 audit(1719236916.173:164): avc: denied { setattr } for pid=13051 comm="syz-executor.0" path="/dev/ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 257.222785][T13069] syz-executor.1[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.224452][T13069] syz-executor.1[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.316931][T13069] syz-executor.1[13069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.392694][T13228] syz-executor.0[13228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.405157][T13228] syz-executor.0[13228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.749711][T13261] device veth1_macvtap left promiscuous mode [ 261.841940][T13262] device veth1_macvtap entered promiscuous mode [ 261.848316][T13262] device macsec0 entered promiscuous mode [ 263.648542][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.655536][T13366] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.663090][T13366] device bridge_slave_0 entered promiscuous mode [ 263.670223][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.677123][T13366] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.684547][T13366] device bridge_slave_1 entered promiscuous mode [ 263.788738][T13393] Â: renamed from pim6reg1 [ 263.804112][T13366] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.811031][T13366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.818116][T13366] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.824877][T13366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.938146][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.960933][T12968] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.990796][T12968] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.033549][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.087426][T12968] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.094330][T12968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.101755][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.109898][T12968] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.116799][T12968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.124671][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.133363][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.155650][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.200400][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.210915][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.222697][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.327708][T13366] device veth0_vlan entered promiscuous mode [ 264.335478][T12865] device bridge_slave_1 left promiscuous mode [ 264.344080][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.360713][T12865] device bridge_slave_0 left promiscuous mode [ 264.372281][T12865] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.381250][T12865] device veth1_macvtap left promiscuous mode [ 264.547014][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 264.565852][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 264.607627][T13366] device veth1_macvtap entered promiscuous mode [ 264.631796][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 264.641697][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 264.661412][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 264.689883][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 264.719280][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.962180][T13471] device syzkaller0 entered promiscuous mode [ 265.693425][T13505] syz-executor.3[13505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.693504][T13505] syz-executor.3[13505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.770055][T13505] bridge0: port 3(veth1_macvtap) entered blocking state [ 265.801583][T13505] bridge0: port 3(veth1_macvtap) entered disabled state [ 266.004376][T13508] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.011430][T13508] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.018871][T13508] device bridge_slave_0 entered promiscuous mode [ 266.026303][T13508] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.035401][T13508] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.042827][T13508] device bridge_slave_1 entered promiscuous mode [ 266.203084][T12868] device bridge_slave_1 left promiscuous mode [ 266.209137][T12868] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.244690][T12868] device bridge_slave_0 left promiscuous mode [ 266.276755][T12868] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.321646][T12868] device veth0_vlan left promiscuous mode [ 267.146067][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.156676][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.192711][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.201420][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.210584][ T2797] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.217473][ T2797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.255029][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.263453][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.271584][ T2797] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.278484][ T2797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.296308][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.304192][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.313691][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.323999][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.332519][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.347629][T13508] device veth0_vlan entered promiscuous mode [ 267.395729][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.413548][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.430754][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.438372][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.455326][T13508] device veth1_macvtap entered promiscuous mode [ 267.487739][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.540525][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.789161][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.801803][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.810021][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.875310][T13635] syz-executor.2[13635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.876172][T13635] syz-executor.2[13635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.401205][T13672] syz-executor.3[13672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.413551][T13672] syz-executor.3[13672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.484337][T13678] device sit0 entered promiscuous mode [ 268.774443][T13694] syz-executor.2[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.774518][T13694] syz-executor.2[13694] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.071227][T13724] Â: renamed from pim6reg1 [ 269.409851][T13752] FAULT_INJECTION: forcing a failure. [ 269.409851][T13752] name failslab, interval 1, probability 0, space 0, times 0 [ 269.462026][T13752] CPU: 0 PID: 13752 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 269.472033][T13752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 269.481931][T13752] Call Trace: [ 269.485057][T13752] [ 269.487831][T13752] dump_stack_lvl+0x151/0x1b7 [ 269.492347][T13752] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 269.497649][T13752] dump_stack+0x15/0x1b [ 269.501726][T13752] should_fail_ex+0x3d0/0x520 [ 269.506241][T13752] ? __alloc_skb+0xcc/0x2d0 [ 269.510582][T13752] __should_failslab+0xaf/0xf0 [ 269.515180][T13752] should_failslab+0x9/0x20 [ 269.519533][T13752] kmem_cache_alloc_node+0x3e/0x2d0 [ 269.524552][T13752] ? ____kasan_slab_free+0x13c/0x180 [ 269.529675][T13752] __alloc_skb+0xcc/0x2d0 [ 269.533838][T13752] ? addrconf_ifdown+0x1791/0x1ab0 [ 269.538784][T13752] inet6_netconf_notify_devconf+0x10f/0x1c0 [ 269.544534][T13752] addrconf_ifdown+0x17a7/0x1ab0 [ 269.549300][T13752] ? addrconf_cleanup+0x140/0x140 [ 269.554144][T13752] ? mutex_unlock+0xb2/0x260 [ 269.558638][T13752] ? __kasan_check_write+0x14/0x20 [ 269.563522][T13752] ? __mutex_lock_slowpath+0x10/0x10 [ 269.568642][T13752] ? macsec_notify+0x101/0x4c0 [ 269.573345][T13752] ? __mutex_lock_slowpath+0x10/0x10 [ 269.578450][T13752] addrconf_notify+0x32f/0xe10 [ 269.583055][T13752] ? ip6mr_device_event+0x1ea/0x210 [ 269.588086][T13752] raw_notifier_call_chain+0x8c/0xf0 [ 269.593204][T13752] unregister_netdevice_many+0xe2a/0x1740 [ 269.598761][T13752] ? alloc_netdev_mqs+0xf90/0xf90 [ 269.603625][T13752] ? selinux_capable+0x2f1/0x430 [ 269.608478][T13752] ? selinux_capset+0xf0/0xf0 [ 269.613004][T13752] ? __kasan_check_read+0x11/0x20 [ 269.617851][T13752] unregister_netdevice_queue+0x2e6/0x350 [ 269.623418][T13752] ? list_netdevice+0x710/0x710 [ 269.628097][T13752] ? ns_capable+0x89/0xe0 [ 269.632260][T13752] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 269.637047][T13752] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 269.642504][T13752] ? ip_tunnel_update+0xc40/0xc40 [ 269.647370][T13752] ? do_vfs_ioctl+0xba7/0x29a0 [ 269.651962][T13752] ? kstrtouint_from_user+0x124/0x180 [ 269.657349][T13752] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 269.663160][T13752] ? cgroup_rstat_updated+0xe5/0x370 [ 269.668277][T13752] ? sit_tunnel_xmit+0x2510/0x2510 [ 269.673226][T13752] ? full_name_hash+0x9d/0xf0 [ 269.677742][T13752] dev_ifsioc+0xd40/0x1150 [ 269.681991][T13752] ? ioctl_has_perm+0x3f0/0x560 [ 269.686789][T13752] ? dev_ioctl+0xe60/0xe60 [ 269.691033][T13752] ? __kasan_check_write+0x14/0x20 [ 269.695979][T13752] ? mutex_lock+0xb1/0x1e0 [ 269.700232][T13752] ? bit_wait_io_timeout+0x120/0x120 [ 269.705358][T13752] dev_ioctl+0x5e9/0xe60 [ 269.709566][T13752] sock_ioctl+0x665/0x740 [ 269.713936][T13752] ? sock_poll+0x400/0x400 [ 269.718266][T13752] ? security_file_ioctl+0x84/0xb0 [ 269.723210][T13752] ? sock_poll+0x400/0x400 [ 269.727464][T13752] __se_sys_ioctl+0x114/0x190 [ 269.731987][T13752] __x64_sys_ioctl+0x7b/0x90 [ 269.736405][T13752] do_syscall_64+0x3d/0xb0 [ 269.740919][T13752] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 269.746645][T13752] RIP: 0033:0x7f986f87d0a9 [ 269.750900][T13752] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 269.770686][T13752] RSP: 002b:00007f98706320c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.778929][T13752] RAX: ffffffffffffffda RBX: 00007f986f9b3f80 RCX: 00007f986f87d0a9 [ 269.786741][T13752] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 269.794554][T13752] RBP: 00007f9870632120 R08: 0000000000000000 R09: 0000000000000000 [ 269.802366][T13752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.810175][T13752] R13: 000000000000000b R14: 00007f986f9b3f80 R15: 00007ffd2406b148 [ 269.818082][T13752] [ 269.832492][T13765] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 269.862709][T13768] syz-executor.4[13768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.862799][T13768] syz-executor.4[13768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.938548][ T28] audit: type=1400 audit(1719236930.103:165): avc: denied { create } for pid=13827 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 271.582828][T13868] device pim6reg1 entered promiscuous mode [ 271.972741][T13903] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 273.691145][T13997] device macsec0 entered promiscuous mode [ 274.986468][T14087] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 275.504505][T14132] syz-executor.3[14132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.504974][T14132] syz-executor.3[14132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.918761][T14181] syz-executor.4[14181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.932871][T14181] syz-executor.4[14181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.212118][T14212] syz-executor.4[14212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.278978][T14212] syz-executor.4[14212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.415262][T14280] syz-executor.3[14280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.470394][T14280] syz-executor.3[14280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.133995][T14338] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 280.679482][T14467] Â: renamed from pim6reg1 [ 280.807982][T14471] device pim6reg1 entered promiscuous mode [ 280.879316][T14479] bond_slave_1: mtu less than device minimum [ 282.128924][T14583] syz-executor.4[14583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.129281][T14583] syz-executor.4[14583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.215282][T14583] syz-executor.4[14583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.725745][T14611] bond_slave_1: mtu less than device minimum [ 282.824400][T14618] syz-executor.3[14618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.824477][T14618] syz-executor.3[14618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.836549][T14619] device pim6reg1 entered promiscuous mode [ 282.899019][T14618] syz-executor.3[14618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.899092][T14618] syz-executor.3[14618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.107076][T14627] device syzkaller0 entered promiscuous mode [ 283.214147][T14635] device wg2 entered promiscuous mode [ 283.880361][T14687] syz-executor.4[14687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.880803][T14687] syz-executor.4[14687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.038724][T14705] syz-executor.3[14705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.061701][T14707] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 284.372527][T14740] device syzkaller0 entered promiscuous mode [ 286.588679][T14921] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.610076][T14921] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.617831][T14921] device bridge_slave_0 entered promiscuous mode [ 286.632392][T14921] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.643210][T14921] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.658996][T14921] device bridge_slave_1 entered promiscuous mode [ 286.749586][T14966] FAULT_INJECTION: forcing a failure. [ 286.749586][T14966] name failslab, interval 1, probability 0, space 0, times 0 [ 286.791722][T14966] CPU: 0 PID: 14966 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 286.801745][T14966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 286.811715][T14966] Call Trace: [ 286.814835][T14966] [ 286.817615][T14966] dump_stack_lvl+0x151/0x1b7 [ 286.822128][T14966] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 286.827430][T14966] ? addrconf_ifdown+0x1866/0x1ab0 [ 286.832894][T14966] dump_stack+0x15/0x1b [ 286.836882][T14966] should_fail_ex+0x3d0/0x520 [ 286.841404][T14966] ? __alloc_skb+0xcc/0x2d0 [ 286.845764][T14966] __should_failslab+0xaf/0xf0 [ 286.850346][T14966] should_failslab+0x9/0x20 [ 286.854679][T14966] kmem_cache_alloc_node+0x3e/0x2d0 [ 286.859730][T14966] __alloc_skb+0xcc/0x2d0 [ 286.863967][T14966] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 286.869087][T14966] unregister_netdevice_many+0xebd/0x1740 [ 286.874639][T14966] ? alloc_netdev_mqs+0xf90/0xf90 [ 286.879497][T14966] ? selinux_capable+0x2f1/0x430 [ 286.884272][T14966] ? selinux_capset+0xf0/0xf0 [ 286.888789][T14966] ? __kasan_check_read+0x11/0x20 [ 286.893649][T14966] unregister_netdevice_queue+0x2e6/0x350 [ 286.899202][T14966] ? list_netdevice+0x710/0x710 [ 286.903894][T14966] ? ns_capable+0x89/0xe0 [ 286.908050][T14966] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 286.912827][T14966] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 286.918208][T14966] ? ip_tunnel_update+0xc40/0xc40 [ 286.923066][T14966] ? __mutex_lock+0x6c8/0x1ca0 [ 286.927680][T14966] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 286.933311][T14966] ? cgroup_rstat_updated+0xe5/0x370 [ 286.938426][T14966] ? __alloc_pages+0x727/0x780 [ 286.943027][T14966] ? sit_tunnel_xmit+0x2510/0x2510 [ 286.947977][T14966] ? full_name_hash+0x9d/0xf0 [ 286.952500][T14966] dev_ifsioc+0xd40/0x1150 [ 286.956743][T14966] ? ioctl_has_perm+0x3f0/0x560 [ 286.961430][T14966] ? dev_ioctl+0xe60/0xe60 [ 286.965683][T14966] ? __mutex_lock_slowpath+0xe/0x10 [ 286.970716][T14966] ? mutex_lock+0x130/0x1e0 [ 286.975056][T14966] ? bit_wait_io_timeout+0x120/0x120 [ 286.980179][T14966] dev_ioctl+0x5e9/0xe60 [ 286.984256][T14966] sock_ioctl+0x665/0x740 [ 286.988427][T14966] ? sock_poll+0x400/0x400 [ 286.992766][T14966] ? security_file_ioctl+0x84/0xb0 [ 286.997710][T14966] ? sock_poll+0x400/0x400 [ 287.001967][T14966] __se_sys_ioctl+0x114/0x190 [ 287.006474][T14966] __x64_sys_ioctl+0x7b/0x90 [ 287.010901][T14966] do_syscall_64+0x3d/0xb0 [ 287.015151][T14966] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 287.020880][T14966] RIP: 0033:0x7f986f87d0a9 [ 287.025135][T14966] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 287.044575][T14966] RSP: 002b:00007f98706320c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.052909][T14966] RAX: ffffffffffffffda RBX: 00007f986f9b3f80 RCX: 00007f986f87d0a9 [ 287.060720][T14966] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 287.068528][T14966] RBP: 00007f9870632120 R08: 0000000000000000 R09: 0000000000000000 [ 287.076340][T14966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.084150][T14966] R13: 000000000000000b R14: 00007f986f9b3f80 R15: 00007ffd2406b148 [ 287.091975][T14966] [ 287.096486][T12867] device bridge_slave_1 left promiscuous mode [ 287.102676][T12867] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.119320][T12867] device bridge_slave_0 left promiscuous mode [ 287.140205][T12867] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.156002][T12867] device veth1_macvtap left promiscuous mode [ 287.174277][T12867] device veth0_vlan left promiscuous mode [ 287.337350][T14994] bpf_get_probe_write_proto: 11 callbacks suppressed [ 287.337370][T14994] syz-executor.2[14994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.344015][T14994] syz-executor.2[14994] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.493508][T15015] Â: renamed from pim6reg1 [ 287.624771][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.635375][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.669553][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.678557][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.687027][T12967] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.693929][T12967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.702132][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.712449][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.720899][T12967] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.727788][T12967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.752621][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.763678][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.792176][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.825165][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.867616][T14921] device veth0_vlan entered promiscuous mode [ 287.883101][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.900398][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.951191][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.001242][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.035639][T14921] device veth1_macvtap entered promiscuous mode [ 288.078358][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.103777][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.721580][T15094] syz-executor.1[15094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.721662][T15094] syz-executor.1[15094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.375119][T15135] Â: renamed from pim6reg1 [ 289.658563][T15148] device veth0_vlan left promiscuous mode [ 289.672129][T15148] device veth0_vlan entered promiscuous mode [ 289.699813][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.715763][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.740874][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.815072][T15159] syz-executor.4[15159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.815140][T15159] syz-executor.4[15159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.748800][T15224] device syzkaller0 entered promiscuous mode [ 291.902051][T15293] Â: renamed from pim6reg1 [ 292.468336][T15303] syz-executor.3 (15303) used greatest stack depth: 19896 bytes left [ 293.961033][T15429] syz-executor.1[15429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.962241][T15429] syz-executor.1[15429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.003606][T15429] syz-executor.1[15429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.933821][T15470] device syzkaller0 entered promiscuous mode [ 295.836509][T15549] device pim6reg1 entered promiscuous mode [ 296.107000][T15566] device pim6reg1 entered promiscuous mode [ 296.522472][T15576] device syzkaller0 entered promiscuous mode [ 296.731605][T15600] device pim6reg1 entered promiscuous mode [ 296.920153][T15624] syz-executor.0[15624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.920215][T15624] syz-executor.0[15624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.001608][T15627] device syzkaller0 entered promiscuous mode [ 297.215071][T15658] device syzkaller0 entered promiscuous mode [ 297.229381][T15662] syz-executor.4[15662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.229480][T15662] syz-executor.4[15662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.658794][T15711] device veth1_macvtap left promiscuous mode [ 297.717697][T15711] EXT4-fs warning (device sda1): verify_group_input:172: Reserved blocks too high (74) [ 298.439474][T15757] device wg2 left promiscuous mode [ 298.478985][T15755] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 298.489457][T15755] pim6reg0: linktype set to 821 [ 298.823979][T15796] syz-executor.3[15796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.825810][T15796] syz-executor.3[15796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.391698][T15811] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 299.460809][T15811] pim6reg0: linktype set to 821 [ 299.513411][T15818] device syzkaller0 entered promiscuous mode [ 299.991101][T15862] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 300.200729][T15870] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 300.228801][T15870] pim6reg0: linktype set to 821 [ 300.335549][T15885] Â: renamed from pim6reg1 [ 300.358578][T15886] Â: renamed from pim6reg1 [ 300.515605][T15894] device pim6reg1 entered promiscuous mode [ 300.938316][T15922] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 300.960728][T15922] pim6reg0: linktype set to 821 [ 302.814840][T16036] Â: renamed from pim6reg1 [ 304.524686][T16120] Â: renamed from pim6reg1 [ 304.777835][T16130] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 306.417220][T16190] syz-executor.2 (16190) used greatest stack depth: 19864 bytes left [ 306.440305][T16210] device wg2 entered promiscuous mode [ 307.214638][T16250] Â: renamed from pim6reg1 [ 310.312078][T16299] Â: renamed from pim6reg1 [ 310.585967][T16318] nicvf0: tun_chr_ioctl cmd 1074025677 [ 310.591499][T16318] nicvf0: linktype set to 825 [ 311.277065][T16376] EXT4-fs (sda1): pa ffff88813995adc8: logic 0, phys. 196736, len 128 [ 311.285191][T16376] EXT4-fs error (device sda1): ext4_mb_release_inode_pa:4871: group 6, free 105, pa_free 60 [ 312.124118][ T66] EXT4-fs error (device sda1): mb_free_blocks:1813: group 6, block 196736:freeing already freed block (bit 128); block bitmap corrupt. [ 312.493543][T16442] syz-executor.1[16442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.493941][T16442] syz-executor.1[16442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.625720][T16442] syz-executor.1[16442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.934569][T16482] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 314.245027][T16567] syz-executor.4[16567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.245105][T16567] syz-executor.4[16567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.413596][T16662] syz-executor.1[16662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.451411][T16657] device syzkaller0 entered promiscuous mode [ 318.469340][T16662] syz-executor.1[16662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.881434][T16683] device syzkaller0 entered promiscuous mode [ 319.599663][T16726] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.606917][T16726] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.681170][T16726] device bridge0 left promiscuous mode [ 319.706391][T16736] device bridge_slave_1 left promiscuous mode [ 319.746773][T16736] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.786774][T16736] device bridge_slave_0 left promiscuous mode [ 319.818331][T16736] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.284700][T16779] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 320.403073][T16796] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 320.809239][T16824] syz-executor.0[16824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.809322][T16824] syz-executor.0[16824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.309405][T16840] device pim6reg1 entered promiscuous mode [ 321.642425][T16853] syz-executor.0[16853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.642515][T16853] syz-executor.0[16853] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.684029][ T28] audit: type=1400 audit(1719236980.843:166): avc: denied { create } for pid=16862 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 321.825732][T16876] FAULT_INJECTION: forcing a failure. [ 321.825732][T16876] name failslab, interval 1, probability 0, space 0, times 0 [ 321.857856][T16876] CPU: 0 PID: 16876 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 321.867861][T16876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 321.877758][T16876] Call Trace: [ 321.880876][T16876] [ 321.883659][T16876] dump_stack_lvl+0x151/0x1b7 [ 321.888164][T16876] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 321.893463][T16876] ? debug_smp_processor_id+0x17/0x20 [ 321.898671][T16876] dump_stack+0x15/0x1b [ 321.902683][T16876] should_fail_ex+0x3d0/0x520 [ 321.907179][T16876] ? kobject_uevent_env+0x262/0x720 [ 321.912242][T16876] __should_failslab+0xaf/0xf0 [ 321.916810][T16876] should_failslab+0x9/0x20 [ 321.921157][T16876] __kmem_cache_alloc_node+0x3d/0x250 [ 321.926366][T16876] ? kobject_uevent_env+0x262/0x720 [ 321.931522][T16876] kmalloc_trace+0x2a/0xa0 [ 321.935771][T16876] kobject_uevent_env+0x262/0x720 [ 321.940632][T16876] kobject_uevent+0x1f/0x30 [ 321.944964][T16876] __kobject_del+0xee/0x300 [ 321.949316][T16876] kobject_put+0x1cc/0x260 [ 321.953565][T16876] net_rx_queue_update_kobjects+0x42a/0x4a0 [ 321.959341][T16876] netdev_unregister_kobject+0x10a/0x260 [ 321.964757][T16876] unregister_netdevice_many+0x122c/0x1740 [ 321.970491][T16876] ? alloc_netdev_mqs+0xf90/0xf90 [ 321.975350][T16876] ? selinux_capable+0x2f1/0x430 [ 321.980120][T16876] ? selinux_capset+0xf0/0xf0 [ 321.984632][T16876] ? __kasan_check_read+0x11/0x20 [ 321.989492][T16876] unregister_netdevice_queue+0x2e6/0x350 [ 321.995057][T16876] ? list_netdevice+0x710/0x710 [ 321.999732][T16876] ? ns_capable+0x89/0xe0 [ 322.004010][T16876] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 322.008805][T16876] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 322.014164][T16876] ? ip_tunnel_update+0xc40/0xc40 [ 322.019026][T16876] ? do_vfs_ioctl+0xba7/0x29a0 [ 322.023712][T16876] ? kstrtouint_from_user+0x124/0x180 [ 322.028920][T16876] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 322.034562][T16876] ? cgroup_rstat_updated+0xe5/0x370 [ 322.039678][T16876] ? __alloc_pages+0x727/0x780 [ 322.044279][T16876] ? sit_tunnel_xmit+0x2510/0x2510 [ 322.049232][T16876] ? full_name_hash+0x9d/0xf0 [ 322.053746][T16876] dev_ifsioc+0xd40/0x1150 [ 322.057996][T16876] ? ioctl_has_perm+0x3f0/0x560 [ 322.062695][T16876] ? dev_ioctl+0xe60/0xe60 [ 322.066936][T16876] ? __kasan_check_write+0x14/0x20 [ 322.071878][T16876] ? mutex_lock+0xb1/0x1e0 [ 322.076140][T16876] ? bit_wait_io_timeout+0x120/0x120 [ 322.081257][T16876] dev_ioctl+0x5e9/0xe60 [ 322.085394][T16876] sock_ioctl+0x665/0x740 [ 322.089502][T16876] ? sock_poll+0x400/0x400 [ 322.093757][T16876] ? security_file_ioctl+0x84/0xb0 [ 322.098698][T16876] ? sock_poll+0x400/0x400 [ 322.102960][T16876] __se_sys_ioctl+0x114/0x190 [ 322.107468][T16876] __x64_sys_ioctl+0x7b/0x90 [ 322.111892][T16876] do_syscall_64+0x3d/0xb0 [ 322.116154][T16876] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 322.121874][T16876] RIP: 0033:0x7f2cd767d0a9 [ 322.126126][T16876] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 322.145574][T16876] RSP: 002b:00007f2cd84de0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.153812][T16876] RAX: ffffffffffffffda RBX: 00007f2cd77b3f80 RCX: 00007f2cd767d0a9 [ 322.161622][T16876] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 322.169609][T16876] RBP: 00007f2cd84de120 R08: 0000000000000000 R09: 0000000000000000 [ 322.177435][T16876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.185249][T16876] R13: 000000000000000b R14: 00007f2cd77b3f80 R15: 00007ffcf45b9338 [ 322.193152][T16876] [ 322.375088][T16895] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 324.290045][T16978] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 324.773031][T17019] Â: renamed from pim6reg1 [ 325.377363][T17070] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 325.668971][T17089] Â: renamed from pim6reg1 [ 326.165360][T17103] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 326.615643][T17134] Â: renamed from pim6reg1 [ 326.925922][T17158] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.935960][T17158] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.019585][T17166] device bridge_slave_1 left promiscuous mode [ 327.033940][T17166] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.062275][T17166] device bridge_slave_0 left promiscuous mode [ 327.092441][T17166] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.265751][T17204] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.272887][T17204] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.307244][T17204] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.314165][T17204] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.321359][T17204] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.328485][T17204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.366256][T17204] device bridge0 entered promiscuous mode [ 327.863454][T17233] device pim6reg1 entered promiscuous mode [ 328.364130][T17287] device sit0 entered promiscuous mode [ 329.288330][T17332] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 330.806197][T17432] device pim6reg1 entered promiscuous mode [ 332.333116][T17496] syz-executor.3[17496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.333192][T17496] syz-executor.3[17496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.557897][T17520] device pim6reg1 entered promiscuous mode [ 333.096596][T17575] FAULT_INJECTION: forcing a failure. [ 333.096596][T17575] name failslab, interval 1, probability 0, space 0, times 0 [ 333.109038][T17575] CPU: 1 PID: 17575 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 333.119021][T17575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 333.129006][T17575] Call Trace: [ 333.132289][T17575] [ 333.135078][T17575] dump_stack_lvl+0x151/0x1b7 [ 333.139581][T17575] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 333.144878][T17575] dump_stack+0x15/0x1b [ 333.148886][T17575] should_fail_ex+0x3d0/0x520 [ 333.153470][T17575] ? __sigqueue_alloc+0x130/0x200 [ 333.158329][T17575] __should_failslab+0xaf/0xf0 [ 333.162937][T17575] should_failslab+0x9/0x20 [ 333.167439][T17575] kmem_cache_alloc+0x3b/0x2c0 [ 333.172135][T17575] __sigqueue_alloc+0x130/0x200 [ 333.176819][T17575] __send_signal_locked+0x1a3/0xc30 [ 333.181848][T17575] send_signal_locked+0x43a/0x590 [ 333.186710][T17575] do_send_sig_info+0xde/0x230 [ 333.191311][T17575] group_send_sig_info+0x113/0x320 [ 333.196251][T17575] ? prep_new_page+0x1b/0x110 [ 333.200767][T17575] ? __lock_task_sighand+0x100/0x100 [ 333.205890][T17575] ? get_page_from_freelist+0x27ea/0x2870 [ 333.211446][T17575] ? _raw_spin_unlock+0x4c/0x70 [ 333.216229][T17575] bpf_send_signal_common+0x2d8/0x420 [ 333.221523][T17575] ? __kasan_check_write+0x14/0x20 [ 333.226465][T17575] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 333.232631][T17575] bpf_send_signal+0x19/0x20 [ 333.237061][T17575] bpf_prog_e7caf5d7133e2848+0x1a/0x1f [ 333.242363][T17575] bpf_trace_run4+0x18d/0x2f0 [ 333.246863][T17575] ? bpf_trace_run3+0x2e0/0x2e0 [ 333.251564][T17575] ? __alloc_pages+0x780/0x780 [ 333.256166][T17575] ? finish_task_switch+0x207/0x7b0 [ 333.261187][T17575] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 333.266488][T17575] __alloc_pages+0x727/0x780 [ 333.270909][T17575] ? prep_new_page+0x110/0x110 [ 333.275505][T17575] ? preempt_schedule_common+0xbe/0xf0 [ 333.280886][T17575] ? preempt_schedule+0xd9/0xe0 [ 333.285569][T17575] ? _find_next_bit+0x88/0x130 [ 333.290172][T17575] pcpu_populate_chunk+0x19f/0xc00 [ 333.295122][T17575] pcpu_alloc+0xa24/0x1440 [ 333.299376][T17575] __alloc_percpu_gfp+0x27/0x30 [ 333.304060][T17575] bpf_map_alloc_percpu+0xd2/0x2c0 [ 333.309015][T17575] array_map_alloc+0x3ab/0x6d0 [ 333.313798][T17575] map_create+0x44a/0xcf0 [ 333.318075][T17575] __sys_bpf+0x2e6/0x7f0 [ 333.322154][T17575] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 333.327370][T17575] ? debug_smp_processor_id+0x17/0x20 [ 333.332571][T17575] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 333.338481][T17575] __x64_sys_bpf+0x7c/0x90 [ 333.342807][T17575] do_syscall_64+0x3d/0xb0 [ 333.347068][T17575] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 333.352794][T17575] RIP: 0033:0x7f2cd767d0a9 [ 333.357052][T17575] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 333.376483][T17575] RSP: 002b:00007f2cd84de0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 333.384727][T17575] RAX: ffffffffffffffda RBX: 00007f2cd77b3f80 RCX: 00007f2cd767d0a9 [ 333.392541][T17575] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 333.400353][T17575] RBP: 00007f2cd84de120 R08: 0000000000000000 R09: 0000000000000000 [ 333.408160][T17575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.415974][T17575] R13: 000000000000000b R14: 00007f2cd77b3f80 R15: 00007ffcf45b9338 [ 333.423790][T17575] [ 334.213229][T17621] syz-executor.0[17621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.213305][T17621] syz-executor.0[17621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.262066][T17625] device pim6reg1 entered promiscuous mode [ 334.462574][T17649] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 334.667662][T17678] device wg2 left promiscuous mode [ 334.747874][T17685] syz-executor.0[17685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.747951][T17685] syz-executor.0[17685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.783010][T17685] syz-executor.0[17685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.795147][T17685] syz-executor.0[17685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.010640][T17699] syz-executor.1[17699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.068632][T17699] syz-executor.1[17699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.155270][T17752] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 336.207099][T17767] Â: renamed from pim6reg1 [ 339.252447][T17847] device pim6reg1 entered promiscuous mode [ 339.496451][T17871] Â: renamed from pim6reg1 [ 339.931366][T17917] bpf_get_probe_write_proto: 4 callbacks suppressed [ 339.931385][T17917] syz-executor.4[17917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.937918][T17917] syz-executor.4[17917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.820534][T17950] Â: renamed from pim6reg1 [ 341.209011][T17989] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 341.507009][T18014] device pim6reg1 entered promiscuous mode [ 341.682689][T18029] Â: renamed from pim6reg1 [ 346.290732][T18086] device pim6reg1 entered promiscuous mode [ 346.614803][T18131] device sit0 entered promiscuous mode [ 346.799503][T18154] FAULT_INJECTION: forcing a failure. [ 346.799503][T18154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.818315][T18154] CPU: 0 PID: 18154 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 346.828322][T18154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 346.838384][T18154] Call Trace: [ 346.841511][T18154] [ 346.844288][T18154] dump_stack_lvl+0x151/0x1b7 [ 346.848801][T18154] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 346.854096][T18154] ? do_vfs_ioctl+0xba7/0x29a0 [ 346.858696][T18154] dump_stack+0x15/0x1b [ 346.862687][T18154] should_fail_ex+0x3d0/0x520 [ 346.867207][T18154] should_fail+0xb/0x10 [ 346.871192][T18154] should_fail_usercopy+0x1a/0x20 [ 346.876142][T18154] _copy_to_user+0x1e/0x90 [ 346.880393][T18154] simple_read_from_buffer+0xc7/0x150 [ 346.885605][T18154] proc_fail_nth_read+0x1a3/0x210 [ 346.890460][T18154] ? proc_fault_inject_write+0x390/0x390 [ 346.895926][T18154] ? fsnotify_perm+0x470/0x5d0 [ 346.900615][T18154] ? security_file_permission+0x86/0xb0 [ 346.905997][T18154] ? proc_fault_inject_write+0x390/0x390 [ 346.911463][T18154] vfs_read+0x26c/0xad0 [ 346.915456][T18154] ? kernel_read+0x1f0/0x1f0 [ 346.919890][T18154] ? mutex_lock+0xb1/0x1e0 [ 346.924138][T18154] ? bit_wait_io_timeout+0x120/0x120 [ 346.929263][T18154] ? __fdget_pos+0x2e2/0x390 [ 346.933687][T18154] ? ksys_read+0x77/0x2c0 [ 346.937848][T18154] ksys_read+0x199/0x2c0 [ 346.941929][T18154] ? vfs_write+0xeb0/0xeb0 [ 346.946179][T18154] ? debug_smp_processor_id+0x17/0x20 [ 346.951391][T18154] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 346.957298][T18154] __x64_sys_read+0x7b/0x90 [ 346.961635][T18154] do_syscall_64+0x3d/0xb0 [ 346.965883][T18154] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 346.971614][T18154] RIP: 0033:0x7fd795c7bd4c [ 346.975860][T18154] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 346.995451][T18154] RSP: 002b:00007fd796a0d0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 347.003689][T18154] RAX: ffffffffffffffda RBX: 00007fd795db3f80 RCX: 00007fd795c7bd4c [ 347.011500][T18154] RDX: 000000000000000f RSI: 00007fd796a0d130 RDI: 0000000000000008 [ 347.019400][T18154] RBP: 00007fd796a0d120 R08: 0000000000000000 R09: 0000000000000000 [ 347.027209][T18154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.035026][T18154] R13: 000000000000000b R14: 00007fd795db3f80 R15: 00007ffea00af3b8 [ 347.042840][T18154] [ 347.875871][T18200] device syzkaller0 entered promiscuous mode [ 348.464813][T18229] syz-executor.3[18229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.465273][T18229] syz-executor.3[18229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.979441][T18332] syz-executor.0[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.986715][T18334] Â: renamed from pim6reg1 [ 350.023466][T18332] syz-executor.0[18332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.691536][T18385] device pim6reg1 entered promiscuous mode [ 351.775233][T18456] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 351.781137][T18468] Â: renamed from pim6reg1 [ 352.078858][T18514] syz-executor.4[18514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.078936][T18514] syz-executor.4[18514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.120464][T18516] device syzkaller0 entered promiscuous mode [ 352.174330][T18522] Â: renamed from pim6reg1 [ 352.370309][T18529] device pim6reg1 entered promiscuous mode [ 352.781800][T18565] device sit0 entered promiscuous mode [ 353.110012][T18591] bond_slave_1: mtu less than device minimum [ 353.335415][T18620] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 353.371581][T18619] device sit0 entered promiscuous mode [ 354.940447][T18719] Â: renamed from pim6reg1 [ 355.451271][T18747] device pim6reg1 entered promiscuous mode [ 355.845527][T18777] Â: renamed from pim6reg1 [ 356.200429][T18822] bridge0: port 3(veth1_macvtap) entered blocking state [ 356.224637][T18822] bridge0: port 3(veth1_macvtap) entered disabled state [ 357.228707][T18890] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 357.820959][T18967] device syzkaller0 entered promiscuous mode [ 358.911736][T19030] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 358.972782][T19032] syz-executor.2[19032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.972866][T19032] syz-executor.2[19032] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.301952][T19127] syz-executor.2[19127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.385281][T19127] syz-executor.2[19127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.067928][T19176] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 361.283152][T19182] bond_slave_1: mtu less than device minimum [ 361.816481][T19228] device syzkaller0 entered promiscuous mode [ 362.101091][T19237] device syzkaller0 entered promiscuous mode [ 362.793624][T19297] device pim6reg1 entered promiscuous mode [ 363.710918][T19357] device syzkaller0 entered promiscuous mode [ 363.764492][T19359] device syzkaller0 entered promiscuous mode [ 364.534098][T19385] device syzkaller0 entered promiscuous mode [ 364.866655][T19395] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 365.271485][T19415] device syzkaller0 entered promiscuous mode [ 365.428958][T19444] device syzkaller0 entered promiscuous mode [ 365.437420][T19446] Â: renamed from pim6reg1 [ 365.516487][T19455] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 365.625483][T19468] device pim6reg1 entered promiscuous mode [ 365.820683][T19485] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 365.881593][T19500] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 366.078693][T19507] device syzkaller0 entered promiscuous mode [ 366.247832][T19518] syz-executor.1[19518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.250130][T19518] syz-executor.1[19518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.298989][T19523] syz-executor.1[19523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.463502][T19584] syz-executor.2[19584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.487409][T19584] syz-executor.2[19584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.247436][T19664] syz-executor.1[19664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.298186][T19664] syz-executor.1[19664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.051770][T19728] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 369.380617][T19728] device syzkaller0 entered promiscuous mode [ 369.979389][T19763] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 370.257942][T19763] device syzkaller0 entered promiscuous mode [ 370.563415][T19817] device pim6reg1 entered promiscuous mode [ 370.592898][T19815] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 370.839853][T19815] device syzkaller0 entered promiscuous mode [ 370.892295][T19823] Â: renamed from pim6reg1 [ 371.355597][T19864] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 371.513955][T19864] device syzkaller0 entered promiscuous mode [ 371.665915][T19881] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 372.204044][T19915] Â: renamed from pim6reg1 [ 372.789215][T19951] syz-executor.2[19951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.789286][T19951] syz-executor.2[19951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.135028][T20030] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 374.488842][T20041] device pim6reg1 entered promiscuous mode [ 374.754936][T20056] tun0: tun_chr_ioctl cmd 21731 [ 374.860188][T20073] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 375.623601][T20124] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 376.073917][T20155] device wg2 entered promiscuous mode [ 376.197177][T20169] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 376.667881][T20206] syz-executor.0[20206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.671362][T20206] syz-executor.0[20206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.820307][T20217] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 377.141169][T20249] syz-executor.0[20249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.141283][T20249] syz-executor.0[20249] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.455907][T20531] Â: renamed from pim6reg1 [ 381.629651][T20538] FAULT_INJECTION: forcing a failure. [ 381.629651][T20538] name failslab, interval 1, probability 0, space 0, times 0 [ 381.682866][T20538] CPU: 1 PID: 20538 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 381.692879][T20538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 381.702858][T20538] Call Trace: [ 381.705981][T20538] [ 381.708765][T20538] dump_stack_lvl+0x151/0x1b7 [ 381.713270][T20538] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 381.718575][T20538] ? dev_ifsioc+0xd40/0x1150 [ 381.722989][T20538] ? __x64_sys_ioctl+0x7b/0x90 [ 381.727592][T20538] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 381.733497][T20538] dump_stack+0x15/0x1b [ 381.737485][T20538] should_fail_ex+0x3d0/0x520 [ 381.742086][T20538] ? kobject_get_path+0xbf/0x210 [ 381.746866][T20538] __should_failslab+0xaf/0xf0 [ 381.751455][T20538] should_failslab+0x9/0x20 [ 381.755795][T20538] __kmem_cache_alloc_node+0x3d/0x250 [ 381.761005][T20538] ? kobject_get_path+0xbf/0x210 [ 381.765773][T20538] __kmalloc+0xa3/0x1e0 [ 381.769768][T20538] kobject_get_path+0xbf/0x210 [ 381.774367][T20538] ? kmalloc_trace+0x44/0xa0 [ 381.778793][T20538] kobject_uevent_env+0x27c/0x720 [ 381.783674][T20538] kobject_uevent+0x1f/0x30 [ 381.788000][T20538] __kobject_del+0xee/0x300 [ 381.792334][T20538] kobject_put+0x1cc/0x260 [ 381.796588][T20538] netdev_queue_update_kobjects+0x406/0x4a0 [ 381.802314][T20538] ? net_rx_queue_update_kobjects+0x47d/0x4a0 [ 381.808217][T20538] netdev_unregister_kobject+0x117/0x260 [ 381.813687][T20538] unregister_netdevice_many+0x122c/0x1740 [ 381.819336][T20538] ? alloc_netdev_mqs+0xf90/0xf90 [ 381.824195][T20538] ? selinux_capable+0x2f1/0x430 [ 381.828960][T20538] ? selinux_capset+0xf0/0xf0 [ 381.833476][T20538] ? __kasan_check_read+0x11/0x20 [ 381.838334][T20538] unregister_netdevice_queue+0x2e6/0x350 [ 381.843889][T20538] ? list_netdevice+0x710/0x710 [ 381.848585][T20538] ? ns_capable+0x89/0xe0 [ 381.852743][T20538] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 381.857517][T20538] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 381.862897][T20538] ? ip_tunnel_update+0xc40/0xc40 [ 381.867756][T20538] ? do_vfs_ioctl+0xba7/0x29a0 [ 381.872370][T20538] ? kstrtouint_from_user+0x124/0x180 [ 381.877571][T20538] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 381.883207][T20538] ? cgroup_rstat_updated+0xe5/0x370 [ 381.888332][T20538] ? __alloc_pages+0x3a1/0x780 [ 381.892926][T20538] ? sit_tunnel_xmit+0x2510/0x2510 [ 381.897872][T20538] ? full_name_hash+0x9d/0xf0 [ 381.902396][T20538] dev_ifsioc+0xd40/0x1150 [ 381.906638][T20538] ? ioctl_has_perm+0x3f0/0x560 [ 381.911328][T20538] ? dev_ioctl+0xe60/0xe60 [ 381.915577][T20538] ? __kasan_check_write+0x14/0x20 [ 381.920526][T20538] ? mutex_lock+0xb1/0x1e0 [ 381.924780][T20538] ? bit_wait_io_timeout+0x120/0x120 [ 381.929903][T20538] dev_ioctl+0x5e9/0xe60 [ 381.934000][T20538] sock_ioctl+0x665/0x740 [ 381.938143][T20538] ? sock_poll+0x400/0x400 [ 381.942399][T20538] ? security_file_ioctl+0x84/0xb0 [ 381.947343][T20538] ? sock_poll+0x400/0x400 [ 381.951673][T20538] __se_sys_ioctl+0x114/0x190 [ 381.956117][T20538] __x64_sys_ioctl+0x7b/0x90 [ 381.960633][T20538] do_syscall_64+0x3d/0xb0 [ 381.964874][T20538] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 381.970624][T20538] RIP: 0033:0x7f101e87d0a9 [ 381.974859][T20538] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 381.994302][T20538] RSP: 002b:00007f101f5b30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 382.002547][T20538] RAX: ffffffffffffffda RBX: 00007f101e9b3f80 RCX: 00007f101e87d0a9 [ 382.010449][T20538] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 382.018254][T20538] RBP: 00007f101f5b3120 R08: 0000000000000000 R09: 0000000000000000 [ 382.026065][T20538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 382.033961][T20538] R13: 000000000000000b R14: 00007f101e9b3f80 R15: 00007ffe4a04bdb8 [ 382.041784][T20538] [ 383.782139][T20659] Â: renamed from pim6reg1 [ 385.182104][T20692] Â: renamed from pim6reg1 [ 385.277051][T20712] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 385.559349][T20754] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.630886][T20752] device syzkaller0 entered promiscuous mode [ 386.662761][T20838] device macsec0 left promiscuous mode [ 386.874025][T20847] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 388.102530][T20958] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 388.178317][T20964] device wg2 left promiscuous mode [ 389.063893][T12868] device veth1_macvtap left promiscuous mode [ 389.069858][T12868] device veth0_vlan left promiscuous mode [ 389.296147][T21002] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.303135][T21002] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.310629][T21002] device bridge_slave_0 entered promiscuous mode [ 389.318999][T21039] FAULT_INJECTION: forcing a failure. [ 389.318999][T21039] name failslab, interval 1, probability 0, space 0, times 0 [ 389.331748][T21039] CPU: 0 PID: 21039 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 389.341743][T21039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 389.351631][T21039] Call Trace: [ 389.354757][T21039] [ 389.357537][T21039] dump_stack_lvl+0x151/0x1b7 [ 389.362048][T21039] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 389.367341][T21039] ? vsnprintf+0x1b96/0x1c70 [ 389.371778][T21039] dump_stack+0x15/0x1b [ 389.375761][T21039] should_fail_ex+0x3d0/0x520 [ 389.380276][T21039] ? __alloc_skb+0xcc/0x2d0 [ 389.384698][T21039] __should_failslab+0xaf/0xf0 [ 389.389299][T21039] should_failslab+0x9/0x20 [ 389.393638][T21039] kmem_cache_alloc_node+0x3e/0x2d0 [ 389.398675][T21039] __alloc_skb+0xcc/0x2d0 [ 389.402928][T21039] alloc_uevent_skb+0x80/0x230 [ 389.407530][T21039] kobject_uevent_net_broadcast+0x188/0x590 [ 389.413256][T21039] kobject_uevent_env+0x53c/0x720 [ 389.418116][T21039] kobject_uevent+0x1f/0x30 [ 389.422465][T21039] __kobject_del+0xee/0x300 [ 389.426798][T21039] kobject_put+0x1cc/0x260 [ 389.431056][T21039] netdev_queue_update_kobjects+0x406/0x4a0 [ 389.436773][T21039] ? net_rx_queue_update_kobjects+0x47d/0x4a0 [ 389.442767][T21039] netdev_unregister_kobject+0x117/0x260 [ 389.448236][T21039] unregister_netdevice_many+0x122c/0x1740 [ 389.453891][T21039] ? alloc_netdev_mqs+0xf90/0xf90 [ 389.458730][T21039] ? selinux_capable+0x2f1/0x430 [ 389.463509][T21039] ? selinux_capset+0xf0/0xf0 [ 389.468031][T21039] ? __kasan_check_read+0x11/0x20 [ 389.472910][T21039] unregister_netdevice_queue+0x2e6/0x350 [ 389.478434][T21039] ? list_netdevice+0x710/0x710 [ 389.483255][T21039] ? ns_capable+0x89/0xe0 [ 389.487410][T21039] ipip6_tunnel_ctl+0x2d1/0x15c0 [ 389.492274][T21039] ip_tunnel_siocdevprivate+0x126/0x1c0 [ 389.497650][T21039] ? ip_tunnel_update+0xc40/0xc40 [ 389.502509][T21039] ? __mutex_lock+0x6c8/0x1ca0 [ 389.507116][T21039] ipip6_tunnel_siocdevprivate+0x206/0xe90 [ 389.512757][T21039] ? cgroup_rstat_updated+0xe5/0x370 [ 389.517896][T21039] ? __alloc_pages+0x3a1/0x780 [ 389.522478][T21039] ? sit_tunnel_xmit+0x2510/0x2510 [ 389.527422][T21039] ? full_name_hash+0x9d/0xf0 [ 389.531943][T21039] dev_ifsioc+0xd40/0x1150 [ 389.536188][T21039] ? ioctl_has_perm+0x3f0/0x560 [ 389.540879][T21039] ? dev_ioctl+0xe60/0xe60 [ 389.545130][T21039] ? __mutex_lock_slowpath+0xe/0x10 [ 389.550166][T21039] ? mutex_lock+0x130/0x1e0 [ 389.554499][T21039] ? bit_wait_io_timeout+0x120/0x120 [ 389.559711][T21039] dev_ioctl+0x5e9/0xe60 [ 389.563785][T21039] sock_ioctl+0x665/0x740 [ 389.568046][T21039] ? sock_poll+0x400/0x400 [ 389.572297][T21039] ? security_file_ioctl+0x84/0xb0 [ 389.577236][T21039] ? sock_poll+0x400/0x400 [ 389.581491][T21039] __se_sys_ioctl+0x114/0x190 [ 389.586005][T21039] __x64_sys_ioctl+0x7b/0x90 [ 389.590435][T21039] do_syscall_64+0x3d/0xb0 [ 389.594685][T21039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 389.600415][T21039] RIP: 0033:0x7fbb23a7d0a9 [ 389.604669][T21039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 389.624207][T21039] RSP: 002b:00007fbb247470c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 389.632619][T21039] RAX: ffffffffffffffda RBX: 00007fbb23bb3f80 RCX: 00007fbb23a7d0a9 [ 389.640439][T21039] RDX: 0000000020000080 RSI: 00000000000089f2 RDI: 0000000000000009 [ 389.648327][T21039] RBP: 00007fbb24747120 R08: 0000000000000000 R09: 0000000000000000 [ 389.656229][T21039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 389.664046][T21039] R13: 000000000000000b R14: 00007fbb23bb3f80 R15: 00007ffce492ff78 [ 389.671907][T21039] [ 389.676156][T21002] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.683172][T21002] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.690627][T21002] device bridge_slave_1 entered promiscuous mode [ 389.937190][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 389.946414][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.977585][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.008564][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.026015][T21072] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 390.039314][T12968] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.046171][T12968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.053685][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.061861][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.069886][T12968] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.076862][T12968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.084050][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 390.091874][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.099987][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 390.113844][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.127775][T21002] device veth0_vlan entered promiscuous mode [ 390.137251][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.145735][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.153322][ T489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.193105][T21002] device veth1_macvtap entered promiscuous mode [ 390.203502][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.219655][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.236247][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.894407][T12868] device bridge_slave_1 left promiscuous mode [ 390.919551][T12868] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.988792][T12868] device bridge_slave_0 left promiscuous mode [ 391.038757][T12868] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.100984][T12868] device veth1_macvtap left promiscuous mode [ 391.106916][T12868] device veth0_vlan left promiscuous mode [ 391.445680][T21104] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.478019][T21104] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.515307][T21104] device bridge_slave_0 entered promiscuous mode [ 391.592109][T21104] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.635513][T21104] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.675767][T21104] device bridge_slave_1 entered promiscuous mode [ 392.210449][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.223994][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.273614][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 392.297459][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.326818][ T2799] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.333838][ T2799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.374639][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 392.393093][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.420866][ T2799] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.427764][ T2799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.452675][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 392.468361][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.486484][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.505636][T21104] device veth0_vlan entered promiscuous mode [ 392.575183][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.633029][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.641230][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.669951][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.680189][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 392.690453][T21104] device veth1_macvtap entered promiscuous mode [ 392.720438][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 392.737184][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.309308][T21227] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.353039][T21227] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.391283][T21227] device bridge_slave_0 entered promiscuous mode [ 395.430029][T21227] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.437011][T21227] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.447211][T21227] device bridge_slave_1 entered promiscuous mode [ 395.868732][T12868] device bridge_slave_1 left promiscuous mode [ 395.876254][T12868] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.484711][T12868] device bridge_slave_0 left promiscuous mode [ 396.528169][T12868] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.558635][T12868] device veth1_macvtap left promiscuous mode [ 396.564723][T12868] device veth0_vlan left promiscuous mode [ 396.823595][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 396.831407][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 396.871368][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 396.880210][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 396.889660][ T6] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.896540][ T6] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.904022][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 396.912963][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 396.921288][ T6] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.928182][ T6] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.936064][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 396.948875][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 396.957429][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.983729][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 396.995518][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.010827][T21227] device veth0_vlan entered promiscuous mode [ 397.018082][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 397.026405][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 397.035546][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 397.043755][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.093824][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.101759][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.110353][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 397.119170][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 397.129968][T21227] device veth1_macvtap entered promiscuous mode [ 397.142144][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 397.152154][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 397.171511][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 397.195674][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 397.219012][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 397.362229][T21338] Â: renamed from pim6reg1 [ 397.756947][T21352] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.801769][T21352] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.809340][T21352] device bridge_slave_0 entered promiscuous mode [ 397.820039][T21352] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.827110][T21352] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.834682][T21352] device bridge_slave_1 entered promiscuous mode [ 397.937355][T12865] device bridge_slave_1 left promiscuous mode [ 397.943647][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.951208][T12865] device bridge_slave_0 left promiscuous mode [ 397.957176][T12865] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.043050][T12865] device veth1_macvtap left promiscuous mode [ 398.055995][T12865] device veth0_vlan left promiscuous mode [ 398.659199][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 398.673276][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.769891][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.788190][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.796435][T12967] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.803314][T12967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.810789][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.821164][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.830728][T12967] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.837623][T12967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.846298][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.854742][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.879095][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 398.893274][T21352] device veth0_vlan entered promiscuous mode [ 398.909655][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 398.918561][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.926897][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 398.934854][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.967212][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.974671][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.990244][T21352] device veth1_macvtap entered promiscuous mode [ 399.048407][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 399.056498][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 399.071785][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 399.079435][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.087718][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 399.096750][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 399.105046][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 399.140889][T21413] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.149969][T21413] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.157445][T21413] device bridge_slave_0 entered promiscuous mode [ 399.176490][T21413] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.184910][T21413] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.197629][T21413] device bridge_slave_1 entered promiscuous mode [ 399.350878][T21413] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.357774][T21413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.364893][T21413] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.371746][T21413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.478143][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.489722][T12967] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.514827][T12967] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.560052][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.621816][T12967] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.628732][T12967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.648177][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.656521][T12967] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.663393][T12967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.727279][T21454] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 399.749607][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.757607][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.777668][T21413] device veth0_vlan entered promiscuous mode [ 399.800514][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 399.809624][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 399.817637][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 399.825063][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 399.833675][T12865] device bridge_slave_1 left promiscuous mode [ 399.841202][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.849368][T12865] device O3ãc¤± left promiscuous mode [ 399.854798][T12865] bridge0: port 1(O3ãc¤±) entered disabled state [ 399.862274][T12865] device veth0_vlan left promiscuous mode [ 400.076803][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 400.092760][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 400.109256][T21413] device veth1_macvtap entered promiscuous mode [ 400.137140][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 400.145882][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 400.154298][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 400.182731][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 400.191257][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 400.311768][T21457] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.343343][T21457] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.390205][T21457] device bridge_slave_0 entered promiscuous mode [ 400.448345][T21457] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.497455][T21457] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.537578][T21457] device bridge_slave_1 entered promiscuous mode [ 400.793943][T21509] device pim6reg1 entered promiscuous mode [ 400.961808][T21457] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.968704][T21457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.975832][T21457] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.982733][T21457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.132207][ T24] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.149431][ T24] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.279307][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.286752][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.320639][T12865] device bridge_slave_1 left promiscuous mode [ 401.332632][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.365152][T12865] device bridge_slave_0 left promiscuous mode [ 401.401092][T12865] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.445548][T12865] device veth1_macvtap left promiscuous mode [ 401.458795][T12865] device veth0_vlan left promiscuous mode [ 401.681972][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.700589][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.711612][T12967] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.718516][T12967] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.727010][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.736815][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.773034][T12967] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.779952][T12967] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.799402][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 401.808367][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.819777][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 401.831820][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.862019][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 401.874319][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.885218][T21457] device veth0_vlan entered promiscuous mode [ 401.891716][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 401.899932][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.953693][T21457] device veth1_macvtap entered promiscuous mode [ 401.985964][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.993622][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.042866][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 402.095196][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 402.127390][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.204811][T21591] device syzkaller0 entered promiscuous mode [ 402.215039][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 402.233960][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 402.254435][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 402.269227][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.599663][T21614] Â: renamed from pim6reg1 [ 402.940744][T21625] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.973269][T21625] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.007861][T21625] device bridge_slave_0 entered promiscuous mode [ 403.043872][T21625] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.079195][T21625] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.111107][T21625] device bridge_slave_1 entered promiscuous mode [ 403.144109][T21647] syz-executor.4[21647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.144185][T21647] syz-executor.4[21647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.158479][T12868] device bridge_slave_1 left promiscuous mode [ 403.195678][T12868] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.206581][T12868] device bridge_slave_0 left promiscuous mode [ 403.232948][T12868] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.245977][T12868] device veth1_macvtap left promiscuous mode [ 403.259318][T12868] device veth0_vlan left promiscuous mode [ 403.598869][T21669] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 403.666487][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.676251][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.687416][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 403.696447][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.704595][ T2799] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.711661][ T2799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.719084][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 403.727327][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.735682][ T2799] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.742570][ T2799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.750722][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 403.785027][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 403.793791][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.801839][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 403.815430][T21625] device veth0_vlan entered promiscuous mode [ 403.823240][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.831526][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 403.839305][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 403.881646][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 403.893154][T21625] device veth1_macvtap entered promiscuous mode [ 403.907691][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 403.918849][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.688124][T12865] device bridge_slave_1 left promiscuous mode [ 404.704221][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.762565][T12865] device bridge_slave_0 left promiscuous mode [ 404.813421][T12865] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.876222][T12865] device veth1_macvtap left promiscuous mode [ 404.924862][T12865] device veth0_vlan left promiscuous mode [ 405.435119][T21766] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 405.468054][T21736] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.474994][T21736] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.483067][T21736] device bridge_slave_0 entered promiscuous mode [ 405.492084][T21736] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.499055][T21736] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.507471][T21736] device bridge_slave_1 entered promiscuous mode [ 405.664617][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.673149][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.699011][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.711732][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.723257][ T2799] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.730164][ T2799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.737796][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.746089][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.775767][ T2799] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.782671][ T2799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.802836][T21803] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 405.827164][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 405.836348][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.845477][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.861696][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.870842][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.881078][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.888923][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.897259][T21736] device veth0_vlan entered promiscuous mode [ 405.948139][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.981075][T21736] device veth1_macvtap entered promiscuous mode [ 406.006371][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 406.017017][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.254324][T21826] syz-executor.4[21826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.254403][T21826] syz-executor.4[21826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.346529][T21831] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 406.500364][T21834] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.507349][T21834] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.514892][T21834] device bridge_slave_0 entered promiscuous mode [ 406.523504][T21834] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.530478][T21834] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.538150][T21834] device bridge_slave_1 entered promiscuous mode [ 406.673807][T21862] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 406.710505][T12863] device bridge_slave_1 left promiscuous mode [ 406.716733][T12863] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.726557][T12863] device bridge_slave_0 left promiscuous mode [ 406.737625][T12863] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.745799][T12863] device veth1_macvtap left promiscuous mode [ 406.751959][T12863] device veth0_vlan left promiscuous mode [ 406.866514][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.876196][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.902910][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.947266][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.992165][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.999147][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.107211][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 407.124181][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 407.141031][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.147927][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.172068][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 407.187371][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 407.215619][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 407.246888][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 407.279133][T21834] device veth0_vlan entered promiscuous mode [ 407.298683][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.312349][T21834] device veth1_macvtap entered promiscuous mode [ 407.338826][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 407.347267][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.369735][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.399746][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 407.428374][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 408.144829][T21923] device syzkaller0 entered promiscuous mode [ 408.172897][T21914] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.179882][T21914] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.187505][T21914] device bridge_slave_0 entered promiscuous mode [ 408.194663][T21914] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.203625][T21914] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.211779][T21914] device bridge_slave_1 entered promiscuous mode [ 408.459606][T12865] device bridge_slave_1 left promiscuous mode [ 408.466851][T12865] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.544864][T12865] device bridge_slave_0 left promiscuous mode [ 408.566088][T12865] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.611450][T12865] device veth1_macvtap left promiscuous mode [ 408.628117][T12865] device veth0_vlan left promiscuous mode [ 409.141043][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.161210][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.198712][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.207009][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.243565][ T2799] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.250479][ T2799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.303534][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.342376][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.371849][ T2799] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.378761][ T2799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.420829][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 409.450408][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 409.470377][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 409.486033][ T2799] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.601727][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 409.623015][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 409.632524][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.692742][T21914] device veth0_vlan entered promiscuous mode [ 409.715134][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 409.733264][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.776525][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.790865][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.807700][T21914] device veth1_macvtap entered promiscuous mode [ 409.818677][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 409.827839][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.858825][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.887198][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 409.900870][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 409.909558][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.917817][T12968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 410.563093][T12864] device bridge_slave_1 left promiscuous mode [ 410.572447][T12864] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.593899][T12864] device bridge_slave_0 left promiscuous mode [ 410.609908][T12864] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.627019][T12864] device veth1_macvtap left promiscuous mode [ 410.639686][T12864] device veth0_vlan left promiscuous mode [ 410.871879][T22049] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.879036][T22049] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.886440][T22049] device bridge_slave_0 entered promiscuous mode [ 410.899125][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.908143][T22049] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.915579][T22049] device bridge_slave_1 entered promiscuous mode [ 410.954355][T22069] bridge0: port 3(veth1_macvtap) entered blocking state [ 410.961894][T22069] bridge0: port 3(veth1_macvtap) entered disabled state [ 411.036092][T22049] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.043003][T22049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.050188][T22049] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.056938][T22049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.078252][ T2797] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.088705][ T2797] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.122815][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.130544][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.149043][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.159341][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.167570][ T2797] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.174456][ T2797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.184433][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 411.195786][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 411.206317][ T2797] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.213482][ T2797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 411.247663][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 411.257530][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 411.266008][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 411.275783][ T2797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 411.302676][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 411.314830][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 411.359933][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 411.384209][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.415636][T22049] device veth0_vlan entered promiscuous mode [ 411.545245][T22095] device syzkaller0 entered promiscuous mode [ 411.571667][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.581547][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 411.652116][T22049] device veth1_macvtap entered promiscuous mode [ 411.683353][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 411.691493][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 411.699788][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 411.715845][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 411.725021][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 411.733439][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 411.748068][T12967] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2024/06/24 13:51:11 SYZFATAL: executor 3 failed 11 times: executor 3: exit status 67 err exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 exit status 67