last executing test programs: 2.896852286s ago: executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x1d}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='jbd2_handle_stats\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x200, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext, 0x105241, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r4}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r9}, 0x10) write$cgroup_pid(r3, &(0x7f0000000980), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.120691065s ago: executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x85, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x92, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x4, 0x80000000, 0x3, 0x5, 0x0, 0x1, 0xa6, '\x00', r0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa3, 0xa3, 0x9, [@datasec={0x1, 0x3, 0x0, 0xf, 0x3, [{0x4, 0x7, 0x10001}, {0x2, 0x3}, {0x1, 0xfaed, 0x5}], "d81328"}, @var={0xc, 0x0, 0x0, 0xe, 0x5}, @volatile={0x3}, @restrict={0x5, 0x0, 0x0, 0xb, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x10001}}, @func={0xe, 0x0, 0x0, 0xc, 0x1}, @volatile={0xa}, @fwd={0xb}, @fwd={0x7}]}, {0x0, [0x2e, 0x0, 0x30, 0x51, 0x2e, 0x2e, 0x30]}}, &(0x7f00000004c0)=""/227, 0xc5, 0xe3, 0x1, 0x1}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xb422dd5, '\x00', r0, r4, 0x0, 0x1, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r2, 0xffffffffffffffff}, 0x4) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0xc9, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x13, &(0x7f00000006c0)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @exit], &(0x7f0000000780)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41100, 0xe, '\x00', r0, 0x0, r3, 0x8, &(0x7f00000007c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0x1, 0x20, 0x800}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000880)=[r5, r5, r5, r5, r7], &(0x7f00000008c0)=[{0x2, 0x3, 0xd, 0x7}], 0x10, 0x7}, 0x90) write$cgroup_type(r3, &(0x7f00000009c0), 0x9) r8 = openat$cgroup_ro(r3, &(0x7f0000000a00)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40)={r3}, 0x8) r10 = openat$cgroup_type(r9, &(0x7f0000000a80), 0x2, 0x0) openat$cgroup_ro(r8, &(0x7f0000000ac0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r5, 0x0, 0xfb, 0x25, &(0x7f0000000b00)="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", &(0x7f0000000c00)=""/37, 0x6a34, 0x0, 0x93, 0x1000, &(0x7f0000000c40)="e6591ee2bd86ff181749641b6a4714b71f7d13e3746f1003c2c73cfc524afeed1c52fff70c898363f0e295d57763e643393ae680a959fee7da5f6083ec7f1769130d7fe34bdef5baa88fcd7c31d44a016362c7b1f8075fa635dde5cbc5e95b76ac1aca58c77f7cfe2c4cb82614dae8ee615a4b5c8af9f81217345260f1de25d3b41e4e12911aff916ecc6bf87f3b3499cd5ac2", &(0x7f0000000d00)="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", 0x1, 0x0, 0x3}, 0x50) r11 = openat$cgroup_ro(r5, &(0x7f0000001e00)='memory.events.local\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001ec0)={0x5, 0x7, &(0x7f0000001d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, [@exit, @jmp={0x5, 0x1, 0x8, 0x2, 0x5, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000001dc0)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x2, '\x00', r0, 0x1a, r11, 0x8, &(0x7f0000001e40)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001e80)={0x3, 0x7, 0x3, 0x9}, 0x10, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r10, 0x4008240b, &(0x7f0000001fc0)={0x1, 0x80, 0x61, 0x9, 0x1f, 0x0, 0x0, 0x9, 0x18102, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffc1, 0x1, @perf_bp={&(0x7f0000001f80), 0xf}, 0x100000, 0x6, 0x713, 0x6, 0xffe6, 0x1000, 0x6, 0x0, 0xfffffff7, 0x0, 0x100000000000}) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000002040)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000002080)={r12}, 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002100)=@generic={&(0x7f00000020c0)='.\x00', r11}, 0x18) r13 = gettid() syz_open_procfs$namespace(r13, &(0x7f0000002140)='ns/pid_for_children\x00') bpf$MAP_CREATE(0x0, &(0x7f0000002180)=@base={0x1c, 0x3f, 0x3, 0x0, 0x400, 0x1, 0xe87, '\x00', r0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000002200), 0x410c00, 0x0) mkdir(&(0x7f0000002240)='.\x00', 0x80) r14 = openat$cgroup_procs(r8, &(0x7f0000002280)='cgroup.procs\x00', 0x2, 0x0) r15 = getpid() write$cgroup_pid(r14, &(0x7f00000022c0)=r15, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002580)={&(0x7f0000002300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x158, 0x158, 0xc, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x5, 0x7f}}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x6b, 0x0, 0x4f, 0xa}, @typedef={0x7, 0x0, 0x0, 0x8, 0x5}, @union={0xe, 0x4, 0x0, 0x5, 0x1, 0x20, [{0x4, 0x5, 0x2}, {0x3, 0x2, 0xffff}, {0xc, 0x3, 0x80}, {0x2, 0x4, 0x7}]}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x3a, 0x0, 0x60, 0x2}, @struct={0xc, 0x8, 0x0, 0x4, 0x1, 0x2, [{0x8, 0x1, 0x1000}, {0xf, 0x0, 0x10000}, {0x8, 0x1, 0x3}, {0xd, 0x3, 0x8000}, {0x3, 0x5, 0x100}, {0x3, 0x0, 0x200}, {0x9, 0x2, 0x1}, {0xc, 0x5, 0x3}]}, @const={0xe}, @typedef={0x1, 0x0, 0x0, 0x8, 0x1}, @typedef={0x8}, @struct={0xd, 0x5, 0x0, 0x4, 0x1, 0x800, [{0x10, 0x2, 0x6}, {0xb, 0x3, 0xd4}, {0x7, 0x1, 0x8000}, {0x3, 0x5, 0x6}, {0xe, 0x1, 0x80000000}]}]}, {0x0, [0x30, 0x0, 0x61, 0x30, 0x30, 0x0, 0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000002480)=""/216, 0x17c, 0xd8, 0x1, 0x7ff}, 0x20) 2.101954688s ago: executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000000, 0x9, 0x8, 0x3770, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c00)={r1}, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18ffffffdd000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000c2000000b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00'}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014910000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={0xffffffffffffffff, r2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r7}, 0x20) sendmsg$inet(r6, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x17, 0x0, 0x1f, 0x6}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r10, 0x0, 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES32=0x0], 0x0, 0x1a, 0x0, 0x1}, 0x20) 1.738367963s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) (async) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) (async, rerun: 32) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.io_service_bytes_recursive\x00', 0x26e1, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0185879, &(0x7f0000000040)) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.675001324s ago: executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 1.620034191s ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES16], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000900)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000006}, 0x0, 0xb, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4051000e1fffffeffffffffffffff631a8a64fe474800000005000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x6a, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="4aa94870da6552340afbaaff8e9a7e8bacad6b032749f7af851e3d760c1d34cef84627705025a3277a1f00000000000000365d5dbd6b463adeb2a6751c6661e8859b9d421a2fdd2337ac66e30a7175986a6dc7fd8304b0ddc40dab8125ec2a26447c237b5733a2834234c61ec8dfcd779a099b356bf346dd1f1245cb2f0a26bbeb0b8c125ab3e17c6fd0f0ba877b1794152e4bd568f04089a93449831a36c7a85393e40321c6390654dadcd124873c364bc8530948c580cdad6780c9021848523c21b215c6f900de181a0a68ecc7ee268d7cddbb2f2d569fdad7007686ff05db0612e320"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x19, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(r1, &(0x7f0000000400)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40286608, &(0x7f00000000c0)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000600), 0x88000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x47b53a3f48669bb2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000340), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='ext4_drop_inode\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x12, 0x7, 0x8, 0x8000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00'}, 0x90) 1.531764616s ago: executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x0, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x90) 1.470093415s ago: executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x7, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[], 0x0, 0x40000, 0x5f, 0x0, 0x40efd, 0x75, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='ext4_ext_remove_space\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffa6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x0, 0x4, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00'}, 0x3d) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x408c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 1.427960311s ago: executing program 1: perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x40, 0x6, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r0}, 0x48) bpf$MAP_UPDATE_BATCH(0x18, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3ff, r1, 0x0, 0x1000000}, 0x38) 1.412535613s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='ext4_fallocate_exit\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000006002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x144000, 0x7fe2, 0x1}, 0x48) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x113bbc05768eb7d, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={r13, r8, 0x0, 0x4, &(0x7f00000007c0)='},\'\x00'}, 0x30) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r9}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r12}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x41009432, &(0x7f00000005c0)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r9, &(0x7f0000000040)}, 0x20) 1.375274289s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x21, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002100)={{}, &(0x7f0000001c00), &(0x7f00000020c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='svcrdma_post_recv\x00', r1}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x400, 0xff, 0x8001, 0x1040, r4, 0x8, '\x00', 0x0, r3, 0x0, 0x0, 0x4, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd1, &(0x7f0000000000)=ANY=[@ANYRESHEX=r2, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000100)=0x7b, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={0x0, 0x0, 0x5e}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000640)}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r7, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xa) socketpair(0x21, 0x3, 0x0, &(0x7f0000001380)) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x2300, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 1.245099209s ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)='%pK \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1701007aa4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) 1.159264153s ago: executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x15, 0xffffffff, 0xeb95, 0xfffffff9, 0x2700, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={&(0x7f0000000000)="2e9b432fcbc40a5a98be8df97f0dfd0c9e1abfb77cff326cff42a209c354c7713284228bec2935ec375a2596b484f93e5db0509eddadc4d4ebb9dce6c36c44ff0a30d29902808f53029abddf3f72f6820da6", &(0x7f0000000080)=""/92, &(0x7f0000000100)="a43b46c8c30698d9c9685d22a198af49cbc6c2f5386bb1d0996af61690a120552cf4ad502e1c6db7d85ef7bbd2a8edf3ff77fe979d6124ffdd86c1cd0d60383c5f3c5f4de6466855e1d470b26fc155e6fcac8a5a33e97276416221355653fd1851ebad902cd3b3610bc615b3c418ba800b70539a28a4c48b", &(0x7f0000000180)="312f773bc27f8f3e5ee6c0710cda3711987fe48050069af12ed8359c72055929a8d252486fcdf0baad1d4c9b761dc8bf223ba9c827d5dcb72de92b5c5ae8460d3ca010b34655f74ffc107a2c7428924379b01540fa63fa5b3435f6366c8d6a5a76e776de032c0abf1e8d181d617a4a527c21877c7a0864717cc56d2f76d4de1fd53d9c26b33c2d8a79243b3a9d684f5268f769c80e8424cd0a2e0f305bae8c6978d831ddb1df776dbc4a43528077060f94f1924e994c45444f2d88423805006c78e12e9771a0a1ac5a", 0xfff, r0, 0x4}, 0x38) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x0, 0x0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x16, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x97, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0x5, &(0x7f00000007c0)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x20}, @jmp={0x5, 0x0, 0x2, 0x6, 0x5, 0x4, 0x4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffff8}], &(0x7f0000000800)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x4, 0x1, 0xabe8, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x19, 0x12, &(0x7f0000000380)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x7, 0x0, 0xd, 0x2, 0x2, 0x9c, 0x10}, @generic={0x20, 0x1, 0x6, 0x3, 0x200}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x37, '\x00', r2, 0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x4, 0xc, 0x6, 0x9}, 0x10, 0x0, r3, 0x8, &(0x7f0000000940)=[r0, r0, r0, r0], &(0x7f0000000980)=[{0x5, 0x1, 0x7, 0x2}, {0x4, 0x1, 0xc, 0x7}, {0x4, 0x4, 0x6, 0x7}, {0x1, 0x3, 0x8, 0xa}, {0x0, 0x1, 0xb}, {0x5, 0x1, 0xf, 0xc}, {0x4, 0x4, 0x10, 0x5}, {0x1, 0x4, 0xc, 0x1}], 0x10, 0x2}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c00)={r0, &(0x7f0000000ac0)="c79617f6ae0520a8dda9f89213f7265fb33c255f4c7507cdcbf67fff7de805fdc1e8889d6d2d", &(0x7f0000000b00)=""/232, 0x4}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000c40), 0x20800, 0x0) ioctl$TUNSETLINK(r5, 0x400454cd, 0x325) r6 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000c80)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000cc0)=0x1, 0x12) r7 = perf_event_open(&(0x7f0000000d00)={0x0, 0x80, 0x59, 0x0, 0x5, 0x40, 0x0, 0x8000000000000001, 0x20040, 0x7, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x8, 0x7fffffff}, 0x2a02, 0x0, 0x0, 0x9, 0x5, 0x5, 0x8000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000d80)=0x8000000000000000) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000fc0)=r1, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)=r3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x11, 0x1d, &(0x7f0000000dc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8de, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}}, @alu={0x4, 0x1, 0xc, 0x1, 0x0, 0x1, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xa04ba9f534f577da}}}, &(0x7f0000000ec0)='GPL\x00', 0x5, 0x92, &(0x7f0000000f00)=""/146, 0x41000, 0x20, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000001000)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000001040)={0x1, 0x7, 0x7, 0x9}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000001140)=[r9], &(0x7f0000001180)=[{0x0, 0x1, 0x0, 0x8}, {0x2, 0x5, 0x6, 0xa}, {0x0, 0x5, 0xc, 0x5}, {0x4, 0x2, 0x10, 0xc}, {0x0, 0x3, 0x3, 0xb}, {0x3, 0x2, 0x0, 0xa}, {0x3, 0x3, 0x4, 0xb}, {0x4, 0x3, 0x1, 0xc}, {0x4, 0x3, 0xb, 0xc}], 0x10, 0x2}, 0x90) r10 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001300), 0x2, 0x0) write$cgroup_type(r10, &(0x7f0000001340), 0x9) r11 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001380), 0x4) r12 = bpf$ITER_CREATE(0x21, &(0x7f00000013c0)={r11}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r4, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000001440)=[0x0], &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x99, &(0x7f00000014c0)=[{}, {}], 0x10, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0x8e, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001800)={r0, &(0x7f0000001700)="1772f194145e25abae99596038e02e26c66bd7f40f3b439aa55475e4c111ba43f83b4e20a3719a6067115584ab6a65a43094b9e4417c8a2f428ab2484c1b8fc8804e8d31e67b8d4af90d869651f9e3cd502f9a131498ecd23e106dfcce72b8b7fb32876d9cbcfd0aeeef05bca77339c9e8bbc79c321ffa907af1a51dd83aac92322ace80bce7d6068be6531e4b57b9288fda88444914bbe14a6cd99c549a89313ff9c995dddcc205a3ac3a4499ae6c3e909b1e594f9257e2e5bd31e36d06d3732de045f7e1903f46daa21da6b295e6bdbc8966f1d39d53636ba91cfe12604e"}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001a80)=@bpf_ext={0x1c, 0x13, &(0x7f0000001840)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffb}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x0, 0x1, 0x2, 0x2, 0x1, 0x10}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000001900)='syzkaller\x00', 0x2, 0xaa, &(0x7f0000001940)=""/170, 0x41000, 0x20, '\x00', r13, 0x0, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a00)={0x3, 0xa, 0x6e5, 0x9}, 0x10, 0x84b0, 0xffffffffffffffff, 0x0, &(0x7f0000001a40)=[r12, r9], 0x0, 0x10, 0xfffffffb}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b40)={0xffffffffffffffff}) recvmsg$unix(r14, &(0x7f0000003ec0)={0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000001b80)=""/89, 0x59}, {&(0x7f0000001c00)=""/252, 0xfc}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/4096, 0x1000}, {&(0x7f0000003d00)=""/174, 0xae}], 0x5, &(0x7f0000003e40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x21) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003f00)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000041c0)={r16, 0x0, 0xcc, 0x75, &(0x7f0000003f40)="00527cd7b73e20c20d9b531aace540d53aeb0272f91ecb956abbb624ad5046c392c3dbc263eb36827400e8be6da938315370845a634d8b295eceb10ab32f09ad070746580d131826ee49f231df105a4e66b7deeaeffe9196b745933a0aa3a896ee7a1ee9c30a5b719f249ff3890f211ecd42805ed955675ebf4e503686d55f5b399a475ea98710ef798e2b73346fade3122878c1b01af7581030b94620e2d0cbd30c91d2dd85a99127c462d2082413e07410769855501b1564f923fda887c9681cf51614be793ab60d4ec7f7", &(0x7f0000004040)=""/117, 0x9a, 0x0, 0x7c, 0x7d, &(0x7f00000040c0)="7881fce388b60951fa83f2ade9de59c2ea18c34c9f970550d9aaada1ab442a9c8fdc14d23f60c1b737544d9169c8dd91e9455d85b891df683a0626f004978418a49ddb99f54e03e688d0d1c02e8384bc69080f1990576d45d6f3110d05661dff8d9bcdd8a53ef11fbde40fdcf83f3c88be2c8c36c03790aa945d9551", &(0x7f0000004140)="f2e87badfaa2c5499e593a5aedeebdf4eb86fed4db52396c10b52a866a8f5fc576f360b5c0d39d7c54a35b8be5a1cd689ae8f3ffa0a50c2a14b103eb24caf22aa962b74fdc1e13c0cc991d000462b1bddec79f8cc49456996abb97092f565a1492ee80a81d7d423043a68ff190b1926cf8ca3a18e7077f15f94bd76e09", 0x1, 0x0, 0x7fffffff}, 0x50) socketpair(0x1f, 0xa, 0x9, &(0x7f0000004240)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004300)={{r18, 0xffffffffffffffff}, &(0x7f0000004280), &(0x7f00000042c0)=r17}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000043c0)={{r19}, &(0x7f0000004340), &(0x7f0000004380)=r15}, 0x20) 1.150007754s ago: executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 1.120516699s ago: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x85}, [@printk={@d, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xb0}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x90) 1.101857191s ago: executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x7, 0x1}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)=@o_path={0x0, 0x0, 0x8, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000980)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfff}, @map_fd={0x18, 0xa}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x10000001, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @jmp={0x5, 0x0, 0x7, 0x0, 0x6, 0xfffffffffffffff0}, @generic={0x20, 0x0, 0x7, 0x0, 0xe810}, @alu={0x7, 0x0, 0x0, 0xb, 0x0, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x6, 0x64, &(0x7f0000001300)=""/100, 0x40f00, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x5, 0x5, 0x27, 0x5}, 0x10, 0x19008, r0, 0x3, &(0x7f0000000ac0)=[0xffffffffffffffff, r4, r5, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000b00)=[{0x2, 0x4, 0x0, 0x4}, {0x1, 0x2, 0x9, 0x2}, {0x2, 0x4, 0x10, 0x4}], 0x10, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x11, 0x19, &(0x7f0000000c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5380, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0xb2}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @jmp={0x5, 0x0, 0xc, 0x0, 0x1, 0x8, 0x1}, @map_val={0x18, 0x2, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @alu={0x4, 0x0, 0xd, 0xa, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}, @exit]}, &(0x7f00000002c0)='GPL\x00', 0x9, 0x2a, &(0x7f0000000300)=""/42, 0x41100, 0x8, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d80)={0x4, 0xd, 0x2400000, 0x8001}, 0x10, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000dc0)=[{0x2, 0x2, 0xb, 0x2}, {0x1, 0x4, 0x10, 0x5}, {0x2, 0x4, 0x9, 0x2}, {0x2, 0x2, 0x8, 0x2}, {0x2, 0x4, 0xc, 0xb}, {0x0, 0x2, 0x3, 0x3}, {0x3, 0x3, 0xa, 0x5}, {0x5, 0x5, 0x10, 0x6}]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_bp={&(0x7f0000000480), 0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x19, 0x5, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x3}]}, &(0x7f00000003c0)='syzkaller\x00', 0xfffeffff, 0xb2, &(0x7f00000009c0)=""/178, 0x41000, 0x8, '\x00', 0x0, 0x8f62debaf788584f, r7, 0x8, &(0x7f00000006c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0xa, 0x8, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f0000000900)=[r4, r2, r3, r4, r2, r5], &(0x7f0000000f00)=[{0x3, 0x5, 0x9}, {0x3, 0x1, 0xd, 0x7}, {0x2, 0x3, 0x9, 0x5}, {0x2, 0x5, 0xe, 0x8}, {0x3, 0x1, 0x1, 0x1}, {0x4, 0x2, 0xe, 0xb}, {0x0, 0x3, 0x10, 0x8}, {0x2, 0x4, 0xe, 0x6}, {0x1, 0x1, 0x1, 0x9}]}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001000)={@cgroup=r2, 0x1, 0x0, 0x230, &(0x7f0000000a80)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000fc0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001400)={@cgroup, r9, 0x1d, 0x0, r8, @prog_fd=r6, r10}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0x97}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x2, 0x0, 0x4000}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001140)={{r2, 0xffffffffffffffff}, &(0x7f00000010c0), &(0x7f0000001100)='%pS \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x130fff55b31eac3c}}}, &(0x7f0000001040)='GPL\x00', 0x400, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x741a, r0, 0x0, &(0x7f00000013c0)=[0xffffffffffffffff, r5, r5, r12], 0x0, 0x10, 0x4c0e0000}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) 1.062224857s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x1ff000, 0x66, 0x7f, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), 0x0}, 0x20) 1.015048074s ago: executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000074140000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000080)) 980.00229ms ago: executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x0, 0x8, 0x8}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000ea94a91711a671a5", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001d0000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000900)='mm_page_alloc\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x24c129e275504e82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250}, 0x90) 948.589115ms ago: executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x49, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='global_dirty_state\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x0, 0x1400}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x144000, 0x7fe2, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0xc}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000022850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380), 0x0, 0x7, r1}, 0x38) openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000004bdb0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 924.352378ms ago: executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004662b, 0x20001412) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)=r3}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x400, 0x66e}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x3, 0x9, 0x7f, 0x0, 0x101, 0x12200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xba, 0x0, @perf_config_ext={0x9b0, 0x9}, 0x1c243, 0x3, 0x7fffffff, 0x7, 0x80000000, 0x200, 0x6, 0x0, 0xfffeffff, 0x0, 0x19d}, r5, 0xd, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 690.594375ms ago: executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000000), &(0x7f00000000c0)=r0}, 0x20) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x1, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000020000000000000000000000018119d80", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r4}, 0x10) write$cgroup_pid(r3, &(0x7f0000000580), 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000180)='ext4_ext_show_extent\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000000), 0x400000) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x27, &(0x7f0000000540), 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r10, &(0x7f0000000200), 0x43451) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r7, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x26, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f0000000a40), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) sendmsg$inet(r10, &(0x7f0000000400)={&(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000080)}, {&(0x7f0000000280)="9598cd5da006c3d2f2c19f21aab8e15792eda69fd849f3fcb3fc18256e6d738d6a7524118b2fa0cf4146d9aeefa4a216a460bfd8968d213b670be66d1e6b9371e422d7cc81bb9d4f9705f5bd5d437c7d21faacc2f63631b1b1ccbb891ffd61da263c607892a9a2707082ba25429141f531a93045fac22fad601db0516375d35f5975dfa1071dcc7847dfa9fc57117d0042ade13f5cde91e0d58ca9baa19984294d166d1a374511b31427395f03825601a56ad3f2716eed5a1c4c440c00107c7e4d907943977bf3cee0f252f336e188a8f503bb5e47", 0xd5}, {&(0x7f00000001c0)="cc1ee4bf14365a872433724da99a5bc173726200a2bbe17005c3efb7ba1d6441b206b61ee4e91dea470898d6216f577fe52c3ba546d8337e0caaf7f9622ec39434f30ba3e91fee3995277d853f21d23670c4ffa327a9e49bf5618202866264cb198de3dddc6b6427feaf613e", 0x6c}, {&(0x7f00000005c0)="7f0433e438bafb7b1cbd02337dac44b70d83a3ac6162d96b78b3029e669440654001e7605e3e83bba7ff5736f927652a4817e9066141f150a4eb87bbcb0194b12fa76f6e11358b1128285e48360d2da8fdf5faf57e47a5f0d07b6a11d990ceab426ba4a04078997a62396b40a5e59246388bbcd9f223575466314d904a11faed863391a10f65a3dca883613dc719cc96041655119f40e71a161ee0783fc9d63e4879a201900327f4e71b7722d57ba0ae17825dcca3ef99faad7b7b68c5f3ecf7a2e68904a8f5986d406274fd", 0xcc}, {&(0x7f0000000380)="5e49ae87a98e621c820d15987052081015e365122004e8b5339f4ad0b6012446d190bb66537773e6f8f8f61e4adf405a6d50013edf8ec8b454974c05c3df7c8d5fdd390b685d782ed110b58a60d3847016aacf23c5561a4431fd6559a277b0873d183d1a0ccecbb211251d2469c129c7346c8ef097f606e307f504aa5f5258", 0x7f}], 0x5, &(0x7f0000000c00)=ANY=[@ANYBLOB="14000000000000000000000001000000010000800000000011000000000000000000000001000000080000000000000088000000000000000000000007000000441054207fffffff00000001fffff604170ce4e205843903351e620301940400004418cc50000077a34e803dd26246000700002a60001500000000000000000006442c2653ac1414aa000000cd7f00000100000009ac1414250000001fe000000100000002ffffffff000000040001890f47ffffffffac1414aaf000000200001c00000000000000000000000800000094b556cc77abc6058646440b9ffac3779988d2dd3c1bab9a5e5c87c63216fd76b53c7ba1b081ce8adbbaf88299977270a319191aaae3f3a07eec9b292cd18f31f05918282a96c5883ccb5c5d0435713ea8532299c7cd7dfbe2d6f9fd41ca45fcc2ff69b4796d0d85677e092348c0021ccabcf4ed22e2a08ddc69", @ANYRES32=r11, @ANYBLOB="ffffffffac1414310000000020000000000000000000000007000000440cd3010a0101020000000900000000"], 0xf8}, 0x20000040) 672.921017ms ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x80000000, 0x9, 0x8, 0x3770, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000c00)={r1}, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18ffffffdd000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000c2000000b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00'}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x2d) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={0xffffffffffffffff, r2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r8, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x17, 0x0, 0x1f, 0x6}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r9, 0x0, 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES32=0x0], 0x0, 0x1a, 0x0, 0x1}, 0x20) 594.643009ms ago: executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x2d93, 0xa8b6, 0x401, 0x1000, r0, 0x800, '\x00', r1, r2, 0x3, 0x4, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES8=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r4, &(0x7f00000002c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x6, 0x4, 0x1, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="4584f3255a00190b65b8bd04822224b225fb22430ffad6abb36e577f76bd4cecd17068086f3d7cabb57d9badc43946c8ba145d4527737e7d875653e14a499ec1ab8de55b3d33d3ac7b4f30fb85606d56560fd7bcdd62ca401a94d39de6b328bdf9f952c6fad6b4548c3e04b15e8aa6f0e629649cf1247e22b842e9e013728772f1132c0a62adecff47eeab992f673b59dcf16e7045638c37c966291ee826f07f6387120717530ed0df07b3c16a7ce4fcafda3261b11c3215107af14ef4e4b21bc804b2da5b090f4310f17e5906f9a3b4cf63c76e6e6f2d71038f5bb217be0f779a407119798e0067cbe7ab7b03f63f25", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x7101}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000180)={'caif0\x00', 0x400}) write$cgroup_devices(r8, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0306003c5c9801288363"], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='rpcgss_bad_seqno\x00'}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x40, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000040)={r10, &(0x7f0000000280), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r10, &(0x7f0000000240)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000040)='ext4_da_release_space\x00', r9}, 0x10) 305.992223ms ago: executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'vlan0\x00', 0x800}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='ext4_remove_blocks\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='ext4_remove_blocks\x00', r0}, 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000080)=r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) 211.608058ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 148.224948ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{}, &(0x7f0000001180), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="180200000002000000000000000000008500000020000000181100", @ANYRES8=0x0], &(0x7f00000014c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001240)=ANY=[@ANYBLOB="9feb010018000000000000001000fa0f050000018000000000000000000000ef9b029800"/49], 0x0, 0x2d, 0x0, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xb9080}], 0x1}, 0x0) 54.157082ms ago: executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}) (fail_nth: 1) 50.329492ms ago: executing program 3: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001ec0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0185879, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000880)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r2 = openat$tun(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'nicvf0\x00', 0x400}) ioctl$TUNSETTXFILTER(r2, 0x401054d5, &(0x7f0000000380)=ANY=[@ANYBLOB="4504"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000200)='cpu.idle\x00', 0x2, 0x0) r4 = openat$tun(0xffffff9c, &(0x7f0000000180), 0x1, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x600, 0x0) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000400)=r0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000002280)={'pim6reg0\x00', 0x2102}) 0s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xfffff000, 0xe40, 0x0, &(0x7f0000000880)="61df712bc884fed5722780b686dd", 0x0, 0x8000, 0x0, 0xfffffffffffffeca, 0x0, &(0x7f0000000000), &(0x7f0000000800)="ffe200004e379b19393a41afde6b0b1235c1278ebf59a5d4d697bc199e060b675b46d4ff37c7f91ceaa6790cd8570f080b0d2375918cd7dfcf26aa90dc6a5617be488475b892958512c8e814c24d7efc26f9f2512dec8c759773c42a2fca2735984613809a78eb", 0x0, 0x2}, 0x28) sendmsg$inet(r0, &(0x7f0000000b00)={0x0, 0xf22fff7f, &(0x7f0000000180)=[{&(0x7f0000000080)="31de76fb398bc62d058b8a96924594f5476a0824be53f7a5949f80614c42391e4b80412938c955d34d37eb96ba7849c3eb823bb36724bd6f6d0219cfe5c884afcd2bdea5acf9c877c03dcdbbb3e47417b6707c27d4c5c1db1924071f6b6f23c7d199c799c9b0c41101e625fcdb7bbfd12a3eeeef4540a5698f058aaf6a141e5d333929b92a7f64e925bf0ef424c3ef29fcd5fd4721c547fde6abe4d47048b64511693624b0d786711abe4a66e250fcbfe95ac9037e58f331b26b6ed0d08e5c73ba4c49", 0xc00e}], 0x9, &(0x7f00000001c0)=[@ip_tos_int={{0x7ff4d4260000}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x2}}, @ip_retopts={{0x0, 0x0, 0x7, {[@lsrr, @generic={0x0, 0x0, "96"}, @generic={0x0, 0x0, "206a77bdd1a004129054e7704a"}]}}}], 0xf}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r2}, &(0x7f0000000700), &(0x7f0000000740)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000cc0)={&(0x7f0000000c80)='ext4_update_sb\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x19}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x41009432, &(0x7f00000005c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) kernel console output (not intermixed with test programs): x20 [ 60.211369][ T2216] kmem_cache_alloc+0x3b/0x2c0 [ 60.215973][ T2216] ext4_alloc_io_end_vec+0x2a/0x170 [ 60.221006][ T2216] ext4_writepages+0x13b4/0x3fd0 [ 60.225790][ T2216] ? __kasan_slab_free+0x11/0x20 [ 60.230552][ T2216] ? generic_write_end+0x202/0x300 [ 60.235590][ T2216] ? ksys_write+0x199/0x2c0 [ 60.240105][ T2216] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.246100][ T2216] ? ext4_read_folio+0x240/0x240 [ 60.251045][ T2216] ? jbd2_journal_stop+0x82c/0xc70 [ 60.257152][ T2216] ? ext4_read_folio+0x240/0x240 [ 60.262405][ T2216] do_writepages+0x385/0x620 [ 60.266840][ T2216] ? __writepage+0x130/0x130 [ 60.271259][ T2216] ? __kasan_check_write+0x14/0x20 [ 60.276202][ T2216] ? _raw_spin_lock+0xa4/0x1b0 [ 60.280811][ T2216] ? _raw_spin_unlock+0x4c/0x70 [ 60.285493][ T2216] filemap_fdatawrite_wbc+0x153/0x1b0 [ 60.290857][ T2216] file_write_and_wait_range+0x1ca/0x2b0 [ 60.296321][ T2216] ? __filemap_set_wb_err+0x130/0x130 [ 60.301533][ T2216] ? __bpf_trace_ext4_sync_file_enter+0x23/0x30 [ 60.307607][ T2216] ? __bpf_trace_ext4_free_blocks+0x40/0x40 [ 60.313332][ T2216] ? __traceiter_ext4_sync_file_enter+0xa7/0xc0 [ 60.319411][ T2216] ext4_sync_file+0x1a2/0xa50 [ 60.324183][ T2216] vfs_fsync_range+0x17b/0x190 [ 60.328783][ T2216] ext4_buffered_write_iter+0x587/0x640 [ 60.328899][ T2221] FAULT_INJECTION: forcing a failure. [ 60.328899][ T2221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.334161][ T2216] ext4_file_write_iter+0x194/0x1570 [ 60.334187][ T2216] ? cgroup_rstat_updated+0xe5/0x370 [ 60.357245][ T2216] ? __alloc_pages+0x3a1/0x780 [ 60.361853][ T2216] ? avc_policy_seqno+0x1b/0x70 [ 60.366537][ T2216] ? ext4_file_read_iter+0x470/0x470 [ 60.371655][ T2216] ? fsnotify_perm+0x6a/0x5d0 [ 60.376171][ T2216] vfs_write+0x902/0xeb0 [ 60.380250][ T2216] ? file_end_write+0x1c0/0x1c0 [ 60.385024][ T2216] ? mutex_lock+0xb1/0x1e0 [ 60.389272][ T2216] ? bit_wait_io_timeout+0x120/0x120 [ 60.394395][ T2216] ? __fdget_pos+0x2e2/0x390 [ 60.398818][ T2216] ? ksys_write+0x77/0x2c0 [ 60.403071][ T2216] ksys_write+0x199/0x2c0 [ 60.407240][ T2216] ? __ia32_sys_read+0x90/0x90 [ 60.411840][ T2216] ? debug_smp_processor_id+0x17/0x20 [ 60.417147][ T2216] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 60.423050][ T2216] __x64_sys_write+0x7b/0x90 [ 60.427476][ T2216] do_syscall_64+0x3d/0xb0 [ 60.431732][ T2216] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.437456][ T2216] RIP: 0033:0x7fc1a587d0a9 [ 60.441711][ T2216] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 60.461174][ T2216] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 60.469397][ T2216] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 60.477215][ T2216] RDX: 0000000000000012 RSI: 0000000020000680 RDI: 0000000000000009 [ 60.485105][ T2216] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 60.493011][ T2216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 60.500815][ T2216] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 60.508640][ T2216] [ 60.511714][ T2221] CPU: 0 PID: 2221 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 60.521595][ T2221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 60.531485][ T2221] Call Trace: [ 60.534608][ T2221] [ 60.537475][ T2221] dump_stack_lvl+0x151/0x1b7 [ 60.541989][ T2221] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 60.547309][ T2221] ? up_read+0x55/0x170 [ 60.551276][ T2221] dump_stack+0x15/0x1b [ 60.555274][ T2221] should_fail_ex+0x3d0/0x520 [ 60.559780][ T2221] should_fail+0xb/0x10 [ 60.563770][ T2221] should_fail_usercopy+0x1a/0x20 [ 60.568631][ T2221] copyin+0x1e/0x90 [ 60.572277][ T2221] _copy_from_iter+0x3c9/0xe00 [ 60.576892][ T2221] ? copyout_mc+0x80/0x80 [ 60.581052][ T2221] ? copyout_mc+0x80/0x80 [ 60.585212][ T2221] copy_page_from_iter+0x1d7/0x2b0 [ 60.590158][ T2221] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 60.595809][ T2221] unix_stream_sendmsg+0x78f/0x1070 [ 60.600837][ T2221] ? unix_stream_sendmsg+0x8b1/0x1070 [ 60.606045][ T2221] ? unix_show_fdinfo+0x2f0/0x2f0 [ 60.610913][ T2221] ? security_socket_sendmsg+0x82/0xb0 [ 60.616196][ T2221] ? unix_show_fdinfo+0x2f0/0x2f0 [ 60.621055][ T2221] ____sys_sendmsg+0x5d3/0x9a0 [ 60.625655][ T2221] ? __sys_sendmsg_sock+0x40/0x40 [ 60.630519][ T2221] __sys_sendmsg+0x2a9/0x390 [ 60.634942][ T2221] ? ____sys_sendmsg+0x9a0/0x9a0 [ 60.639717][ T2221] ? __kasan_check_write+0x14/0x20 [ 60.644663][ T2221] ? mutex_unlock+0xb2/0x260 [ 60.649091][ T2221] ? __kasan_check_write+0x14/0x20 [ 60.654040][ T2221] ? debug_smp_processor_id+0x17/0x20 [ 60.659243][ T2221] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 60.665148][ T2221] __x64_sys_sendmsg+0x7f/0x90 [ 60.669747][ T2221] do_syscall_64+0x3d/0xb0 [ 60.674001][ T2221] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 60.679728][ T2221] RIP: 0033:0x7f551047d0a9 [ 60.684393][ T2221] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 60.708617][ T2221] RSP: 002b:00007f551120f0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.717326][ T2221] RAX: ffffffffffffffda RBX: 00007f55105b3f80 RCX: 00007f551047d0a9 [ 60.726143][ T2221] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000008 [ 60.734256][ T2221] RBP: 00007f551120f120 R08: 0000000000000000 R09: 0000000000000000 [ 60.742269][ T2221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 60.750983][ T2221] R13: 000000000000000b R14: 00007f55105b3f80 R15: 00007ffe1ca9fc88 [ 60.759425][ T2221] [ 60.765071][ T28] audit: type=1400 audit(1719177259.934:132): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 60.789160][ T2223] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.791575][ T28] audit: type=1400 audit(1719177259.934:133): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 60.796254][ T2223] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.012438][ T2243] bpf_get_probe_write_proto: 5 callbacks suppressed [ 61.012454][ T2243] syz-executor.4[2243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.061028][ T2243] syz-executor.4[2243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.231965][ T2261] device pim6reg1 entered promiscuous mode [ 61.584628][ T2321] device pim6reg1 entered promiscuous mode [ 61.789148][ T2336] device pim6reg1 entered promiscuous mode [ 62.116144][ T2362] device syzkaller0 entered promiscuous mode [ 62.434129][ T2388] EXT4-fs warning (device sda1): ext4_group_extend:1869: can't shrink FS - resize aborted [ 62.496683][ T2388] device syzkaller0 entered promiscuous mode [ 63.065556][ T2423] device veth1_macvtap left promiscuous mode [ 63.258263][ T2436] FAULT_INJECTION: forcing a failure. [ 63.258263][ T2436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.280873][ T2436] CPU: 1 PID: 2436 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 63.290766][ T2436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 63.300792][ T2436] Call Trace: [ 63.303911][ T2436] [ 63.306688][ T2436] dump_stack_lvl+0x151/0x1b7 [ 63.311207][ T2436] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 63.316497][ T2436] ? should_fail_ex+0x36c/0x520 [ 63.321193][ T2436] dump_stack+0x15/0x1b [ 63.325183][ T2436] should_fail_ex+0x3d0/0x520 [ 63.329691][ T2436] should_fail+0xb/0x10 [ 63.333678][ T2436] should_fail_usercopy+0x1a/0x20 [ 63.338545][ T2436] strncpy_from_user+0x24/0x2b0 [ 63.343232][ T2436] bpf_prog_load+0x1fb/0x1bf0 [ 63.347746][ T2436] ? map_freeze+0x3a0/0x3a0 [ 63.352086][ T2436] ? selinux_bpf+0xcb/0x100 [ 63.356423][ T2436] ? security_bpf+0x82/0xb0 [ 63.360771][ T2436] __sys_bpf+0x52c/0x7f0 [ 63.364874][ T2436] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 63.370056][ T2436] ? __kasan_check_write+0x14/0x20 [ 63.374998][ T2436] __x64_sys_bpf+0x7c/0x90 [ 63.379248][ T2436] do_syscall_64+0x3d/0xb0 [ 63.383510][ T2436] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 63.389229][ T2436] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 63.394960][ T2436] RIP: 0033:0x7f855bc7d0a9 [ 63.399209][ T2436] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 63.418740][ T2436] RSP: 002b:00007f855c9d70c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 63.426986][ T2436] RAX: ffffffffffffffda RBX: 00007f855bdb3f80 RCX: 00007f855bc7d0a9 [ 63.434798][ T2436] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 63.442605][ T2436] RBP: 00007f855c9d7120 R08: 0000000000000000 R09: 0000000000000000 [ 63.450503][ T2436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 63.458318][ T2436] R13: 000000000000000b R14: 00007f855bdb3f80 R15: 00007ffe551d1098 [ 63.466135][ T2436] [ 63.752760][ T2451] FAULT_INJECTION: forcing a failure. [ 63.752760][ T2451] name failslab, interval 1, probability 0, space 0, times 0 [ 63.891436][ T2451] CPU: 1 PID: 2451 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 63.901332][ T2451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 63.911227][ T2451] Call Trace: [ 63.914346][ T2451] [ 63.917133][ T2451] dump_stack_lvl+0x151/0x1b7 [ 63.921642][ T2451] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 63.926940][ T2451] ? __file_remove_privs+0x453/0x640 [ 63.932058][ T2451] ? file_remove_privs+0x20/0x20 [ 63.936828][ T2451] dump_stack+0x15/0x1b [ 63.940825][ T2451] should_fail_ex+0x3d0/0x520 [ 63.945334][ T2451] ? jbd2__journal_start+0x150/0x720 [ 63.950454][ T2451] __should_failslab+0xaf/0xf0 [ 63.955053][ T2451] should_failslab+0x9/0x20 [ 63.959391][ T2451] kmem_cache_alloc+0x3b/0x2c0 [ 63.964114][ T2451] ? inode_dio_wait+0x2a9/0x340 [ 63.968805][ T2451] jbd2__journal_start+0x150/0x720 [ 63.973803][ T2451] ? file_modified+0x20/0x20 [ 63.978186][ T2451] __ext4_journal_start_sb+0x24d/0x4b0 [ 63.983470][ T2451] ext4_file_write_iter+0xef6/0x1570 [ 63.988603][ T2451] ? ext4_file_write_iter+0x761/0x1570 [ 63.993886][ T2451] ? ext4_file_read_iter+0x470/0x470 [ 63.999005][ T2451] ? fsnotify_perm+0x6a/0x5d0 [ 64.003725][ T2451] vfs_write+0x902/0xeb0 [ 64.007833][ T2451] ? file_end_write+0x1c0/0x1c0 [ 64.012479][ T2451] ? mutex_lock+0xb1/0x1e0 [ 64.016732][ T2451] ? bit_wait_io_timeout+0x120/0x120 [ 64.021856][ T2451] ? __fdget_pos+0x2e2/0x390 [ 64.026276][ T2451] ? ksys_write+0x77/0x2c0 [ 64.030531][ T2451] ksys_write+0x199/0x2c0 [ 64.034708][ T2451] ? __ia32_sys_read+0x90/0x90 [ 64.039298][ T2451] ? debug_smp_processor_id+0x17/0x20 [ 64.044505][ T2451] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 64.050409][ T2451] __x64_sys_write+0x7b/0x90 [ 64.054832][ T2451] do_syscall_64+0x3d/0xb0 [ 64.059086][ T2451] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 64.064832][ T2451] RIP: 0033:0x7f543ac7d0a9 [ 64.069077][ T2451] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 64.088511][ T2451] RSP: 002b:00007f543baac0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 64.096759][ T2451] RAX: ffffffffffffffda RBX: 00007f543adb3f80 RCX: 00007f543ac7d0a9 [ 64.104578][ T2451] RDX: 0000000000043400 RSI: 0000000020000200 RDI: 0000000000000009 [ 64.112386][ T2451] RBP: 00007f543baac120 R08: 0000000000000000 R09: 0000000000000000 [ 64.120190][ T2451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.128000][ T2451] R13: 000000000000000b R14: 00007f543adb3f80 R15: 00007ffe890ebe28 [ 64.135831][ T2451] [ 64.226525][ T2479] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 167772160 (only 8 groups) [ 64.427346][ T28] audit: type=1400 audit(1719177263.594:134): avc: denied { create } for pid=2503 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 64.583551][ T2517] FAULT_INJECTION: forcing a failure. [ 64.583551][ T2517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.655510][ T2517] CPU: 0 PID: 2517 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 64.665414][ T2517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 64.675303][ T2517] Call Trace: [ 64.678423][ T2517] [ 64.681200][ T2517] dump_stack_lvl+0x151/0x1b7 [ 64.685712][ T2517] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 64.691009][ T2517] dump_stack+0x15/0x1b [ 64.694997][ T2517] should_fail_ex+0x3d0/0x520 [ 64.699513][ T2517] should_fail+0xb/0x10 [ 64.703504][ T2517] should_fail_usercopy+0x1a/0x20 [ 64.708365][ T2517] copyin+0x1e/0x90 [ 64.712012][ T2517] _copy_from_iter+0x3c9/0xe00 [ 64.716629][ T2517] ? copyout_mc+0x80/0x80 [ 64.720779][ T2517] ? copyout_mc+0x80/0x80 [ 64.724944][ T2517] copy_page_from_iter+0x1d7/0x2b0 [ 64.729892][ T2517] skb_copy_datagram_from_iter+0x2f3/0x6d0 [ 64.735537][ T2517] unix_stream_sendmsg+0x78f/0x1070 [ 64.740568][ T2517] ? unix_stream_sendmsg+0x8b1/0x1070 [ 64.745785][ T2517] ? unix_show_fdinfo+0x2f0/0x2f0 [ 64.750745][ T2517] ? security_socket_sendmsg+0x82/0xb0 [ 64.756018][ T2517] ? unix_show_fdinfo+0x2f0/0x2f0 [ 64.760880][ T2517] ____sys_sendmsg+0x5d3/0x9a0 [ 64.765485][ T2517] ? __sys_sendmsg_sock+0x40/0x40 [ 64.770338][ T2517] __sys_sendmsg+0x2a9/0x390 [ 64.774806][ T2517] ? ____sys_sendmsg+0x9a0/0x9a0 [ 64.779766][ T2517] ? __kasan_check_write+0x14/0x20 [ 64.784719][ T2517] ? mutex_unlock+0xb2/0x260 [ 64.789140][ T2517] ? __kasan_check_write+0x14/0x20 [ 64.794082][ T2517] ? debug_smp_processor_id+0x17/0x20 [ 64.799288][ T2517] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 64.805187][ T2517] __x64_sys_sendmsg+0x7f/0x90 [ 64.809898][ T2517] do_syscall_64+0x3d/0xb0 [ 64.814128][ T2517] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 64.820652][ T2517] RIP: 0033:0x7f20ebc7d0a9 [ 64.825596][ T2517] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 64.847092][ T2517] RSP: 002b:00007f20ec9980c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 64.855288][ T2517] RAX: ffffffffffffffda RBX: 00007f20ebdb3f80 RCX: 00007f20ebc7d0a9 [ 64.863100][ T2517] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 0000000000000006 [ 64.870912][ T2517] RBP: 00007f20ec998120 R08: 0000000000000000 R09: 0000000000000000 [ 64.878724][ T2517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.886533][ T2517] R13: 000000000000000b R14: 00007f20ebdb3f80 R15: 00007ffc4eb0e2c8 [ 64.894354][ T2517] [ 65.129309][ T2544] syz-executor.4[2544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.129378][ T2544] syz-executor.4[2544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.824298][ T2556] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.844511][ T2556] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.853178][ T2556] device bridge_slave_0 entered promiscuous mode [ 65.883682][ T2556] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.905767][ T2556] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.923436][ T2556] device bridge_slave_1 entered promiscuous mode [ 65.945722][ T28] audit: type=1400 audit(1719177265.114:135): avc: denied { create } for pid=2581 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 66.151512][ T943] device bridge_slave_1 left promiscuous mode [ 66.168310][ T2600] syz-executor.4[2600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.168378][ T2600] syz-executor.4[2600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.180311][ T943] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.221808][ T943] device bridge_slave_0 left promiscuous mode [ 66.243396][ T943] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.672149][ T2616] FAULT_INJECTION: forcing a failure. [ 66.672149][ T2616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 66.678910][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.689684][ T2616] CPU: 1 PID: 2616 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 66.699224][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.706388][ T2616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 66.706400][ T2616] Call Trace: [ 66.706405][ T2616] [ 66.706411][ T2616] dump_stack_lvl+0x151/0x1b7 [ 66.723709][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.726437][ T2616] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 66.729466][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.733730][ T2616] ? __alloc_pages+0x780/0x780 [ 66.733749][ T2616] dump_stack+0x15/0x1b [ 66.763417][ T2616] should_fail_ex+0x3d0/0x520 [ 66.767933][ T2616] should_fail_alloc_page+0x68/0x90 [ 66.773044][ T2616] __alloc_pages+0x1f4/0x780 [ 66.777473][ T2616] ? prep_new_page+0x110/0x110 [ 66.782068][ T2616] ? _raw_spin_trylock_bh+0x190/0x190 [ 66.787279][ T2616] __get_free_pages+0xe/0x30 [ 66.791704][ T2616] kasan_populate_vmalloc_pte+0x39/0x130 [ 66.797172][ T2616] ? __apply_to_page_range+0x8ca/0xbe0 [ 66.802466][ T2616] __apply_to_page_range+0x8dd/0xbe0 [ 66.807589][ T2616] ? kasan_populate_vmalloc+0x70/0x70 [ 66.812796][ T2616] ? kasan_populate_vmalloc+0x70/0x70 [ 66.818099][ T2616] apply_to_page_range+0x3b/0x50 [ 66.822956][ T2616] kasan_populate_vmalloc+0x65/0x70 [ 66.827986][ T2616] alloc_vmap_area+0x1961/0x1aa0 [ 66.832761][ T2616] ? vm_map_ram+0x940/0x940 [ 66.837095][ T2616] ? __kasan_kmalloc+0x9c/0xb0 [ 66.841697][ T2616] ? kmalloc_node_trace+0x3d/0xb0 [ 66.846558][ T2616] __get_vm_area_node+0x171/0x370 [ 66.851419][ T2616] __vmalloc_node_range+0x36e/0x1540 [ 66.856550][ T2616] ? __htab_map_lookup_and_delete_batch+0x514/0x2220 [ 66.863061][ T2616] ? __set_page_owner+0x53/0x70 [ 66.867737][ T2616] ? prep_new_page+0x1b/0x110 [ 66.872253][ T2616] ? vmap+0x2b0/0x2b0 [ 66.876067][ T2616] ? __kmalloc_large_node+0x10d/0x1b0 [ 66.881276][ T2616] ? __kmalloc_node+0x12d/0x1e0 [ 66.885960][ T2616] kvmalloc_node+0x140/0x640 [ 66.890388][ T2616] ? __htab_map_lookup_and_delete_batch+0x514/0x2220 [ 66.896904][ T2616] ? vm_mmap+0xb0/0xb0 [ 66.900805][ T2616] ? avc_has_perm_noaudit+0x348/0x430 [ 66.906012][ T2616] __htab_map_lookup_and_delete_batch+0x514/0x2220 [ 66.912349][ T2616] ? avc_denied+0x1b0/0x1b0 [ 66.916684][ T2616] ? __this_cpu_preempt_check+0x13/0x20 [ 66.922072][ T2616] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 66.927795][ T2616] ? lookup_nulls_elem_raw+0x170/0x170 [ 66.933090][ T2616] ? __fget_files+0x2cb/0x330 [ 66.937606][ T2616] htab_map_lookup_and_delete_batch+0x30/0x40 [ 66.943506][ T2616] ? htab_map_lookup_and_delete_elem+0x40/0x40 [ 66.949581][ T2616] bpf_map_do_batch+0x4cc/0x630 [ 66.954271][ T2616] __sys_bpf+0x66b/0x7f0 [ 66.958345][ T2616] ? __this_cpu_preempt_check+0x13/0x20 [ 66.963730][ T2616] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 66.968940][ T2616] ? __kasan_check_write+0x14/0x20 [ 66.973890][ T2616] ? fpregs_restore_userregs+0x130/0x290 [ 66.979352][ T2616] __x64_sys_bpf+0x7c/0x90 [ 66.983604][ T2616] do_syscall_64+0x3d/0xb0 [ 66.987857][ T2616] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.993584][ T2616] RIP: 0033:0x7f543ac7d0a9 [ 66.997839][ T2616] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 67.017373][ T2616] RSP: 002b:00007f543baac0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.026786][ T2616] RAX: ffffffffffffffda RBX: 00007f543adb3f80 RCX: 00007f543ac7d0a9 [ 67.037037][ T2616] RDX: 0000000000000038 RSI: 0000000020000080 RDI: 0000000000000019 [ 67.046594][ T2616] RBP: 00007f543baac120 R08: 0000000000000000 R09: 0000000000000000 [ 67.056003][ T2616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 67.065900][ T2616] R13: 000000000000000b R14: 00007f543adb3f80 R15: 00007ffe890ebe28 [ 67.074703][ T2616] [ 67.095059][ T2532] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.102038][ T2532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.109598][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.118702][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.126778][ T2532] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.134038][ T2532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.142251][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.150524][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.158645][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.171577][ T2532] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.180312][ T2538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.231176][ T2628] device vxcan1 entered promiscuous mode [ 67.343974][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.380114][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.410297][ T2556] device veth0_vlan entered promiscuous mode [ 67.422661][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.432802][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.454141][ T2556] device veth1_macvtap entered promiscuous mode [ 67.472094][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.490089][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.549686][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.576899][ T2649] device syzkaller0 entered promiscuous mode [ 67.587709][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.610087][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.620595][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.630548][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.645624][ T28] audit: type=1400 audit(1719177266.824:136): avc: denied { mounton } for pid=2556 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 67.697552][ T2653] bridge0: port 3(veth1_macvtap) entered blocking state [ 67.704413][ T2653] bridge0: port 3(veth1_macvtap) entered disabled state [ 67.735221][ T2657] syz-executor.0[2657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.735290][ T2657] syz-executor.0[2657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.811584][ T2657] syz-executor.0[2657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.862545][ T2657] syz-executor.0[2657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.097368][ T28] audit: type=1400 audit(1719177267.264:137): avc: denied { create } for pid=2682 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 68.897555][ T2735] syz-executor.4[2735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.897627][ T2735] syz-executor.4[2735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.189459][ T2758] bond_slave_1: mtu less than device minimum [ 69.440878][ T28] audit: type=1400 audit(1719177268.604:138): avc: denied { create } for pid=2771 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 69.594928][ T2790] EXT4-fs warning (device sda1): verify_group_input:151: Cannot add at group 0 (only 8 groups) [ 69.948263][ T2823] EXT4-fs warning (device sda1): ext4_group_extend:1877: need to use ext2online to resize further [ 70.315913][ T2845] device veth0_vlan left promiscuous mode [ 70.360130][ T2845] device veth0_vlan entered promiscuous mode [ 70.638108][ T2860] device syzkaller0 entered promiscuous mode [ 70.890146][ T2887] FAULT_INJECTION: forcing a failure. [ 70.890146][ T2887] name failslab, interval 1, probability 0, space 0, times 0 [ 70.902896][ T2887] CPU: 1 PID: 2887 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 70.912712][ T2887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 70.922607][ T2887] Call Trace: [ 70.925728][ T2887] [ 70.928513][ T2887] dump_stack_lvl+0x151/0x1b7 [ 70.933021][ T2887] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 70.938315][ T2887] ? memset+0x35/0x40 [ 70.942131][ T2887] ? __es_remove_extent+0x310/0x1f60 [ 70.947255][ T2887] dump_stack+0x15/0x1b [ 70.951245][ T2887] should_fail_ex+0x3d0/0x520 [ 70.955760][ T2887] ? __es_insert_extent+0x72a/0x17c0 [ 70.960882][ T2887] __should_failslab+0xaf/0xf0 [ 70.965483][ T2887] should_failslab+0x9/0x20 [ 70.969819][ T2887] kmem_cache_alloc+0x3b/0x2c0 [ 70.974428][ T2887] __es_insert_extent+0x72a/0x17c0 [ 70.979368][ T2887] ? _raw_write_lock+0xa4/0x170 [ 70.984054][ T2887] ? _raw_write_trylock+0x1a0/0x1a0 [ 70.989091][ T2887] ext4_es_insert_extent+0x5a2/0x2ff0 [ 70.994301][ T2887] ? ext4_es_scan_clu+0x340/0x340 [ 70.999158][ T2887] ? _raw_read_unlock+0x25/0x40 [ 71.003842][ T2887] ? ext4_es_find_extent_range+0xde/0x320 [ 71.009396][ T2887] ? trace_ext4_ext_convert_to_initialized_fastpath+0x160/0x160 [ 71.016867][ T2887] ext4_ext_map_blocks+0x23dd/0x71e0 [ 71.021988][ T2887] ? kasan_save_alloc_info+0x1f/0x30 [ 71.027104][ T2887] ? slab_post_alloc_hook+0x53/0x2c0 [ 71.032224][ T2887] ? kmem_cache_alloc+0x175/0x2c0 [ 71.037089][ T2887] ? alloc_buffer_head+0x26/0x110 [ 71.041952][ T2887] ? alloc_page_buffers+0x1dc/0x3f0 [ 71.046987][ T2887] ? ext4_block_write_begin+0x243/0x1200 [ 71.052450][ T2887] ? ext4_da_write_begin+0x51f/0x920 [ 71.057580][ T2887] ? generic_perform_write+0x2f9/0x5c0 [ 71.062866][ T2887] ? ext4_buffered_write_iter+0x360/0x640 [ 71.068421][ T2887] ? ext4_file_write_iter+0x194/0x1570 [ 71.073711][ T2887] ? vfs_write+0x902/0xeb0 [ 71.077966][ T2887] ? ksys_write+0x199/0x2c0 [ 71.082307][ T2887] ? ext4_ext_release+0x10/0x10 [ 71.086991][ T2887] ? down_read+0xbc4/0x14c0 [ 71.091333][ T2887] ? __down_common+0x690/0x690 [ 71.095934][ T2887] ? _raw_read_unlock+0x25/0x40 [ 71.100646][ T2887] ? ext4_es_lookup_extent+0x33b/0x950 [ 71.105913][ T2887] ext4_da_get_block_prep+0x795/0x13e0 [ 71.111208][ T2887] ? folio_add_lru+0x280/0x3f0 [ 71.115810][ T2887] ? ext4_da_release_space+0x480/0x480 [ 71.121099][ T2887] ? _raw_spin_lock+0xa4/0x1b0 [ 71.125705][ T2887] ? _raw_spin_unlock+0x4c/0x70 [ 71.130388][ T2887] ext4_block_write_begin+0x55e/0x1200 [ 71.135685][ T2887] ? ext4_da_release_space+0x480/0x480 [ 71.140980][ T2887] ? ext4_print_free_blocks+0x360/0x360 [ 71.146365][ T2887] ? folio_wait_stable+0x70/0x90 [ 71.151147][ T2887] ext4_da_write_begin+0x51f/0x920 [ 71.156085][ T2887] ? ext4_dirty_folio+0xf0/0xf0 [ 71.160767][ T2887] ? current_time+0x1af/0x2f0 [ 71.165282][ T2887] generic_perform_write+0x2f9/0x5c0 [ 71.171276][ T2887] ? generic_file_direct_write+0x6b0/0x6b0 [ 71.177420][ T2887] ? generic_write_checks_count+0x490/0x490 [ 71.183202][ T2887] ? kstrtouint+0xf6/0x180 [ 71.187702][ T2887] ext4_buffered_write_iter+0x360/0x640 [ 71.193437][ T2887] ext4_file_write_iter+0x194/0x1570 [ 71.198754][ T2887] ? cgroup_rstat_updated+0xe5/0x370 [ 71.204020][ T2887] ? __alloc_pages+0x3a1/0x780 [ 71.209572][ T2887] ? avc_policy_seqno+0x1b/0x70 [ 71.214697][ T2887] ? ext4_file_read_iter+0x470/0x470 [ 71.220311][ T2887] ? fsnotify_perm+0x6a/0x5d0 [ 71.225558][ T2887] vfs_write+0x902/0xeb0 [ 71.229847][ T2887] ? file_end_write+0x1c0/0x1c0 [ 71.234944][ T2887] ? mutex_lock+0xb1/0x1e0 [ 71.239580][ T2887] ? bit_wait_io_timeout+0x120/0x120 [ 71.244960][ T2887] ? __fdget_pos+0x2e2/0x390 [ 71.249508][ T2887] ? ksys_write+0x77/0x2c0 [ 71.253951][ T2887] ksys_write+0x199/0x2c0 [ 71.258956][ T2887] ? __ia32_sys_read+0x90/0x90 [ 71.263534][ T2887] ? debug_smp_processor_id+0x17/0x20 [ 71.268744][ T2887] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 71.274643][ T2887] __x64_sys_write+0x7b/0x90 [ 71.279072][ T2887] do_syscall_64+0x3d/0xb0 [ 71.283321][ T2887] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 71.289051][ T2887] RIP: 0033:0x7f543ac7d0a9 [ 71.293303][ T2887] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 71.312747][ T2887] RSP: 002b:00007f543baac0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 71.320988][ T2887] RAX: ffffffffffffffda RBX: 00007f543adb3f80 RCX: 00007f543ac7d0a9 [ 71.328798][ T2887] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000007 [ 71.336611][ T2887] RBP: 00007f543baac120 R08: 0000000000000000 R09: 0000000000000000 [ 71.344422][ T2887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.352234][ T2887] R13: 000000000000000b R14: 00007f543adb3f80 R15: 00007ffe890ebe28 [ 71.360050][ T2887] [ 71.560044][ T2897] device veth0_vlan left promiscuous mode [ 71.579521][ T2897] device veth0_vlan entered promiscuous mode [ 71.596007][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.609760][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.621134][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.641072][ T2902] FAULT_INJECTION: forcing a failure. [ 71.641072][ T2902] name failslab, interval 1, probability 0, space 0, times 0 [ 71.655830][ T2902] CPU: 0 PID: 2902 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 71.665729][ T2902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 71.675619][ T2902] Call Trace: [ 71.678742][ T2902] [ 71.681522][ T2902] dump_stack_lvl+0x151/0x1b7 [ 71.686035][ T2902] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 71.691326][ T2902] ? truncate_inode_pages_range+0xf0e/0x1020 [ 71.697143][ T2902] ? copy_from_kernel_nofault+0x29c/0x2d0 [ 71.702696][ T2902] dump_stack+0x15/0x1b [ 71.706696][ T2902] should_fail_ex+0x3d0/0x520 [ 71.711205][ T2902] ? jbd2__journal_start+0x150/0x720 [ 71.716326][ T2902] __should_failslab+0xaf/0xf0 [ 71.720924][ T2902] should_failslab+0x9/0x20 [ 71.725264][ T2902] kmem_cache_alloc+0x3b/0x2c0 [ 71.729866][ T2902] jbd2__journal_start+0x150/0x720 [ 71.734926][ T2902] __ext4_journal_start_sb+0x24d/0x4b0 [ 71.741157][ T2902] ext4_evict_inode+0x9c5/0x1550 [ 71.747007][ T2902] ? _raw_spin_unlock+0x4c/0x70 [ 71.752126][ T2902] ? ext4_inode_is_fast_symlink+0x3d0/0x3d0 [ 71.758413][ T2902] ? __kasan_check_write+0x14/0x20 [ 71.763354][ T2902] ? _raw_spin_lock+0xa4/0x1b0 [ 71.768048][ T2902] ? _raw_spin_trylock_bh+0x190/0x190 [ 71.774315][ T2902] ? ext4_inode_is_fast_symlink+0x3d0/0x3d0 [ 71.780336][ T2902] evict+0x2a3/0x630 [ 71.784236][ T2902] iput+0x642/0x870 [ 71.787879][ T2902] do_unlinkat+0x4e1/0x920 [ 71.792130][ T2902] ? getname_flags+0xba/0x520 [ 71.796656][ T2902] ? fsnotify_link_count+0x100/0x100 [ 71.801766][ T2902] ? getname_flags+0x1fd/0x520 [ 71.806366][ T2902] __x64_sys_unlink+0x49/0x50 [ 71.810878][ T2902] do_syscall_64+0x3d/0xb0 [ 71.815130][ T2902] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 71.820947][ T2902] RIP: 0033:0x7fc1a587d0a9 [ 71.825204][ T2902] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 71.845074][ T2902] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 71.853322][ T2902] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 71.861219][ T2902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 71.869028][ T2902] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 71.876929][ T2902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 71.884835][ T2902] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 71.892931][ T2902] [ 71.898360][ T2902] EXT4-fs error (device sda1) in ext4_evict_inode:254: Out of memory [ 72.155201][ T2943] device veth0_vlan left promiscuous mode [ 72.164131][ T2943] device veth0_vlan entered promiscuous mode [ 72.751249][ T2988] syz-executor.3[2988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.751318][ T2988] syz-executor.3[2988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.115880][ T2993] device syzkaller0 entered promiscuous mode [ 73.594609][ T3029] FAULT_INJECTION: forcing a failure. [ 73.594609][ T3029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.643917][ T3029] CPU: 0 PID: 3029 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 73.653821][ T3029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 73.663816][ T3029] Call Trace: [ 73.666931][ T3029] [ 73.669709][ T3029] dump_stack_lvl+0x151/0x1b7 [ 73.674224][ T3029] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 73.679600][ T3029] ? migrate_enable+0x1cb/0x2b0 [ 73.684287][ T3029] dump_stack+0x15/0x1b [ 73.688278][ T3029] should_fail_ex+0x3d0/0x520 [ 73.692879][ T3029] should_fail+0xb/0x10 [ 73.696872][ T3029] should_fail_usercopy+0x1a/0x20 [ 73.701818][ T3029] _copy_from_user+0x1e/0xc0 [ 73.706244][ T3029] generic_map_update_batch+0x4d9/0x8c0 [ 73.711628][ T3029] ? generic_map_delete_batch+0x5c0/0x5c0 [ 73.717184][ T3029] ? generic_map_delete_batch+0x5c0/0x5c0 [ 73.722736][ T3029] bpf_map_do_batch+0x4cc/0x630 [ 73.727431][ T3029] __sys_bpf+0x66b/0x7f0 [ 73.731502][ T3029] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 73.736798][ T3029] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 73.742441][ T3029] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 73.748430][ T3029] __x64_sys_bpf+0x7c/0x90 [ 73.752682][ T3029] do_syscall_64+0x3d/0xb0 [ 73.756931][ T3029] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 73.762661][ T3029] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 73.768398][ T3029] RIP: 0033:0x7fc1a587d0a9 [ 73.772749][ T3029] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 73.792185][ T3029] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.800429][ T3029] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 73.808246][ T3029] RDX: 0000000000000038 RSI: 0000000020000200 RDI: 000000000000001a [ 73.816141][ T3029] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 73.823947][ T3029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 73.831759][ T3029] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 73.839578][ T3029] [ 74.038773][ T3066] FAULT_INJECTION: forcing a failure. [ 74.038773][ T3066] name failslab, interval 1, probability 0, space 0, times 0 [ 74.051628][ T3066] CPU: 0 PID: 3066 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 74.061508][ T3066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 74.071577][ T3066] Call Trace: [ 74.075511][ T3066] [ 74.079029][ T3066] dump_stack_lvl+0x151/0x1b7 [ 74.084472][ T3066] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 74.090096][ T3066] ? selinux_kernfs_init_security+0x14a/0x720 [ 74.096176][ T3066] ? idr_alloc_cyclic+0x369/0x5d0 [ 74.101597][ T3066] dump_stack+0x15/0x1b [ 74.106231][ T3066] should_fail_ex+0x3d0/0x520 [ 74.111800][ T3066] ? __kernfs_new_node+0xdb/0x700 [ 74.116757][ T3066] __should_failslab+0xaf/0xf0 [ 74.121354][ T3066] should_failslab+0x9/0x20 [ 74.126132][ T3066] kmem_cache_alloc+0x3b/0x2c0 [ 74.131016][ T3066] __kernfs_new_node+0xdb/0x700 [ 74.136211][ T3066] ? kernfs_new_node+0x230/0x230 [ 74.142826][ T3066] ? rwsem_write_trylock+0x15b/0x290 [ 74.148266][ T3066] ? make_kgid+0x1f2/0x6f0 [ 74.152752][ T3066] ? from_kuid_munged+0x7b0/0x7b0 [ 74.158388][ T3066] ? kernfs_activate+0x1e6/0x200 [ 74.163960][ T3066] kernfs_new_node+0x130/0x230 [ 74.168991][ T3066] __kernfs_create_file+0x4a/0x270 [ 74.174207][ T3066] sysfs_add_file_mode_ns+0x1c8/0x270 [ 74.179902][ T3066] internal_create_group+0x545/0xed0 [ 74.186112][ T3066] ? sysfs_create_group+0x30/0x30 [ 74.190965][ T3066] ? up_write+0x79/0x1f0 [ 74.195047][ T3066] ? kernfs_activate+0x1e6/0x200 [ 74.200008][ T3066] sysfs_create_groups+0x5b/0x130 [ 74.205474][ T3066] device_add_attrs+0x195/0x5f0 [ 74.211311][ T3066] ? kernfs_put+0x4e5/0x520 [ 74.216864][ T3066] ? get_device_parent+0x410/0x410 [ 74.221959][ T3066] ? sysfs_do_create_link_sd+0xe2/0x110 [ 74.227356][ T3066] device_add+0x5f7/0xf10 [ 74.231506][ T3066] netdev_register_kobject+0x177/0x320 [ 74.236797][ T3066] ? raw_notifier_call_chain+0xdf/0xf0 [ 74.242179][ T3066] register_netdevice+0xe43/0x1490 [ 74.247130][ T3066] ? netif_stacked_transfer_operstate+0x240/0x240 [ 74.253558][ T3066] ? tun_net_initialize+0x15c/0x460 [ 74.258698][ T3066] ? tun_setup+0x2b0/0x2b0 [ 74.263039][ T3066] ? alloc_netdev_mqs+0xbf2/0xf90 [ 74.268078][ T3066] tun_set_iff+0x836/0xee0 [ 74.272321][ T3066] __tun_chr_ioctl+0x80e/0x22d0 [ 74.277505][ T3066] ? tun_flow_create+0x320/0x320 [ 74.282952][ T3066] ? __fget_files+0x2cb/0x330 [ 74.287461][ T3066] tun_chr_ioctl+0x2a/0x40 [ 74.292253][ T3066] ? tun_chr_poll+0x670/0x670 [ 74.296762][ T3066] __se_sys_ioctl+0x114/0x190 [ 74.301274][ T3066] __x64_sys_ioctl+0x7b/0x90 [ 74.305711][ T3066] do_syscall_64+0x3d/0xb0 [ 74.309960][ T3066] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 74.315768][ T3066] RIP: 0033:0x7f551047d0a9 [ 74.320021][ T3066] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 74.339636][ T3066] RSP: 002b:00007f551120f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 74.347881][ T3066] RAX: ffffffffffffffda RBX: 00007f55105b3f80 RCX: 00007f551047d0a9 [ 74.355697][ T3066] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000008 [ 74.363505][ T3066] RBP: 00007f551120f120 R08: 0000000000000000 R09: 0000000000000000 [ 74.371315][ T3066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 74.379127][ T3066] R13: 000000000000000b R14: 00007f55105b3f80 R15: 00007ffe1ca9fc88 [ 74.386945][ T3066] [ 74.840330][ T3093] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 74.915289][ T3109] FAULT_INJECTION: forcing a failure. [ 74.915289][ T3109] name failslab, interval 1, probability 0, space 0, times 0 [ 74.930591][ T3109] CPU: 0 PID: 3109 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 74.941052][ T3109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 74.950947][ T3109] Call Trace: [ 74.954071][ T3109] [ 74.956837][ T3109] dump_stack_lvl+0x151/0x1b7 [ 74.961359][ T3109] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 74.966652][ T3109] ? selinux_kernfs_init_security+0x14a/0x720 [ 74.972552][ T3109] ? idr_alloc_cyclic+0x369/0x5d0 [ 74.977412][ T3109] dump_stack+0x15/0x1b [ 74.981401][ T3109] should_fail_ex+0x3d0/0x520 [ 74.985919][ T3109] ? __kernfs_new_node+0xdb/0x700 [ 74.990774][ T3109] __should_failslab+0xaf/0xf0 [ 74.995378][ T3109] should_failslab+0x9/0x20 [ 74.999716][ T3109] kmem_cache_alloc+0x3b/0x2c0 [ 75.004316][ T3109] __kernfs_new_node+0xdb/0x700 [ 75.009006][ T3109] ? kernfs_new_node+0x230/0x230 [ 75.013782][ T3109] ? rwsem_write_trylock+0x15b/0x290 [ 75.018900][ T3109] ? up_write+0x79/0x1f0 [ 75.023063][ T3109] ? kernfs_activate+0x1e6/0x200 [ 75.027839][ T3109] kernfs_new_node+0x130/0x230 [ 75.032438][ T3109] __kernfs_create_file+0x4a/0x270 [ 75.037385][ T3109] sysfs_add_file_mode_ns+0x1c8/0x270 [ 75.042595][ T3109] internal_create_group+0x545/0xed0 [ 75.047720][ T3109] ? sysfs_create_group+0x30/0x30 [ 75.052573][ T3109] ? up_write+0x79/0x1f0 [ 75.056652][ T3109] ? kernfs_activate+0x1e6/0x200 [ 75.061431][ T3109] sysfs_create_groups+0x5b/0x130 [ 75.066287][ T3109] device_add_attrs+0xe1/0x5f0 [ 75.070887][ T3109] ? kernfs_put+0x4e5/0x520 [ 75.075233][ T3109] ? get_device_parent+0x410/0x410 [ 75.080177][ T3109] ? sysfs_do_create_link_sd+0xe2/0x110 [ 75.085558][ T3109] device_add+0x5f7/0xf10 [ 75.089724][ T3109] netdev_register_kobject+0x177/0x320 [ 75.095015][ T3109] ? raw_notifier_call_chain+0xdf/0xf0 [ 75.100310][ T3109] register_netdevice+0xe43/0x1490 [ 75.105263][ T3109] ? netif_stacked_transfer_operstate+0x240/0x240 [ 75.111681][ T3109] ? tun_net_initialize+0x15c/0x460 [ 75.116713][ T3109] ? tun_setup+0x2b0/0x2b0 [ 75.120966][ T3109] ? alloc_netdev_mqs+0xbf2/0xf90 [ 75.125829][ T3109] tun_set_iff+0x836/0xee0 [ 75.130083][ T3109] __tun_chr_ioctl+0x80e/0x22d0 [ 75.134770][ T3109] ? tun_flow_create+0x320/0x320 [ 75.139544][ T3109] ? __fget_files+0x2cb/0x330 [ 75.144054][ T3109] tun_chr_ioctl+0x2a/0x40 [ 75.148304][ T3109] ? tun_chr_poll+0x670/0x670 [ 75.152823][ T3109] __se_sys_ioctl+0x114/0x190 [ 75.157332][ T3109] __x64_sys_ioctl+0x7b/0x90 [ 75.161760][ T3109] do_syscall_64+0x3d/0xb0 [ 75.166013][ T3109] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 75.171831][ T3109] RIP: 0033:0x7fc3d867d0a9 [ 75.176081][ T3109] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 75.195524][ T3109] RSP: 002b:00007fc3d93c30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 75.203770][ T3109] RAX: ffffffffffffffda RBX: 00007fc3d87b3f80 RCX: 00007fc3d867d0a9 [ 75.211664][ T3109] RDX: 0000000020000280 RSI: 00000000400454ca RDI: 0000000000000006 [ 75.219478][ T3109] RBP: 00007fc3d93c3120 R08: 0000000000000000 R09: 0000000000000000 [ 75.227296][ T3109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.235102][ T3109] R13: 000000000000000b R14: 00007fc3d87b3f80 R15: 00007ffd96644618 [ 75.242919][ T3109] [ 75.284108][ T3133] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 75.793220][ T3170] device sit0 entered promiscuous mode [ 76.111646][ T3188] FAULT_INJECTION: forcing a failure. [ 76.111646][ T3188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.149151][ T3188] CPU: 1 PID: 3188 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 76.159053][ T3188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 76.169161][ T3188] Call Trace: [ 76.172277][ T3188] [ 76.175055][ T3188] dump_stack_lvl+0x151/0x1b7 [ 76.179577][ T3188] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 76.184865][ T3188] ? irqentry_exit_to_user_mode+0x9/0x20 [ 76.190331][ T3188] ? exc_general_protection+0x32d/0x4c0 [ 76.195719][ T3188] ? asm_exc_general_protection+0x27/0x30 [ 76.201278][ T3188] dump_stack+0x15/0x1b [ 76.205439][ T3188] should_fail_ex+0x3d0/0x520 [ 76.209948][ T3188] should_fail+0xb/0x10 [ 76.213948][ T3188] should_fail_usercopy+0x1a/0x20 [ 76.219499][ T3188] copy_fpstate_to_sigframe+0x92a/0xba0 [ 76.225597][ T3188] ? copy_fpstate_to_sigframe+0x1b8/0xba0 [ 76.231123][ T3188] ? fpregs_set+0x7a0/0x7a0 [ 76.235464][ T3188] ? get_signal+0xafe/0x1820 [ 76.239887][ T3188] ? ____kasan_slab_free+0x13c/0x180 [ 76.245100][ T3188] ? __kasan_slab_free+0x11/0x20 [ 76.249955][ T3188] ? get_signal+0x1274/0x1820 [ 76.254475][ T3188] ? fpu__alloc_mathframe+0xc3/0x150 [ 76.259596][ T3188] get_sigframe+0x378/0x4b0 [ 76.263934][ T3188] ? restore_sigcontext+0x700/0x700 [ 76.268968][ T3188] ? ptrace_notify+0x350/0x350 [ 76.273571][ T3188] arch_do_signal_or_restart+0x2ac/0x16f0 [ 76.279142][ T3188] ? __send_signal_locked+0xc1a/0xc30 [ 76.284331][ T3188] ? send_signal_locked+0x43a/0x590 [ 76.289541][ T3188] ? get_sigframe_size+0x10/0x10 [ 76.294314][ T3188] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 76.300495][ T3188] ? force_sig_info_to_task+0x31c/0x440 [ 76.306254][ T3188] ? force_sig+0x114/0x1d0 [ 76.311174][ T3188] ? send_sig+0x60/0x60 [ 76.315196][ T3188] exit_to_user_mode_loop+0x74/0xa0 [ 76.320228][ T3188] exit_to_user_mode_prepare+0x5a/0xa0 [ 76.325523][ T3188] irqentry_exit_to_user_mode+0x9/0x20 [ 76.330818][ T3188] irqentry_exit+0x12/0x40 [ 76.335241][ T3188] exc_general_protection+0x32d/0x4c0 [ 76.341031][ T3188] ? debug_smp_processor_id+0x17/0x20 [ 76.346860][ T3188] ? syscall_exit_to_user_mode+0x34/0x140 [ 76.353085][ T3188] asm_exc_general_protection+0x27/0x30 [ 76.359724][ T3188] RIP: 0033:0x7f551046ef39 [ 76.364337][ T3188] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 76.384986][ T3188] RSP: 002b:00007f551120e858 EFLAGS: 00010283 [ 76.391965][ T3188] RAX: 0000000000000999 RBX: 00007f551120edc0 RCX: 00007f551057dbc0 [ 76.400418][ T3188] RDX: 9999999999999999 RSI: 00007f55104d93aa RDI: 9999999999999999 [ 76.408571][ T3188] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 76.416472][ T3188] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 76.424283][ T3188] R13: 00007f551120ef40 R14: 9999999999999999 R15: 0000000000000000 [ 76.432112][ T3188] [ 77.051376][ T28] audit: type=1400 audit(1719177276.224:139): avc: denied { create } for pid=3224 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 77.820639][ T28] audit: type=1400 audit(1719177276.994:140): avc: denied { create } for pid=3266 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 77.869860][ T3188] syz-executor.3 (3188) used greatest stack depth: 21008 bytes left [ 78.462186][ T28] audit: type=1400 audit(1719177277.634:141): avc: denied { write } for pid=3323 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 78.685760][ T3336] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 79.034599][ T28] audit: type=1400 audit(1719177278.204:142): avc: denied { read } for pid=3366 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.232373][ T28] audit: type=1400 audit(1719177278.404:143): avc: denied { setopt } for pid=3388 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.579514][ T3422] FAULT_INJECTION: forcing a failure. [ 79.579514][ T3422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.725235][ T3422] CPU: 0 PID: 3422 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 79.735148][ T3422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 79.745033][ T3422] Call Trace: [ 79.748158][ T3422] [ 79.750933][ T3422] dump_stack_lvl+0x151/0x1b7 [ 79.755447][ T3422] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 79.760745][ T3422] dump_stack+0x15/0x1b [ 79.764736][ T3422] should_fail_ex+0x3d0/0x520 [ 79.769249][ T3422] should_fail+0xb/0x10 [ 79.773242][ T3422] should_fail_usercopy+0x1a/0x20 [ 79.778101][ T3422] _copy_from_iter+0x18d/0xe00 [ 79.782710][ T3422] ? copyout_mc+0x80/0x80 [ 79.787260][ T3422] ? __check_object_size+0x48e/0x650 [ 79.793053][ T3422] kernfs_fop_write_iter+0x1a0/0x410 [ 79.798615][ T3422] vfs_write+0x902/0xeb0 [ 79.802804][ T3422] ? file_end_write+0x1c0/0x1c0 [ 79.807668][ T3422] ? mutex_lock+0xb1/0x1e0 [ 79.812015][ T3422] ? bit_wait_io_timeout+0x120/0x120 [ 79.818014][ T3422] ? __fdget_pos+0x2e2/0x390 [ 79.822610][ T3422] ? ksys_write+0x77/0x2c0 [ 79.826860][ T3422] ksys_write+0x199/0x2c0 [ 79.831022][ T3422] ? __ia32_sys_read+0x90/0x90 [ 79.835619][ T3422] ? debug_smp_processor_id+0x17/0x20 [ 79.840829][ T3422] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 79.846732][ T3422] __x64_sys_write+0x7b/0x90 [ 79.851246][ T3422] do_syscall_64+0x3d/0xb0 [ 79.855496][ T3422] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 79.861226][ T3422] RIP: 0033:0x7f551047d0a9 [ 79.865479][ T3422] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 79.885257][ T3422] RSP: 002b:00007f551120f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 79.893655][ T3422] RAX: ffffffffffffffda RBX: 00007f55105b3f80 RCX: 00007f551047d0a9 [ 79.901450][ T3422] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000007 [ 79.909261][ T3422] RBP: 00007f551120f120 R08: 0000000000000000 R09: 0000000000000000 [ 79.917072][ T3422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.924886][ T3422] R13: 000000000000000b R14: 00007f55105b3f80 R15: 00007ffe1ca9fc88 [ 79.932705][ T3422] [ 79.963245][ T3432] bridge0: port 3(team_slave_1) entered blocking state [ 79.970124][ T3432] bridge0: port 3(team_slave_1) entered disabled state [ 79.993681][ T3432] device team_slave_1 entered promiscuous mode [ 80.125250][ T3448] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 80.159439][ T3453] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 80.358383][ T3461] bond_slave_1: mtu less than device minimum [ 80.372675][ T3469] FAULT_INJECTION: forcing a failure. [ 80.372675][ T3469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 80.422768][ T3469] CPU: 1 PID: 3469 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 80.432667][ T3469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 80.442562][ T3469] Call Trace: [ 80.445703][ T3469] [ 80.448462][ T3469] dump_stack_lvl+0x151/0x1b7 [ 80.452977][ T3469] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 80.458271][ T3469] ? avc_has_perm_noaudit+0x348/0x430 [ 80.463478][ T3469] dump_stack+0x15/0x1b [ 80.467468][ T3469] should_fail_ex+0x3d0/0x520 [ 80.471984][ T3469] should_fail+0xb/0x10 [ 80.475977][ T3469] should_fail_usercopy+0x1a/0x20 [ 80.480837][ T3469] strncpy_from_user+0x24/0x2b0 [ 80.485523][ T3469] bpf_prog_load+0x1fb/0x1bf0 [ 80.490609][ T3469] ? map_freeze+0x3a0/0x3a0 [ 80.495883][ T3469] ? selinux_bpf+0xcb/0x100 [ 80.500949][ T3469] ? security_bpf+0x82/0xb0 [ 80.505331][ T3469] __sys_bpf+0x52c/0x7f0 [ 80.509407][ T3469] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 80.515788][ T3469] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 80.521952][ T3469] __x64_sys_bpf+0x7c/0x90 [ 80.526305][ T3469] do_syscall_64+0x3d/0xb0 [ 80.530543][ T3469] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 80.536193][ T3469] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 80.541913][ T3469] RIP: 0033:0x7fc3d867d0a9 [ 80.546172][ T3469] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 80.565611][ T3469] RSP: 002b:00007fc3d93c30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 80.574813][ T3469] RAX: ffffffffffffffda RBX: 00007fc3d87b3f80 RCX: 00007fc3d867d0a9 [ 80.586115][ T3469] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 80.595322][ T3469] RBP: 00007fc3d93c3120 R08: 0000000000000000 R09: 0000000000000000 [ 80.603915][ T3469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.612399][ T3469] R13: 000000000000000b R14: 00007fc3d87b3f80 R15: 00007ffd96644618 [ 80.620213][ T3469] [ 80.996833][ T3494] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 81.111534][ T3507] device sit0 left promiscuous mode [ 81.563332][ T3530] device syzkaller0 entered promiscuous mode [ 82.163157][ T3553] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 83.036412][ T3608] FAULT_INJECTION: forcing a failure. [ 83.036412][ T3608] name failslab, interval 1, probability 0, space 0, times 0 [ 83.055842][ T3608] CPU: 1 PID: 3608 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 83.065745][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 83.075640][ T3608] Call Trace: [ 83.078763][ T3608] [ 83.081542][ T3608] dump_stack_lvl+0x151/0x1b7 [ 83.086062][ T3608] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 83.091347][ T3608] ? xas_start+0x333/0x3f0 [ 83.095599][ T3608] dump_stack+0x15/0x1b [ 83.099592][ T3608] should_fail_ex+0x3d0/0x520 [ 83.104106][ T3608] ? jbd2__journal_start+0x150/0x720 [ 83.109233][ T3608] __should_failslab+0xaf/0xf0 [ 83.113827][ T3608] should_failslab+0x9/0x20 [ 83.118166][ T3608] kmem_cache_alloc+0x3b/0x2c0 [ 83.122764][ T3608] ? _raw_spin_trylock_bh+0x190/0x190 [ 83.127983][ T3608] jbd2__journal_start+0x150/0x720 [ 83.132921][ T3608] __ext4_journal_start_sb+0x24d/0x4b0 [ 83.138218][ T3608] ext4_dirty_inode+0x8f/0x100 [ 83.142814][ T3608] ? __ext4_expand_extra_isize+0x420/0x420 [ 83.148465][ T3608] __mark_inode_dirty+0x200/0xa60 [ 83.153327][ T3608] ? folio_unlock+0x5c/0x70 [ 83.157660][ T3608] generic_write_end+0x202/0x300 [ 83.162434][ T3608] ext4_da_write_end+0x707/0x9a0 [ 83.167206][ T3608] ? ext4_da_write_begin+0x920/0x920 [ 83.172413][ T3608] generic_perform_write+0x3e6/0x5c0 [ 83.177539][ T3608] ? generic_file_direct_write+0x6b0/0x6b0 [ 83.183173][ T3608] ? generic_write_checks_count+0x490/0x490 [ 83.188988][ T3608] ? kstrtouint+0xf6/0x180 [ 83.193343][ T3608] ext4_buffered_write_iter+0x360/0x640 [ 83.198723][ T3608] ext4_file_write_iter+0x194/0x1570 [ 83.203833][ T3608] ? cgroup_rstat_updated+0xe5/0x370 [ 83.208966][ T3608] ? __alloc_pages+0x3a1/0x780 [ 83.213555][ T3608] ? avc_policy_seqno+0x1b/0x70 [ 83.218240][ T3608] ? ext4_file_read_iter+0x470/0x470 [ 83.223362][ T3608] ? fsnotify_perm+0x6a/0x5d0 [ 83.227876][ T3608] vfs_write+0x902/0xeb0 [ 83.231958][ T3608] ? file_end_write+0x1c0/0x1c0 [ 83.236640][ T3608] ? mutex_lock+0xb1/0x1e0 [ 83.240896][ T3608] ? bit_wait_io_timeout+0x120/0x120 [ 83.246017][ T3608] ? __fdget_pos+0x2e2/0x390 [ 83.250448][ T3608] ? ksys_write+0x77/0x2c0 [ 83.254703][ T3608] ksys_write+0x199/0x2c0 [ 83.258869][ T3608] ? __ia32_sys_read+0x90/0x90 [ 83.263460][ T3608] ? debug_smp_processor_id+0x17/0x20 [ 83.268666][ T3608] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 83.274574][ T3608] __x64_sys_write+0x7b/0x90 [ 83.278996][ T3608] do_syscall_64+0x3d/0xb0 [ 83.283247][ T3608] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 83.288975][ T3608] RIP: 0033:0x7fc3d867d0a9 [ 83.293228][ T3608] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 83.312671][ T3608] RSP: 002b:00007fc3d93c30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 83.320912][ T3608] RAX: ffffffffffffffda RBX: 00007fc3d87b3f80 RCX: 00007fc3d867d0a9 [ 83.328725][ T3608] RDX: 0000000000000012 RSI: 0000000020000980 RDI: 0000000000000004 [ 83.336535][ T3608] RBP: 00007fc3d93c3120 R08: 0000000000000000 R09: 0000000000000000 [ 83.344347][ T3608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.352158][ T3608] R13: 000000000000000b R14: 00007fc3d87b3f80 R15: 00007ffd96644618 [ 83.359988][ T3608] [ 83.488473][ T3622] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 83.917122][ T3651] device syzkaller0 entered promiscuous mode [ 84.500296][ T3681] syz-executor.4[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.500365][ T3681] syz-executor.4[3681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.221144][ T28] audit: type=1400 audit(1719177284.394:144): avc: denied { create } for pid=3705 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 85.294275][ T28] audit: type=1400 audit(1719177284.464:145): avc: denied { create } for pid=3715 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 85.314374][ T3724] device bridge0 entered promiscuous mode [ 86.824802][ T3781] device syzkaller0 entered promiscuous mode [ 87.352702][ T3801] device pim6reg1 entered promiscuous mode [ 87.552537][ T3832] syz-executor.1[3832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.552602][ T3832] syz-executor.1[3832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.578066][ T3833] syz-executor.1[3833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.590227][ T3833] syz-executor.1[3833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.840454][ T3866] device pim6reg1 entered promiscuous mode [ 87.870148][ T3866] FAULT_INJECTION: forcing a failure. [ 87.870148][ T3866] name failslab, interval 1, probability 0, space 0, times 0 [ 87.882625][ T3866] CPU: 0 PID: 3866 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 87.892458][ T3866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 87.902359][ T3866] Call Trace: [ 87.905477][ T3866] [ 87.908348][ T3866] dump_stack_lvl+0x151/0x1b7 [ 87.912854][ T3866] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 87.918149][ T3866] ? ip6_route_info_create+0xa56/0x14c0 [ 87.923529][ T3866] ? ip6_route_add+0x27/0x130 [ 87.928042][ T3866] ? addrconf_add_dev+0x419/0x5f0 [ 87.932990][ T3866] ? addrconf_notify+0x976/0xe10 [ 87.937779][ T3866] dump_stack+0x15/0x1b [ 87.941754][ T3866] should_fail_ex+0x3d0/0x520 [ 87.946271][ T3866] ? __alloc_skb+0xcc/0x2d0 [ 87.950612][ T3866] __should_failslab+0xaf/0xf0 [ 87.955221][ T3866] should_failslab+0x9/0x20 [ 87.959551][ T3866] kmem_cache_alloc_node+0x3e/0x2d0 [ 87.964585][ T3866] __alloc_skb+0xcc/0x2d0 [ 87.968755][ T3866] inet6_rt_notify+0x2db/0x560 [ 87.973353][ T3866] ? rt6_nh_dump_exceptions+0x650/0x650 [ 87.978735][ T3866] fib6_add+0x23ac/0x3df0 [ 87.982899][ T3866] ? skb_gro_incr_csum_unnecessary+0x330/0x330 [ 87.988885][ T3866] ? ipv6_addr_prefix+0x42/0x180 [ 87.993659][ T3866] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 87.999129][ T3866] ? __kasan_check_write+0x14/0x20 [ 88.004257][ T3866] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 88.009109][ T3866] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 88.014145][ T3866] ip6_route_add+0x8a/0x130 [ 88.018483][ T3866] addrconf_add_dev+0x419/0x5f0 [ 88.023169][ T3866] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 88.028379][ T3866] ? __kasan_check_read+0x11/0x20 [ 88.033241][ T3866] addrconf_init_auto_addrs+0xadc/0x1050 [ 88.038702][ T3866] ? addrconf_dad_run+0x610/0x610 [ 88.043563][ T3866] ? __local_bh_enable_ip+0x58/0x80 [ 88.048598][ T3866] ? _raw_write_unlock_bh+0x32/0x50 [ 88.053631][ T3866] ? addrconf_permanent_addr+0xb40/0xba0 [ 88.059101][ T3866] ? __kasan_check_write+0x14/0x20 [ 88.064047][ T3866] ? addrconf_notify+0xe10/0xe10 [ 88.068821][ T3866] ? igmpv3_del_delrec+0x740/0x740 [ 88.073774][ T3866] ? __local_bh_enable_ip+0x58/0x80 [ 88.078808][ T3866] ? __kasan_check_write+0x14/0x20 [ 88.083747][ T3866] ? mutex_unlock+0xb2/0x260 [ 88.088176][ T3866] ? tun_device_event+0x3ef/0xf80 [ 88.093037][ T3866] ? __mutex_lock_slowpath+0x10/0x10 [ 88.098156][ T3866] ? macsec_notify+0x101/0x4c0 [ 88.102844][ T3866] ? addrconf_link_ready+0xfb/0x1e0 [ 88.107878][ T3866] addrconf_notify+0x976/0xe10 [ 88.112479][ T3866] raw_notifier_call_chain+0x8c/0xf0 [ 88.117598][ T3866] __dev_notify_flags+0x304/0x610 [ 88.122458][ T3866] ? __dev_change_flags+0x6e0/0x6e0 [ 88.127490][ T3866] ? __dev_change_flags+0x569/0x6e0 [ 88.132526][ T3866] ? dev_get_flags+0x1e0/0x1e0 [ 88.137132][ T3866] ? kstrtouint+0xf6/0x180 [ 88.141382][ T3866] dev_change_flags+0xf0/0x1a0 [ 88.145982][ T3866] dev_ifsioc+0x177/0x1150 [ 88.150234][ T3866] ? dev_ioctl+0xe60/0xe60 [ 88.154484][ T3866] ? __kasan_check_write+0x14/0x20 [ 88.159433][ T3866] ? mutex_lock+0xb1/0x1e0 [ 88.163687][ T3866] ? bit_wait_io_timeout+0x120/0x120 [ 88.168821][ T3866] dev_ioctl+0x543/0xe60 [ 88.172889][ T3866] sock_do_ioctl+0x26b/0x450 [ 88.177313][ T3866] ? has_cap_mac_admin+0x3c0/0x3c0 [ 88.182262][ T3866] ? sock_show_fdinfo+0xa0/0xa0 [ 88.186949][ T3866] ? selinux_file_ioctl+0x3cc/0x540 [ 88.191982][ T3866] sock_ioctl+0x455/0x740 [ 88.196149][ T3866] ? sock_poll+0x400/0x400 [ 88.201551][ T3866] ? __fget_files+0x2cb/0x330 [ 88.207146][ T3866] ? security_file_ioctl+0x84/0xb0 [ 88.213080][ T3866] ? sock_poll+0x400/0x400 [ 88.217500][ T3866] __se_sys_ioctl+0x114/0x190 [ 88.222186][ T3866] __x64_sys_ioctl+0x7b/0x90 [ 88.226706][ T3866] do_syscall_64+0x3d/0xb0 [ 88.230958][ T3866] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 88.236684][ T3866] RIP: 0033:0x7fc1a587d0a9 [ 88.240950][ T3866] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 88.260378][ T3866] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 88.268628][ T3866] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 88.276434][ T3866] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 000000000000000a [ 88.284247][ T3866] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 88.292068][ T3866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 88.299869][ T3866] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 88.307684][ T3866] [ 88.637945][ T3887] syz-executor.3[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.638017][ T3887] syz-executor.3[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.985233][ T3903] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 89.229772][ T3899] syz-executor.3 (3899) used greatest stack depth: 20696 bytes left [ 89.344238][ T3911] EXT4-fs warning (device sda1): __ext4_ioctl:1246: Setting inode version is not supported with metadata_csum enabled. [ 89.560691][ T3934] FAULT_INJECTION: forcing a failure. [ 89.560691][ T3934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 89.582593][ T3934] CPU: 1 PID: 3934 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 89.592492][ T3934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 89.602473][ T3934] Call Trace: [ 89.605595][ T3934] [ 89.608372][ T3934] dump_stack_lvl+0x151/0x1b7 [ 89.612896][ T3934] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 89.618181][ T3934] dump_stack+0x15/0x1b [ 89.622480][ T3934] should_fail_ex+0x3d0/0x520 [ 89.626978][ T3934] should_fail_alloc_page+0x68/0x90 [ 89.631975][ T3934] __alloc_pages+0x1f4/0x780 [ 89.636491][ T3934] ? prep_new_page+0x110/0x110 [ 89.641092][ T3934] ? _raw_spin_trylock_bh+0x190/0x190 [ 89.646300][ T3934] __get_free_pages+0xe/0x30 [ 89.650723][ T3934] kasan_populate_vmalloc_pte+0x39/0x130 [ 89.656199][ T3934] ? __apply_to_page_range+0x8ca/0xbe0 [ 89.661495][ T3934] __apply_to_page_range+0x8dd/0xbe0 [ 89.666608][ T3934] ? kasan_populate_vmalloc+0x70/0x70 [ 89.671818][ T3934] ? kasan_populate_vmalloc+0x70/0x70 [ 89.677027][ T3934] apply_to_page_range+0x3b/0x50 [ 89.681796][ T3934] kasan_populate_vmalloc+0x65/0x70 [ 89.686828][ T3934] alloc_vmap_area+0x1961/0x1aa0 [ 89.692021][ T3934] ? vm_map_ram+0x940/0x940 [ 89.696803][ T3934] ? __kasan_kmalloc+0x9c/0xb0 [ 89.702234][ T3934] ? kmalloc_node_trace+0x3d/0xb0 [ 89.708571][ T3934] __get_vm_area_node+0x171/0x370 [ 89.714640][ T3934] ? do_syscall_64+0x3d/0xb0 [ 89.719819][ T3934] __vmalloc_node_range+0x36e/0x1540 [ 89.726091][ T3934] ? htab_map_alloc+0x396/0x17b0 [ 89.730819][ T3934] ? vmap+0x2b0/0x2b0 [ 89.734633][ T3934] ? kasan_save_alloc_info+0x1f/0x30 [ 89.740888][ T3934] ? bpf_map_area_alloc+0x4f/0xf0 [ 89.746165][ T3934] ? __kmalloc_node+0xb4/0x1e0 [ 89.750757][ T3934] bpf_map_area_alloc+0xdc/0xf0 [ 89.755532][ T3934] ? htab_map_alloc+0x396/0x17b0 [ 89.760305][ T3934] htab_map_alloc+0x396/0x17b0 [ 89.765071][ T3934] map_create+0x44a/0xcf0 [ 89.769319][ T3934] __sys_bpf+0x2e6/0x7f0 [ 89.773402][ T3934] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 89.778611][ T3934] __x64_sys_bpf+0x7c/0x90 [ 89.782856][ T3934] do_syscall_64+0x3d/0xb0 [ 89.787106][ T3934] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 89.792752][ T3934] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 89.798483][ T3934] RIP: 0033:0x7fc3d867d0a9 [ 89.802730][ T3934] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 89.822174][ T3934] RSP: 002b:00007fc3d93c30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.830416][ T3934] RAX: ffffffffffffffda RBX: 00007fc3d87b3f80 RCX: 00007fc3d867d0a9 [ 89.838233][ T3934] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 89.846042][ T3934] RBP: 00007fc3d93c3120 R08: 0000000000000000 R09: 0000000000000000 [ 89.853856][ T3934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.861756][ T3934] R13: 000000000000000b R14: 00007fc3d87b3f80 R15: 00007ffd96644618 [ 89.869568][ T3934] [ 90.463313][ T3984] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 91.313571][ T4005] syz-executor.0[4005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.313645][ T4005] syz-executor.0[4005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.341213][ T4003] bond_slave_1: mtu less than device minimum [ 91.772193][ T4041] device sit0 entered promiscuous mode [ 92.247861][ T4069] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 92.794507][ T4085] device sit0 entered promiscuous mode [ 94.710589][ T4169] device wg2 left promiscuous mode [ 94.790249][ T4170] device wg2 entered promiscuous mode [ 94.837616][ T943] device bridge_slave_1 left promiscuous mode [ 94.873954][ T943] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.915909][ T943] device bridge_slave_0 left promiscuous mode [ 94.963174][ T943] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.005351][ T943] device veth1_macvtap left promiscuous mode [ 95.077365][ T943] device veth0_vlan left promiscuous mode [ 95.458638][ T28] audit: type=1400 audit(1719177294.634:146): avc: denied { create } for pid=4187 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 95.495361][ T4165] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.502352][ T4165] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.509739][ T4165] device bridge_slave_0 entered promiscuous mode [ 95.512004][ T4194] syz-executor.4[4194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.515924][ T4194] syz-executor.4[4194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.516720][ T4165] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.546068][ T4165] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.554004][ T4165] device bridge_slave_1 entered promiscuous mode [ 95.572244][ T4194] syz-executor.4[4194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.572311][ T4194] syz-executor.4[4194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.591694][ T4193] syz-executor.4[4193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.603436][ T4193] syz-executor.4[4193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.616295][ T4196] device wg2 entered promiscuous mode [ 95.635016][ T4193] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 95.702730][ T4165] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.709615][ T4165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.716681][ T4165] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.723504][ T4165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.884589][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 95.892730][ T335] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.925522][ T335] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.988694][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.996716][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.003595][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.013636][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.021944][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.028834][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.079629][ T4225] FAULT_INJECTION: forcing a failure. [ 96.079629][ T4225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.118697][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.153219][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 96.162010][ T4225] CPU: 1 PID: 4225 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 96.171897][ T4225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 96.181886][ T4225] Call Trace: [ 96.185000][ T4225] [ 96.187780][ T4225] dump_stack_lvl+0x151/0x1b7 [ 96.192292][ T4225] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 96.197586][ T4225] ? vfs_write+0xbb3/0xeb0 [ 96.201840][ T4225] dump_stack+0x15/0x1b [ 96.205832][ T4225] should_fail_ex+0x3d0/0x520 [ 96.210355][ T4225] should_fail+0xb/0x10 [ 96.214457][ T4225] should_fail_usercopy+0x1a/0x20 [ 96.219723][ T4225] _copy_from_user+0x1e/0xc0 [ 96.224882][ T4225] __sys_bpf+0x23b/0x7f0 [ 96.229626][ T4225] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 96.234948][ T4225] ? debug_smp_processor_id+0x17/0x20 [ 96.240148][ T4225] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 96.246051][ T4225] __x64_sys_bpf+0x7c/0x90 [ 96.250389][ T4225] do_syscall_64+0x3d/0xb0 [ 96.254641][ T4225] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 96.260892][ T4225] RIP: 0033:0x7fc1a587d0a9 [ 96.265145][ T4225] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 96.284588][ T4225] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 96.292834][ T4225] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 96.300646][ T4225] RDX: 0000000000000090 RSI: 0000000020001540 RDI: 0000000000000005 [ 96.308465][ T4225] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 96.316265][ T4225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.324079][ T4225] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 96.331896][ T4225] [ 96.373324][ T4165] device veth0_vlan entered promiscuous mode [ 96.448068][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 96.456413][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.484226][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.497590][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.510801][ T4165] device veth1_macvtap entered promiscuous mode [ 96.527659][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 96.535668][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 96.570357][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 96.629190][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 96.658591][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 96.666824][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 96.675480][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 96.828256][ T4254] Â: renamed from pim6reg1 [ 97.677755][ T4287] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 97.825147][ T4293] device sit0 entered promiscuous mode [ 98.230744][ T4307] device vlan1 entered promiscuous mode [ 98.248567][ T4299] FAULT_INJECTION: forcing a failure. [ 98.248567][ T4299] name failslab, interval 1, probability 0, space 0, times 0 [ 98.261818][ T4299] CPU: 0 PID: 4299 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 98.271920][ T4299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 98.281956][ T4299] Call Trace: [ 98.285079][ T4299] [ 98.287859][ T4299] dump_stack_lvl+0x151/0x1b7 [ 98.292379][ T4299] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 98.297662][ T4299] ? jbd2_journal_start_reserved+0x410/0x410 [ 98.303482][ T4299] dump_stack+0x15/0x1b [ 98.307471][ T4299] should_fail_ex+0x3d0/0x520 [ 98.312027][ T4299] ? ext4_mb_new_blocks+0x5b2/0x48f0 [ 98.317213][ T4299] __should_failslab+0xaf/0xf0 [ 98.321811][ T4299] should_failslab+0x9/0x20 [ 98.326145][ T4299] kmem_cache_alloc+0x3b/0x2c0 [ 98.330746][ T4299] ext4_mb_new_blocks+0x5b2/0x48f0 [ 98.335693][ T4299] ? irqentry_exit+0x30/0x40 [ 98.340124][ T4299] ? irqentry_exit+0x30/0x40 [ 98.344631][ T4299] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 98.350276][ T4299] ? ext4_mb_pa_callback+0xd0/0xd0 [ 98.355228][ T4299] ext4_ext_map_blocks+0x19ca/0x71e0 [ 98.360377][ T4299] ? ext4_map_blocks+0x35b/0x1ca0 [ 98.365202][ T4299] ? ext4_ext_release+0x10/0x10 [ 98.369890][ T4299] ? down_read+0xbc4/0x14c0 [ 98.374230][ T4299] ? __down_common+0x690/0x690 [ 98.378831][ T4299] ? _raw_read_unlock+0x25/0x40 [ 98.383516][ T4299] ext4_map_blocks+0xa36/0x1ca0 [ 98.388205][ T4299] ? ext4_issue_zeroout+0x250/0x250 [ 98.393311][ T4299] ? __ext4_journal_start_sb+0x251/0x4b0 [ 98.398706][ T4299] ext4_iomap_begin+0x824/0xd10 [ 98.403396][ T4299] ? ext4_alloc_da_blocks+0x1a0/0x1a0 [ 98.408600][ T4299] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 98.414590][ T4299] iomap_iter+0x5c1/0xbf0 [ 98.418755][ T4299] ? ext4_alloc_da_blocks+0x1a0/0x1a0 [ 98.423962][ T4299] __iomap_dio_rw+0xddc/0x20a0 [ 98.428567][ T4299] ? iomap_dio_complete_work+0x70/0x70 [ 98.433945][ T4299] ? jbd2_journal_stop+0x82c/0xc70 [ 98.438890][ T4299] ? jbd2_journal_start_reserved+0x410/0x410 [ 98.444707][ T4299] ? ext4_fc_replay_link_internal+0x340/0x340 [ 98.450611][ T4299] iomap_dio_rw+0x41/0x90 [ 98.454773][ T4299] ext4_file_write_iter+0x11a5/0x1570 [ 98.459996][ T4299] ? ext4_file_write_iter+0x761/0x1570 [ 98.465278][ T4299] ? ext4_file_read_iter+0x470/0x470 [ 98.470410][ T4299] ? fsnotify_perm+0x6a/0x5d0 [ 98.474912][ T4299] vfs_write+0x902/0xeb0 [ 98.478998][ T4299] ? file_end_write+0x1c0/0x1c0 [ 98.483676][ T4299] ? mutex_lock+0xb1/0x1e0 [ 98.487937][ T4299] ? bit_wait_io_timeout+0x120/0x120 [ 98.493080][ T4299] ? __fdget_pos+0x2e2/0x390 [ 98.497477][ T4299] ? ksys_write+0x77/0x2c0 [ 98.501729][ T4299] ksys_write+0x199/0x2c0 [ 98.505896][ T4299] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 98.511547][ T4299] ? __ia32_sys_read+0x90/0x90 [ 98.516140][ T4299] __x64_sys_write+0x7b/0x90 [ 98.520569][ T4299] do_syscall_64+0x3d/0xb0 [ 98.524823][ T4299] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 98.530461][ T4299] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 98.536256][ T4299] RIP: 0033:0x7f20ebc7d0a9 [ 98.540439][ T4299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 98.559883][ T4299] RSP: 002b:00007f20ec9980c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.568131][ T4299] RAX: ffffffffffffffda RBX: 00007f20ebdb3f80 RCX: 00007f20ebc7d0a9 [ 98.575938][ T4299] RDX: 0000000000400000 RSI: 0000000020000000 RDI: 0000000000000009 [ 98.583752][ T4299] RBP: 00007f20ec998120 R08: 0000000000000000 R09: 0000000000000000 [ 98.591561][ T4299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.599375][ T4299] R13: 000000000000000b R14: 00007f20ebdb3f80 R15: 00007ffc4eb0e2c8 [ 98.607190][ T4299] [ 98.715272][ T4318] tun0: tun_chr_ioctl cmd 1074025678 [ 98.788808][ T4318] tun0: group set to 0 [ 98.951616][ T4330] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 100.555120][ T4393] FAULT_INJECTION: forcing a failure. [ 100.555120][ T4393] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.571599][ T4392] FAULT_INJECTION: forcing a failure. [ 100.571599][ T4392] name failslab, interval 1, probability 0, space 0, times 0 [ 100.579751][ T4393] CPU: 1 PID: 4393 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 100.593909][ T4393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 100.603801][ T4393] Call Trace: [ 100.606924][ T4393] [ 100.609704][ T4393] dump_stack_lvl+0x151/0x1b7 [ 100.614219][ T4393] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 100.619512][ T4393] dump_stack+0x15/0x1b [ 100.623502][ T4393] should_fail_ex+0x3d0/0x520 [ 100.628111][ T4393] should_fail_alloc_page+0x68/0x90 [ 100.633145][ T4393] __alloc_pages+0x1f4/0x780 [ 100.637880][ T4393] ? prep_new_page+0x110/0x110 [ 100.642471][ T4393] ? xas_start+0x32c/0x3f0 [ 100.646726][ T4393] ? xas_load+0x39d/0x3b0 [ 100.650891][ T4393] __folio_alloc+0x15/0x40 [ 100.655143][ T4393] __filemap_get_folio+0x827/0xae0 [ 100.660090][ T4393] ? page_cache_prev_miss+0x410/0x410 [ 100.665299][ T4393] ? asm_exc_page_fault+0x27/0x30 [ 100.670163][ T4393] pagecache_get_page+0x2f/0x110 [ 100.674936][ T4393] grab_cache_page_write_begin+0x42/0x60 [ 100.680403][ T4393] ext4_da_write_begin+0x4f3/0x920 [ 100.685357][ T4393] ? ext4_dirty_folio+0xf0/0xf0 [ 100.690042][ T4393] generic_perform_write+0x2f9/0x5c0 [ 100.695175][ T4393] ? generic_file_direct_write+0x6b0/0x6b0 [ 100.700795][ T4393] ? generic_write_checks_count+0x490/0x490 [ 100.706521][ T4393] ? kstrtouint+0xf6/0x180 [ 100.710778][ T4393] ext4_buffered_write_iter+0x360/0x640 [ 100.716160][ T4393] ext4_file_write_iter+0x194/0x1570 [ 100.721382][ T4393] ? cgroup_rstat_updated+0xe5/0x370 [ 100.726503][ T4393] ? __alloc_pages+0x3a1/0x780 [ 100.731112][ T4393] ? avc_policy_seqno+0x1b/0x70 [ 100.735793][ T4393] ? ext4_file_read_iter+0x470/0x470 [ 100.740909][ T4393] ? fsnotify_perm+0x6a/0x5d0 [ 100.745426][ T4393] vfs_write+0x902/0xeb0 [ 100.749509][ T4393] ? file_end_write+0x1c0/0x1c0 [ 100.754188][ T4393] ? mutex_lock+0xb1/0x1e0 [ 100.758445][ T4393] ? bit_wait_io_timeout+0x120/0x120 [ 100.763566][ T4393] ? __fdget_pos+0x2e2/0x390 [ 100.767996][ T4393] ? ksys_write+0x77/0x2c0 [ 100.772243][ T4393] ksys_write+0x199/0x2c0 [ 100.776413][ T4393] ? __ia32_sys_read+0x90/0x90 [ 100.781007][ T4393] ? debug_smp_processor_id+0x17/0x20 [ 100.786225][ T4393] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 100.792120][ T4393] __x64_sys_write+0x7b/0x90 [ 100.796542][ T4393] do_syscall_64+0x3d/0xb0 [ 100.800796][ T4393] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 100.806526][ T4393] RIP: 0033:0x7fc1a587d0a9 [ 100.810778][ T4393] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 100.831015][ T4393] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 100.839432][ T4393] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 100.847241][ T4393] RDX: 000000000000ffe6 RSI: 0000000020000040 RDI: 0000000000000005 [ 100.855054][ T4393] RBP: 00007fc1a658e120 R08: 0000000000000000 R09: 0000000000000000 [ 100.862867][ T4393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.870684][ T4393] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 100.878494][ T4393] [ 100.883435][ T4392] CPU: 1 PID: 4392 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 100.893323][ T4392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 100.903222][ T4392] Call Trace: [ 100.906335][ T4392] [ 100.909113][ T4392] dump_stack_lvl+0x151/0x1b7 [ 100.913714][ T4392] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 100.919017][ T4392] dump_stack+0x15/0x1b [ 100.923198][ T4392] should_fail_ex+0x3d0/0x520 [ 100.927696][ T4392] ? allocate_cgrp_cset_links+0xdb/0x380 [ 100.933166][ T4392] __should_failslab+0xaf/0xf0 [ 100.937768][ T4392] should_failslab+0x9/0x20 [ 100.942107][ T4392] __kmem_cache_alloc_node+0x3d/0x250 [ 100.947313][ T4392] ? kasan_save_alloc_info+0x1f/0x30 [ 100.952523][ T4392] ? allocate_cgrp_cset_links+0xdb/0x380 [ 100.957990][ T4392] kmalloc_trace+0x2a/0xa0 [ 100.962241][ T4392] allocate_cgrp_cset_links+0xdb/0x380 [ 100.967537][ T4392] find_css_set+0x9f9/0x1580 [ 100.971963][ T4392] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 100.976910][ T4392] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 100.982637][ T4392] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 100.988288][ T4392] ? __kasan_check_write+0x14/0x20 [ 100.993243][ T4392] cgroup_migrate_prepare_dst+0xc5/0x910 [ 100.999220][ T4392] cgroup_attach_task+0x2cd/0x580 [ 101.005104][ T4392] ? cgroup_migrate_execute+0xff0/0xff0 [ 101.011624][ T4392] ? get_task_cred+0x157/0x170 [ 101.016207][ T4392] __cgroup1_procs_write+0x2da/0x5d0 [ 101.021325][ T4392] ? cgroup_pidlist_destroy_work_fn+0x220/0x220 [ 101.027404][ T4392] ? __kasan_check_write+0x14/0x20 [ 101.032348][ T4392] ? _copy_from_iter+0x1f2/0xe00 [ 101.037130][ T4392] cgroup1_procs_write+0x2a/0x40 [ 101.041896][ T4392] ? cgroup_pidlist_stop+0x100/0x100 [ 101.047017][ T4392] cgroup_file_write+0x290/0x590 [ 101.051877][ T4392] ? cgroup_seqfile_stop+0xc0/0xc0 [ 101.056824][ T4392] ? bit_wait_io_timeout+0x120/0x120 [ 101.062033][ T4392] ? __kasan_check_write+0x14/0x20 [ 101.066978][ T4392] ? kernfs_get_active+0x9e/0xf0 [ 101.071755][ T4392] kernfs_fop_write_iter+0x2c4/0x410 [ 101.076962][ T4392] ? cgroup_seqfile_stop+0xc0/0xc0 [ 101.081906][ T4392] vfs_write+0x902/0xeb0 [ 101.085990][ T4392] ? file_end_write+0x1c0/0x1c0 [ 101.090671][ T4392] ? mutex_lock+0xb1/0x1e0 [ 101.094926][ T4392] ? bit_wait_io_timeout+0x120/0x120 [ 101.100141][ T4392] ? __fdget_pos+0x2e2/0x390 [ 101.104559][ T4392] ? ksys_write+0x77/0x2c0 [ 101.108815][ T4392] ksys_write+0x199/0x2c0 [ 101.112990][ T4392] ? __ia32_sys_read+0x90/0x90 [ 101.117664][ T4392] ? debug_smp_processor_id+0x17/0x20 [ 101.122872][ T4392] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 101.128777][ T4392] __x64_sys_write+0x7b/0x90 [ 101.133215][ T4392] do_syscall_64+0x3d/0xb0 [ 101.137455][ T4392] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 101.143185][ T4392] RIP: 0033:0x7f551047d0a9 [ 101.147610][ T4392] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 101.167226][ T4392] RSP: 002b:00007f551120f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.175469][ T4392] RAX: ffffffffffffffda RBX: 00007f55105b3f80 RCX: 00007f551047d0a9 [ 101.183283][ T4392] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000004 [ 101.191094][ T4392] RBP: 00007f551120f120 R08: 0000000000000000 R09: 0000000000000000 [ 101.198912][ T4392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.206717][ T4392] R13: 000000000000000b R14: 00007f55105b3f80 R15: 00007ffe1ca9fc88 [ 101.214540][ T4392] [ 101.340363][ T4412] syz-executor.0[4412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.340434][ T4412] syz-executor.0[4412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.391359][ T4411] device lo entered promiscuous mode [ 101.800395][ T4442] device veth0_vlan left promiscuous mode [ 101.854980][ T4442] device veth0_vlan entered promiscuous mode [ 102.108386][ T4463] FAULT_INJECTION: forcing a failure. [ 102.108386][ T4463] name failslab, interval 1, probability 0, space 0, times 0 [ 102.125147][ T4465] syz-executor.0[4465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.125217][ T4465] syz-executor.0[4465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.198596][ T4467] syz-executor.1[4467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.224758][ T4463] CPU: 1 PID: 4463 Comm: syz-executor.3 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 102.246112][ T4463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 102.256012][ T4463] Call Trace: [ 102.259130][ T4463] [ 102.261907][ T4463] dump_stack_lvl+0x151/0x1b7 [ 102.266425][ T4463] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 102.271716][ T4463] ? xas_start+0x32c/0x3f0 [ 102.275971][ T4463] dump_stack+0x15/0x1b [ 102.280053][ T4463] should_fail_ex+0x3d0/0x520 [ 102.284657][ T4463] ? jbd2__journal_start+0x150/0x720 [ 102.289770][ T4463] __should_failslab+0xaf/0xf0 [ 102.294380][ T4463] should_failslab+0x9/0x20 [ 102.298711][ T4463] kmem_cache_alloc+0x3b/0x2c0 [ 102.303312][ T4463] ? __msecs_to_jiffies+0x1e/0x50 [ 102.308172][ T4463] jbd2__journal_start+0x150/0x720 [ 102.313119][ T4463] __ext4_journal_start_sb+0x24d/0x4b0 [ 102.318414][ T4463] ext4_dirty_inode+0x8f/0x100 [ 102.323024][ T4463] ? __ext4_expand_extra_isize+0x420/0x420 [ 102.328656][ T4463] __mark_inode_dirty+0x200/0xa60 [ 102.333515][ T4463] ? folio_unlock+0x5c/0x70 [ 102.337855][ T4463] generic_write_end+0x202/0x300 [ 102.342628][ T4463] ext4_da_write_end+0x707/0x9a0 [ 102.347405][ T4463] ? ext4_da_write_begin+0x920/0x920 [ 102.352524][ T4463] generic_perform_write+0x3e6/0x5c0 [ 102.357646][ T4463] ? generic_file_direct_write+0x6b0/0x6b0 [ 102.363286][ T4463] ? generic_write_checks_count+0x490/0x490 [ 102.369014][ T4463] ? kstrtouint+0xf6/0x180 [ 102.373269][ T4463] ext4_buffered_write_iter+0x360/0x640 [ 102.378650][ T4463] ext4_file_write_iter+0x194/0x1570 [ 102.383769][ T4463] ? cgroup_rstat_updated+0xe5/0x370 [ 102.388887][ T4463] ? __alloc_pages+0x3a1/0x780 [ 102.393489][ T4463] ? avc_policy_seqno+0x1b/0x70 [ 102.398351][ T4463] ? ext4_file_read_iter+0x470/0x470 [ 102.403469][ T4463] ? fsnotify_perm+0x6a/0x5d0 [ 102.407989][ T4463] vfs_write+0x902/0xeb0 [ 102.412068][ T4463] ? file_end_write+0x1c0/0x1c0 [ 102.416748][ T4463] ? mutex_lock+0xb1/0x1e0 [ 102.421004][ T4463] ? bit_wait_io_timeout+0x120/0x120 [ 102.426124][ T4463] ? __fdget_pos+0x2e2/0x390 [ 102.430551][ T4463] ? ksys_write+0x77/0x2c0 [ 102.435629][ T4463] ksys_write+0x199/0x2c0 [ 102.440240][ T4463] ? __ia32_sys_read+0x90/0x90 [ 102.445243][ T4463] ? debug_smp_processor_id+0x17/0x20 [ 102.450449][ T4463] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 102.456356][ T4463] __x64_sys_write+0x7b/0x90 [ 102.460780][ T4463] do_syscall_64+0x3d/0xb0 [ 102.465132][ T4463] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 102.470858][ T4463] RIP: 0033:0x7f551047d0a9 [ 102.475112][ T4463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 102.494557][ T4463] RSP: 002b:00007f551120f0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 102.502795][ T4463] RAX: ffffffffffffffda RBX: 00007f55105b3f80 RCX: 00007f551047d0a9 [ 102.510608][ T4463] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 000000000000000b [ 102.518418][ T4463] RBP: 00007f551120f120 R08: 0000000000000000 R09: 0000000000000000 [ 102.526231][ T4463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.534040][ T4463] R13: 000000000000000b R14: 00007f55105b3f80 R15: 00007ffe1ca9fc88 [ 102.542301][ T4463] [ 102.554668][ T4467] syz-executor.1[4467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.571221][ T4465] device wg2 entered promiscuous mode [ 102.615690][ T4477] device syzkaller0 entered promiscuous mode [ 102.625604][ T4482] syz-executor.0[4482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.625680][ T4482] syz-executor.0[4482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.627743][ T4503] device wg2 left promiscuous mode [ 105.887906][ T4621] syz-executor.0[4621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.887979][ T4621] syz-executor.0[4621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.356830][ T4636] FAULT_INJECTION: forcing a failure. [ 106.356830][ T4636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.395332][ T4636] CPU: 0 PID: 4636 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 106.405227][ T4636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 106.415127][ T4636] Call Trace: [ 106.418245][ T4636] [ 106.421024][ T4636] dump_stack_lvl+0x151/0x1b7 [ 106.425538][ T4636] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 106.430832][ T4636] ? kasan_set_track+0x60/0x70 [ 106.435427][ T4636] ? kasan_set_track+0x4b/0x70 [ 106.440029][ T4636] ? kasan_save_free_info+0x2b/0x40 [ 106.445067][ T4636] dump_stack+0x15/0x1b [ 106.449230][ T4636] should_fail_ex+0x3d0/0x520 [ 106.454736][ T4636] should_fail+0xb/0x10 [ 106.460459][ T4636] should_fail_usercopy+0x1a/0x20 [ 106.466203][ T4636] _copy_to_user+0x1e/0x90 [ 106.471329][ T4636] simple_read_from_buffer+0xc7/0x150 [ 106.478323][ T4636] proc_fail_nth_read+0x1a3/0x210 [ 106.483826][ T4636] ? proc_fault_inject_write+0x390/0x390 [ 106.491353][ T4636] ? fsnotify_perm+0x470/0x5d0 [ 106.496044][ T4636] ? security_file_permission+0x86/0xb0 [ 106.501414][ T4636] ? proc_fault_inject_write+0x390/0x390 [ 106.506883][ T4636] vfs_read+0x26c/0xad0 [ 106.510876][ T4636] ? do_unlinkat+0x854/0x920 [ 106.515303][ T4636] ? kernel_read+0x1f0/0x1f0 [ 106.519744][ T4636] ? mutex_lock+0xb1/0x1e0 [ 106.523983][ T4636] ? bit_wait_io_timeout+0x120/0x120 [ 106.529103][ T4636] ? __fdget_pos+0x2e2/0x390 [ 106.533531][ T4636] ? ksys_read+0x77/0x2c0 [ 106.537713][ T4636] ksys_read+0x199/0x2c0 [ 106.541775][ T4636] ? fsnotify_link_count+0x100/0x100 [ 106.546894][ T4636] ? vfs_write+0xeb0/0xeb0 [ 106.551151][ T4636] ? debug_smp_processor_id+0x17/0x20 [ 106.556354][ T4636] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 106.562258][ T4636] __x64_sys_read+0x7b/0x90 [ 106.566598][ T4636] do_syscall_64+0x3d/0xb0 [ 106.570849][ T4636] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 106.576579][ T4636] RIP: 0033:0x7f20ebc7bd4c [ 106.580832][ T4636] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 106.600360][ T4636] RSP: 002b:00007f20ec9980c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 106.608611][ T4636] RAX: ffffffffffffffda RBX: 00007f20ebdb3f80 RCX: 00007f20ebc7bd4c [ 106.616415][ T4636] RDX: 000000000000000f RSI: 00007f20ec998130 RDI: 0000000000000008 [ 106.624226][ T4636] RBP: 00007f20ec998120 R08: 0000000000000000 R09: 0000000000000000 [ 106.632038][ T4636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.639849][ T4636] R13: 000000000000000b R14: 00007f20ebdb3f80 R15: 00007ffc4eb0e2c8 [ 106.647929][ T4636] [ 107.821539][ T4723] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 107.918848][ T4735] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 107.931013][ T4738] syz-executor.2[4738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.933737][ T4738] syz-executor.2[4738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.227500][ T4769] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 109.234290][ T4818] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 109.390005][ T4815] device pim6reg1 entered promiscuous mode [ 109.859920][ T4846] Â: renamed from pim6reg1 [ 110.712478][ T4874] device syzkaller0 entered promiscuous mode [ 110.881348][ T4885] syz-executor.2[4885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.881417][ T4885] syz-executor.2[4885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.899973][ T4885] bridge0: port 3(veth1_macvtap) entered blocking state [ 110.918989][ T4885] bridge0: port 3(veth1_macvtap) entered disabled state [ 110.928777][ T4885] FAULT_INJECTION: forcing a failure. [ 110.928777][ T4885] name failslab, interval 1, probability 0, space 0, times 0 [ 110.942205][ T4885] CPU: 1 PID: 4885 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 110.953053][ T4885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 110.965200][ T4885] Call Trace: [ 110.968330][ T4885] [ 110.971096][ T4885] dump_stack_lvl+0x151/0x1b7 [ 110.975622][ T4885] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 110.980904][ T4885] ? selinux_kernfs_init_security+0x14a/0x720 [ 110.986896][ T4885] ? idr_alloc_cyclic+0x369/0x5d0 [ 110.991757][ T4885] dump_stack+0x15/0x1b [ 110.995745][ T4885] should_fail_ex+0x3d0/0x520 [ 111.000260][ T4885] ? __kernfs_new_node+0xdb/0x700 [ 111.005127][ T4885] __should_failslab+0xaf/0xf0 [ 111.009725][ T4885] should_failslab+0x9/0x20 [ 111.014059][ T4885] kmem_cache_alloc+0x3b/0x2c0 [ 111.018749][ T4885] __kernfs_new_node+0xdb/0x700 [ 111.023441][ T4885] ? kernfs_new_node+0x230/0x230 [ 111.028206][ T4885] ? rwsem_write_trylock+0x15b/0x290 [ 111.033330][ T4885] ? up_write+0x79/0x1f0 [ 111.037495][ T4885] ? make_kgid+0x1f2/0x6f0 [ 111.041753][ T4885] kernfs_new_node+0x130/0x230 [ 111.046353][ T4885] __kernfs_create_file+0x4a/0x270 [ 111.051301][ T4885] sysfs_add_file_mode_ns+0x1c8/0x270 [ 111.056504][ T4885] sysfs_create_file_ns+0x193/0x2a0 [ 111.061536][ T4885] ? kernfs_put+0x4e5/0x520 [ 111.065878][ T4885] ? sysfs_add_bin_file_mode_ns+0x1c0/0x1c0 [ 111.071611][ T4885] br_sysfs_addif+0xb8/0x220 [ 111.076050][ T4885] br_add_if+0x3c4/0xe60 [ 111.080115][ T4885] br_dev_siocdevprivate+0x8b5/0x1a20 [ 111.085320][ T4885] ? br_handle_local_finish+0x250/0x250 [ 111.090698][ T4885] ? do_vfs_ioctl+0xba7/0x29a0 [ 111.095301][ T4885] ? kstrtouint_from_user+0x124/0x180 [ 111.100508][ T4885] ? __x64_compat_sys_ioctl+0x90/0x90 [ 111.105722][ T4885] ? kstrtol_from_user+0x180/0x180 [ 111.110662][ T4885] ? cgroup_rstat_updated+0xe5/0x370 [ 111.115783][ T4885] ? __alloc_pages+0x3a1/0x780 [ 111.120475][ T4885] ? full_name_hash+0x9d/0xf0 [ 111.124983][ T4885] dev_ifsioc+0xd40/0x1150 [ 111.129238][ T4885] ? ioctl_has_perm+0x3f0/0x560 [ 111.133926][ T4885] ? dev_ioctl+0xe60/0xe60 [ 111.139375][ T4885] ? __kasan_check_write+0x14/0x20 [ 111.144433][ T4885] ? mutex_lock+0xb1/0x1e0 [ 111.149197][ T4885] ? bit_wait_io_timeout+0x120/0x120 [ 111.155343][ T4885] dev_ioctl+0x5e9/0xe60 [ 111.159819][ T4885] sock_ioctl+0x665/0x740 [ 111.164051][ T4885] ? sock_poll+0x400/0x400 [ 111.168446][ T4885] ? security_file_ioctl+0x84/0xb0 [ 111.173393][ T4885] ? sock_poll+0x400/0x400 [ 111.177639][ T4885] __se_sys_ioctl+0x114/0x190 [ 111.182163][ T4885] __x64_sys_ioctl+0x7b/0x90 [ 111.186578][ T4885] do_syscall_64+0x3d/0xb0 [ 111.190863][ T4885] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 111.196560][ T4885] RIP: 0033:0x7f5b4167d0a9 [ 111.200811][ T4885] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 111.220260][ T4885] RSP: 002b:00007f5b4235e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 111.228500][ T4885] RAX: ffffffffffffffda RBX: 00007f5b417b3f80 RCX: 00007f5b4167d0a9 [ 111.236310][ T4885] RDX: 0000000020000900 RSI: 00000000000089f0 RDI: 0000000000000007 [ 111.244121][ T4885] RBP: 00007f5b4235e120 R08: 0000000000000000 R09: 0000000000000000 [ 111.251932][ T4885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.259742][ T4885] R13: 000000000000000b R14: 00007f5b417b3f80 R15: 00007ffe8fb7af38 [ 111.267561][ T4885] [ 111.292159][ T4888] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 111.617637][ T4933] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 111.659113][ T4937] FAULT_INJECTION: forcing a failure. [ 111.659113][ T4937] name failslab, interval 1, probability 0, space 0, times 0 [ 111.805803][ T4937] CPU: 1 PID: 4937 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 111.815711][ T4937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 111.825601][ T4937] Call Trace: [ 111.828739][ T4937] [ 111.831500][ T4937] dump_stack_lvl+0x151/0x1b7 [ 111.836103][ T4937] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 111.841393][ T4937] ? selinux_kernfs_init_security+0x14a/0x720 [ 111.847296][ T4937] ? idr_alloc_cyclic+0x369/0x5d0 [ 111.852246][ T4937] dump_stack+0x15/0x1b [ 111.856239][ T4937] should_fail_ex+0x3d0/0x520 [ 111.860753][ T4937] ? __kernfs_new_node+0xdb/0x700 [ 111.865619][ T4937] __should_failslab+0xaf/0xf0 [ 111.870214][ T4937] should_failslab+0x9/0x20 [ 111.874557][ T4937] kmem_cache_alloc+0x3b/0x2c0 [ 111.879156][ T4937] __kernfs_new_node+0xdb/0x700 [ 111.883843][ T4937] ? kernfs_new_node+0x230/0x230 [ 111.888613][ T4937] ? rwsem_write_trylock+0x15b/0x290 [ 111.893738][ T4937] ? up_write+0x79/0x1f0 [ 111.897815][ T4937] ? kernfs_activate+0x1e6/0x200 [ 111.902673][ T4937] kernfs_new_node+0x130/0x230 [ 111.907274][ T4937] __kernfs_create_file+0x4a/0x270 [ 111.912220][ T4937] sysfs_add_file_mode_ns+0x1c8/0x270 [ 111.917438][ T4937] internal_create_group+0x545/0xed0 [ 111.922555][ T4937] ? sysfs_create_group+0x30/0x30 [ 111.927411][ T4937] ? up_write+0x79/0x1f0 [ 111.931489][ T4937] ? kernfs_activate+0x1e6/0x200 [ 111.936365][ T4937] sysfs_create_groups+0x5b/0x130 [ 111.941213][ T4937] device_add_attrs+0xe1/0x5f0 [ 111.945811][ T4937] ? kernfs_put+0x4e5/0x520 [ 111.950760][ T4937] ? get_device_parent+0x410/0x410 [ 111.959112][ T4937] ? sysfs_do_create_link_sd+0xe2/0x110 [ 111.965257][ T4937] device_add+0x5f7/0xf10 [ 111.969767][ T4937] netdev_register_kobject+0x177/0x320 [ 111.975062][ T4937] ? raw_notifier_call_chain+0xdf/0xf0 [ 111.980441][ T4937] register_netdevice+0xe43/0x1490 [ 111.985487][ T4937] ? netif_stacked_transfer_operstate+0x240/0x240 [ 111.991822][ T4937] ? tun_net_initialize+0x15c/0x460 [ 111.996867][ T4937] ? tun_setup+0x2b0/0x2b0 [ 112.001344][ T4937] ? alloc_netdev_mqs+0xbf2/0xf90 [ 112.006630][ T4937] tun_set_iff+0x836/0xee0 [ 112.011327][ T4937] __tun_chr_ioctl+0x80e/0x22d0 [ 112.016318][ T4937] ? tun_flow_create+0x320/0x320 [ 112.021045][ T4937] ? __fget_files+0x2cb/0x330 [ 112.025566][ T4937] tun_chr_ioctl+0x2a/0x40 [ 112.029973][ T4937] ? tun_chr_poll+0x670/0x670 [ 112.035365][ T4937] __se_sys_ioctl+0x114/0x190 [ 112.039904][ T4937] __x64_sys_ioctl+0x7b/0x90 [ 112.044852][ T4937] do_syscall_64+0x3d/0xb0 [ 112.049194][ T4937] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 112.054915][ T4937] RIP: 0033:0x7f20ebc7d0a9 [ 112.059171][ T4937] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 112.079754][ T4937] RSP: 002b:00007f20ec9980c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 112.088965][ T4937] RAX: ffffffffffffffda RBX: 00007f20ebdb3f80 RCX: 00007f20ebc7d0a9 [ 112.096764][ T4937] RDX: 0000000020000080 RSI: 00000000400454ca RDI: 0000000000000008 [ 112.104569][ T4937] RBP: 00007f20ec998120 R08: 0000000000000000 R09: 0000000000000000 [ 112.112468][ T4937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.120280][ T4937] R13: 000000000000000b R14: 00007f20ebdb3f80 R15: 00007ffc4eb0e2c8 [ 112.128099][ T4937] [ 112.401994][ T4958] syz-executor.4[4958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.402073][ T4958] syz-executor.4[4958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.502320][ T4968] syz-executor.0[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.515851][ T4968] syz-executor.0[4968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.529792][ T4958] syz-executor.4[4958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.623832][ T4958] syz-executor.4[4958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.608670][ T5040] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 113.799534][ T5046] device pim6reg1 entered promiscuous mode [ 115.109509][ T5110] device sit0 entered promiscuous mode [ 115.340061][ T5132] device sit0 entered promiscuous mode [ 115.527156][ T5141] FAULT_INJECTION: forcing a failure. [ 115.527156][ T5141] name failslab, interval 1, probability 0, space 0, times 0 [ 115.555842][ T5141] CPU: 1 PID: 5141 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 115.566799][ T5141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 115.576682][ T5141] Call Trace: [ 115.579801][ T5141] [ 115.582577][ T5141] dump_stack_lvl+0x151/0x1b7 [ 115.587098][ T5141] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 115.592389][ T5141] ? netlink_broadcast+0x112e/0x1160 [ 115.597505][ T5141] ? fib_dump_info+0xbea/0x1410 [ 115.602201][ T5141] dump_stack+0x15/0x1b [ 115.606187][ T5141] should_fail_ex+0x3d0/0x520 [ 115.610702][ T5141] ? fib_create_info+0x858/0x1f10 [ 115.615561][ T5141] __should_failslab+0xaf/0xf0 [ 115.620166][ T5141] should_failslab+0x9/0x20 [ 115.624501][ T5141] __kmem_cache_alloc_node+0x3d/0x250 [ 115.629710][ T5141] ? fib_create_info+0x858/0x1f10 [ 115.634566][ T5141] __kmalloc+0xa3/0x1e0 [ 115.638561][ T5141] fib_create_info+0x858/0x1f10 [ 115.643474][ T5141] fib_table_insert+0x1b7/0x20a0 [ 115.648253][ T5141] ? fib_alias_hw_flags_set+0xb20/0xb20 [ 115.653622][ T5141] ? dev_change_flags+0xf0/0x1a0 [ 115.658401][ T5141] ? dev_ioctl+0x543/0xe60 [ 115.662648][ T5141] ? sock_do_ioctl+0x26b/0x450 [ 115.667248][ T5141] fib_add_ifaddr+0xe49/0x15e0 [ 115.671849][ T5141] ? nlmsg_parse_deprecated_strict+0xf0/0xf0 [ 115.677666][ T5141] ? igmpv3_del_delrec+0x740/0x740 [ 115.682612][ T5141] ? __kasan_check_write+0x14/0x20 [ 115.687563][ T5141] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 115.692425][ T5141] ? igmp_group_added+0x1fa/0x800 [ 115.697279][ T5141] ? igmpv3_del_delrec+0x740/0x740 [ 115.702225][ T5141] ? __local_bh_enable_ip+0x58/0x80 [ 115.707259][ T5141] ? _raw_spin_unlock_bh+0x50/0x60 [ 115.712212][ T5141] ? inetdev_event+0xe4f/0x1110 [ 115.716895][ T5141] ? ipv4_doint_and_flush+0x150/0x150 [ 115.722101][ T5141] fib_netdev_event+0x23f/0x5a0 [ 115.726789][ T5141] raw_notifier_call_chain+0x8c/0xf0 [ 115.731910][ T5141] __dev_notify_flags+0x304/0x610 [ 115.736766][ T5141] ? __kasan_check_read+0x11/0x20 [ 115.741628][ T5141] ? __dev_change_flags+0x6e0/0x6e0 [ 115.746661][ T5141] ? __dev_change_flags+0x505/0x6e0 [ 115.751696][ T5141] ? avc_denied+0x1b0/0x1b0 [ 115.756035][ T5141] ? dev_get_flags+0x1e0/0x1e0 [ 115.760636][ T5141] ? kstrtouint+0xf6/0x180 [ 115.764892][ T5141] dev_change_flags+0xf0/0x1a0 [ 115.769490][ T5141] dev_ifsioc+0x177/0x1150 [ 115.773745][ T5141] ? dev_ioctl+0xe60/0xe60 [ 115.777993][ T5141] ? __mutex_lock_slowpath+0xe/0x10 [ 115.783027][ T5141] ? mutex_lock+0x130/0x1e0 [ 115.787370][ T5141] ? bit_wait_io_timeout+0x120/0x120 [ 115.792496][ T5141] dev_ioctl+0x543/0xe60 [ 115.796569][ T5141] sock_do_ioctl+0x26b/0x450 [ 115.801007][ T5141] ? has_cap_mac_admin+0x3c0/0x3c0 [ 115.805944][ T5141] ? sock_show_fdinfo+0xa0/0xa0 [ 115.810634][ T5141] ? selinux_file_ioctl+0x3cc/0x540 [ 115.815667][ T5141] sock_ioctl+0x455/0x740 [ 115.819831][ T5141] ? sock_poll+0x400/0x400 [ 115.824082][ T5141] ? __fget_files+0x2cb/0x330 [ 115.828600][ T5141] ? security_file_ioctl+0x84/0xb0 [ 115.833544][ T5141] ? sock_poll+0x400/0x400 [ 115.837795][ T5141] __se_sys_ioctl+0x114/0x190 [ 115.842309][ T5141] __x64_sys_ioctl+0x7b/0x90 [ 115.846735][ T5141] do_syscall_64+0x3d/0xb0 [ 115.850990][ T5141] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.856715][ T5141] RIP: 0033:0x7fc3d867d0a9 [ 115.860969][ T5141] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 115.880415][ T5141] RSP: 002b:00007fc3d93a20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 115.888654][ T5141] RAX: ffffffffffffffda RBX: 00007fc3d87b4050 RCX: 00007fc3d867d0a9 [ 115.896465][ T5141] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000008 [ 115.904283][ T5141] RBP: 00007fc3d93a2120 R08: 0000000000000000 R09: 0000000000000000 [ 115.912094][ T5141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.919900][ T5141] R13: 000000000000006e R14: 00007fc3d87b4050 R15: 00007ffd96644618 [ 115.927719][ T5141] [ 116.164863][ T28] audit: type=1400 audit(1719177315.334:147): avc: denied { create } for pid=5178 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 116.952321][ T28] audit: type=1400 audit(1719177316.124:148): avc: denied { append } for pid=5217 comm="syz-executor.0" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 117.336069][ T5245] bridge0: port 4(veth1_macvtap) entered blocking state [ 117.380161][ T5245] bridge0: port 4(veth1_macvtap) entered disabled state [ 118.016172][ T5303] syz-executor.2[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.038163][ T5303] syz-executor.2[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.228390][ T5303] syz-executor.2[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.405021][ T5341] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 118.471039][ T5346] syz-executor.4[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.471110][ T5346] syz-executor.4[5346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.840282][ T5380] syz-executor.4[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.876982][ T5380] syz-executor.4[5380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.936187][ T5384] syz-executor.3[5384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.951606][ T5384] syz-executor.3[5384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.322436][ T5412] syz-executor.2[5412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.938973][ T5503] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 121.384095][ T5516] device syzkaller0 entered promiscuous mode [ 121.962084][ T5566] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 122.316187][ T5603] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 122.469857][ T5585] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.560673][ T5585] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.609434][ T5585] device bridge_slave_0 entered promiscuous mode [ 122.707624][ T5585] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.722778][ T5585] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.839251][ T5585] device bridge_slave_1 entered promiscuous mode [ 122.989988][ T942] device bridge_slave_1 left promiscuous mode [ 122.999242][ T942] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.013888][ T942] device bridge_slave_0 left promiscuous mode [ 123.031130][ T28] audit: type=1400 audit(1719177322.204:149): avc: denied { create } for pid=5630 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 123.077151][ T942] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.128656][ T942] device veth1_macvtap left promiscuous mode [ 123.134744][ T942] device veth0_vlan left promiscuous mode [ 123.175533][ T5645] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 123.348624][ T5658] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 123.745159][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.752741][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.761857][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.770292][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.790127][ T2562] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.796993][ T2562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.828128][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.836305][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.891581][ T2562] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.898483][ T2562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.927559][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 123.962379][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.000807][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 124.042520][ T2562] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.089691][ T5687] device sit0 left promiscuous mode [ 124.160282][ T5693] device syzkaller0 entered promiscuous mode [ 124.177437][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 124.187187][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 124.196075][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 124.204547][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 124.213456][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.223710][ T5710] Â: renamed from pim6reg1 [ 124.252405][ T5585] device veth0_vlan entered promiscuous mode [ 124.258601][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.266537][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.294846][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 124.305598][ T5585] device veth1_macvtap entered promiscuous mode [ 124.363377][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 124.388930][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 124.404741][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 124.439601][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.789339][ T5747] device pim6reg1 entered promiscuous mode [ 124.980696][ T5769] bpf_get_probe_write_proto: 3 callbacks suppressed [ 124.980714][ T5769] syz-executor.4[5769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.031604][ T5769] syz-executor.4[5769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.188664][ T5793] device pim6reg1 entered promiscuous mode [ 125.919232][ T5842] syz-executor.3[5842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.919311][ T5842] syz-executor.3[5842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.952725][ T5842] syz-executor.3[5842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.000281][ T5842] syz-executor.3[5842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.027703][ T5853] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 127.333736][ T5909] device pim6reg1 entered promiscuous mode [ 127.426441][ T5927] device syzkaller0 entered promiscuous mode [ 127.505178][ T5948] device veth0_vlan left promiscuous mode [ 127.512295][ T5948] device veth0_vlan entered promiscuous mode [ 127.525186][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.542522][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 127.550672][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.791628][ T5973] FAULT_INJECTION: forcing a failure. [ 127.791628][ T5973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.880737][ T5973] CPU: 1 PID: 5973 Comm: syz-executor.2 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 127.890648][ T5973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 127.900715][ T5973] Call Trace: [ 127.903830][ T5973] [ 127.906606][ T5973] dump_stack_lvl+0x151/0x1b7 [ 127.911123][ T5973] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 127.916414][ T5973] ? mutex_lock+0xb1/0x1e0 [ 127.920669][ T5973] ? bit_wait_io_timeout+0x120/0x120 [ 127.925787][ T5973] ? avc_has_perm+0x16f/0x260 [ 127.930306][ T5973] dump_stack+0x15/0x1b [ 127.934295][ T5973] should_fail_ex+0x3d0/0x520 [ 127.938808][ T5973] should_fail+0xb/0x10 [ 127.942800][ T5973] should_fail_usercopy+0x1a/0x20 [ 127.947747][ T5973] _copy_from_user+0x1e/0xc0 [ 127.952175][ T5973] perf_copy_attr+0x163/0x880 [ 127.956688][ T5973] perf_ioctl+0x1b3/0x20c0 [ 127.960941][ T5973] ? ioctl_has_perm+0x44d/0x560 [ 127.965629][ T5973] ? has_cap_mac_admin+0x3c0/0x3c0 [ 127.970573][ T5973] ? vfs_write+0xbb3/0xeb0 [ 127.974829][ T5973] ? perf_poll+0x1b0/0x1b0 [ 127.979084][ T5973] ? selinux_file_ioctl+0x3cc/0x540 [ 127.984113][ T5973] ? __mutex_lock_slowpath+0x10/0x10 [ 127.989234][ T5973] ? selinux_file_alloc_security+0x120/0x120 [ 127.995053][ T5973] ? security_file_ioctl+0x84/0xb0 [ 127.999998][ T5973] ? perf_poll+0x1b0/0x1b0 [ 128.004249][ T5973] __se_sys_ioctl+0x114/0x190 [ 128.008765][ T5973] __x64_sys_ioctl+0x7b/0x90 [ 128.013189][ T5973] do_syscall_64+0x3d/0xb0 [ 128.017597][ T5973] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 128.024707][ T5973] RIP: 0033:0x7f5b4167d0a9 [ 128.028948][ T5973] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 128.050479][ T5973] RSP: 002b:00007f5b4235e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 128.058807][ T5973] RAX: ffffffffffffffda RBX: 00007f5b417b3f80 RCX: 00007f5b4167d0a9 [ 128.066621][ T5973] RDX: 0000000020000000 RSI: 000000004008240b RDI: 0000000000000006 [ 128.074428][ T5973] RBP: 00007f5b4235e120 R08: 0000000000000000 R09: 0000000000000000 [ 128.082369][ T5973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.090142][ T5973] R13: 000000000000000b R14: 00007f5b417b3f80 R15: 00007ffe8fb7af38 [ 128.097965][ T5973] [ 128.104836][ T28] audit: type=1400 audit(1719177327.274:150): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.511857][ T5989] device pim6reg1 entered promiscuous mode [ 128.696633][ T5999] FAULT_INJECTION: forcing a failure. [ 128.696633][ T5999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 128.827376][ T5999] CPU: 0 PID: 5999 Comm: syz-executor.0 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 128.837274][ T5999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 128.847173][ T5999] Call Trace: [ 128.850294][ T5999] [ 128.853071][ T5999] dump_stack_lvl+0x151/0x1b7 [ 128.857583][ T5999] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 128.862880][ T5999] dump_stack+0x15/0x1b [ 128.866870][ T5999] should_fail_ex+0x3d0/0x520 [ 128.871388][ T5999] should_fail_alloc_page+0x68/0x90 [ 128.876420][ T5999] __alloc_pages+0x1f4/0x780 [ 128.880846][ T5999] ? prep_new_page+0x110/0x110 [ 128.885447][ T5999] ? xas_start+0x32c/0x3f0 [ 128.889700][ T5999] ? xas_load+0x39d/0x3b0 [ 128.893865][ T5999] __folio_alloc+0x15/0x40 [ 128.898123][ T5999] __filemap_get_folio+0x827/0xae0 [ 128.903069][ T5999] ? page_cache_prev_miss+0x410/0x410 [ 128.908278][ T5999] ? asm_exc_page_fault+0x27/0x30 [ 128.913135][ T5999] pagecache_get_page+0x2f/0x110 [ 128.917909][ T5999] grab_cache_page_write_begin+0x42/0x60 [ 128.923374][ T5999] ext4_da_write_begin+0x4f3/0x920 [ 128.928325][ T5999] ? ext4_dirty_folio+0xf0/0xf0 [ 128.933011][ T5999] generic_perform_write+0x2f9/0x5c0 [ 128.938132][ T5999] ? generic_file_direct_write+0x6b0/0x6b0 [ 128.943769][ T5999] ? generic_write_checks_count+0x490/0x490 [ 128.949500][ T5999] ? kstrtouint+0xf6/0x180 [ 128.953754][ T5999] ext4_buffered_write_iter+0x360/0x640 [ 128.959136][ T5999] ext4_file_write_iter+0x194/0x1570 [ 128.964263][ T5999] ? cgroup_rstat_updated+0xe5/0x370 [ 128.969379][ T5999] ? __alloc_pages+0x3a1/0x780 [ 128.973978][ T5999] ? avc_policy_seqno+0x1b/0x70 [ 128.978667][ T5999] ? ext4_file_read_iter+0x470/0x470 [ 128.983785][ T5999] ? fsnotify_perm+0x6a/0x5d0 [ 128.988300][ T5999] vfs_write+0x902/0xeb0 [ 128.992378][ T5999] ? file_end_write+0x1c0/0x1c0 [ 128.997061][ T5999] ? mutex_lock+0xb1/0x1e0 [ 129.001313][ T5999] ? bit_wait_io_timeout+0x120/0x120 [ 129.006442][ T5999] ? __fdget_pos+0x2e2/0x390 [ 129.010866][ T5999] ? ksys_write+0x77/0x2c0 [ 129.015118][ T5999] ksys_write+0x199/0x2c0 [ 129.019283][ T5999] ? __ia32_sys_read+0x90/0x90 [ 129.023888][ T5999] ? debug_smp_processor_id+0x17/0x20 [ 129.029091][ T5999] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 129.034994][ T5999] __x64_sys_write+0x7b/0x90 [ 129.039418][ T5999] do_syscall_64+0x3d/0xb0 [ 129.043674][ T5999] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 129.049401][ T5999] RIP: 0033:0x7fc3d867d0a9 [ 129.053651][ T5999] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 129.073096][ T5999] RSP: 002b:00007fc3d93c30c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 129.081339][ T5999] RAX: ffffffffffffffda RBX: 00007fc3d87b3f80 RCX: 00007fc3d867d0a9 [ 129.089154][ T5999] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 129.096962][ T5999] RBP: 00007fc3d93c3120 R08: 0000000000000000 R09: 0000000000000000 [ 129.104773][ T5999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 129.112584][ T5999] R13: 000000000000000b R14: 00007fc3d87b3f80 R15: 00007ffd96644618 [ 129.120489][ T5999] [ 129.534687][ T6017] bridge0: port 3(team_slave_1) entered blocking state [ 129.559314][ T6017] bridge0: port 3(team_slave_1) entered disabled state [ 129.567003][ T6017] device team_slave_1 entered promiscuous mode [ 129.659881][ T6024] EXT4-fs warning (device sda1): ext4_resize_begin:84: There are errors in the filesystem, so online resizing is not allowed [ 130.278630][ T6037] device pim6reg1 entered promiscuous mode [ 131.036592][ T6082] syz-executor.0[6082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.036660][ T6082] syz-executor.0[6082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.279854][ T6135] syz-executor.1[6135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.280041][ T6134] syz-executor.1[6134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.488380][ T6135] syz-executor.1[6135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.294386][ T6174] syz-executor.3[6174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.407405][ T6174] syz-executor.3[6174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.540186][ T6175] syz-executor.3[6175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.458312][ T6228] device syzkaller0 entered promiscuous mode [ 134.939344][ T6243] FAULT_INJECTION: forcing a failure. [ 134.939344][ T6243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 134.962117][ T6243] CPU: 0 PID: 6243 Comm: syz-executor.4 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 134.972019][ T6243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 134.981908][ T6243] Call Trace: [ 134.985030][ T6243] [ 134.987819][ T6243] dump_stack_lvl+0x151/0x1b7 [ 134.992391][ T6243] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 134.997886][ T6243] ? mutex_lock+0xb1/0x1e0 [ 135.002228][ T6243] ? bit_wait_io_timeout+0x120/0x120 [ 135.007431][ T6243] ? avc_has_perm+0x16f/0x260 [ 135.011948][ T6243] dump_stack+0x15/0x1b [ 135.015943][ T6243] should_fail_ex+0x3d0/0x520 [ 135.020460][ T6243] should_fail+0xb/0x10 [ 135.024449][ T6243] should_fail_usercopy+0x1a/0x20 [ 135.029303][ T6243] _copy_from_user+0x1e/0xc0 [ 135.033733][ T6243] perf_copy_attr+0x163/0x880 [ 135.038466][ T6243] perf_ioctl+0x1b3/0x20c0 [ 135.042715][ T6243] ? ioctl_has_perm+0x44d/0x560 [ 135.047582][ T6243] ? has_cap_mac_admin+0x3c0/0x3c0 [ 135.052610][ T6243] ? vfs_write+0xbb3/0xeb0 [ 135.056869][ T6243] ? perf_poll+0x1b0/0x1b0 [ 135.061117][ T6243] ? selinux_file_ioctl+0x3cc/0x540 [ 135.066148][ T6243] ? __mutex_lock_slowpath+0x10/0x10 [ 135.071271][ T6243] ? selinux_file_alloc_security+0x120/0x120 [ 135.077089][ T6243] ? security_file_ioctl+0x84/0xb0 [ 135.082032][ T6243] ? perf_poll+0x1b0/0x1b0 [ 135.086288][ T6243] __se_sys_ioctl+0x114/0x190 [ 135.090798][ T6243] __x64_sys_ioctl+0x7b/0x90 [ 135.095224][ T6243] do_syscall_64+0x3d/0xb0 [ 135.099476][ T6243] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 135.105202][ T6243] RIP: 0033:0x7f20ebc7d0a9 [ 135.109457][ T6243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 135.128900][ T6243] RSP: 002b:00007f20ec9980c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 135.137143][ T6243] RAX: ffffffffffffffda RBX: 00007f20ebdb3f80 RCX: 00007f20ebc7d0a9 [ 135.144957][ T6243] RDX: 0000000020000000 RSI: 000000004008240b RDI: 0000000000000004 [ 135.152765][ T6243] RBP: 00007f20ec998120 R08: 0000000000000000 R09: 0000000000000000 [ 135.160577][ T6243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.168476][ T6243] R13: 000000000000000b R14: 00007f20ebdb3f80 R15: 00007ffc4eb0e2c8 [ 135.176294][ T6243] [ 135.182756][ T6226] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 135.191609][ T6226] #PF: supervisor instruction fetch in kernel mode [ 135.198191][ T6226] #PF: error_code(0x0010) - not-present page [ 135.204015][ T6226] PGD 11eed3067 P4D 11eed3067 PUD 116b00067 PMD 0 [ 135.210445][ T6226] Oops: 0010 [#1] PREEMPT SMP KASAN [ 135.215464][ T6226] CPU: 1 PID: 6226 Comm: syz-executor.1 Not tainted 6.1.78-syzkaller-00021-g1a72e2f692ac #0 [ 135.225448][ T6226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 [ 135.236131][ T6226] RIP: 0010:0x0 [ 135.239425][ T6226] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 135.246633][ T6226] RSP: 0018:ffffc90000e6f908 EFLAGS: 00010246 [ 135.252525][ T6226] RAX: 1ffff1102650cd97 RBX: ffff888132866cb8 RCX: 0000000000040000 [ 135.260343][ T6226] RDX: ffffc900017bb000 RSI: 000000000001f379 RDI: ffff8881366cf9c0 [ 135.268147][ T6226] RBP: ffffc90000e6f930 R08: ffffffff841d8447 R09: ffff8881002a6900 [ 135.275957][ T6226] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 135.283772][ T6226] R13: dffffc0000000000 R14: ffff8881366cf9c0 R15: dffffc0000000000 [ 135.291583][ T6226] FS: 00007fc1a658e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 135.300347][ T6226] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 135.306768][ T6226] CR2: ffffffffffffffd6 CR3: 00000001098e1000 CR4: 00000000003506a0 [ 135.314583][ T6226] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 135.322656][ T6226] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 135.330473][ T6226] Call Trace: [ 135.333591][ T6226] [ 135.336372][ T6226] ? __die_body+0x62/0xb0 [ 135.340535][ T6226] ? __die+0x7e/0x90 [ 135.344266][ T6226] ? page_fault_oops+0x7f9/0xa90 [ 135.349040][ T6226] ? kfree_skbmem+0x104/0x170 [ 135.353553][ T6226] ? kernelmode_fixup_or_oops+0x270/0x270 [ 135.359108][ T6226] ? kmem_cache_free+0x291/0x510 [ 135.363881][ T6226] ? kfree_skbmem+0x104/0x170 [ 135.368397][ T6226] ? sk_psock_verdict_recv+0x3ea/0x7c0 [ 135.373688][ T6226] ? kfree_skb_reason+0xdb/0x250 [ 135.378463][ T6226] ? is_errata93+0xc7/0x240 [ 135.382804][ T6226] ? exc_page_fault+0x537/0x700 [ 135.387491][ T6226] ? asm_exc_page_fault+0x27/0x30 [ 135.392349][ T6226] ? sk_psock_verdict_data_ready+0xf7/0x160 [ 135.398165][ T6226] sk_psock_verdict_data_ready+0x129/0x160 [ 135.403807][ T6226] unix_stream_sendmsg+0x8fd/0x1070 [ 135.409129][ T6226] ? unix_stream_sendmsg+0x8b1/0x1070 [ 135.414752][ T6226] ? unix_show_fdinfo+0x2f0/0x2f0 [ 135.419550][ T6226] ? security_socket_sendmsg+0x82/0xb0 [ 135.424843][ T6226] ? unix_show_fdinfo+0x2f0/0x2f0 [ 135.429704][ T6226] ____sys_sendmsg+0x5d3/0x9a0 [ 135.434306][ T6226] ? __sys_sendmsg_sock+0x40/0x40 [ 135.439165][ T6226] ? kasan_check_range+0x82/0x2a0 [ 135.444024][ T6226] __sys_sendmsg+0x2a9/0x390 [ 135.448455][ T6226] ? ____sys_sendmsg+0x9a0/0x9a0 [ 135.453223][ T6226] ? __hrtimer_run_queues+0xa72/0xad0 [ 135.458439][ T6226] ? restore_fpregs_from_fpstate+0xfc/0x230 [ 135.464164][ T6226] ? __kasan_check_write+0x14/0x20 [ 135.469106][ T6226] ? fpregs_restore_userregs+0x130/0x290 [ 135.474575][ T6226] __x64_sys_sendmsg+0x7f/0x90 [ 135.479175][ T6226] do_syscall_64+0x3d/0xb0 [ 135.483427][ T6226] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 135.489071][ T6226] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 135.494799][ T6226] RIP: 0033:0x7fc1a587d0a9 [ 135.499056][ T6226] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 135.519669][ T6226] RSP: 002b:00007fc1a658e0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.528481][ T6226] RAX: ffffffffffffffda RBX: 00007fc1a59b3f80 RCX: 00007fc1a587d0a9 [ 135.536386][ T6226] RDX: 0000000000000003 RSI: 0000000020000980 RDI: 000000000000000b [ 135.544203][ T6226] RBP: 00007fc1a58ec074 R08: 0000000000000000 R09: 0000000000000000 [ 135.552001][ T6226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 135.559814][ T6226] R13: 000000000000000b R14: 00007fc1a59b3f80 R15: 00007ffd8240e6c8 [ 135.567632][ T6226] [ 135.570490][ T6226] Modules linked in: [ 135.574249][ T6226] CR2: 0000000000000000 [ 135.578216][ T6226] ---[ end trace 0000000000000000 ]--- [ 135.583507][ T6226] RIP: 0010:0x0 [ 135.586813][ T6226] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 135.595147][ T6226] RSP: 0018:ffffc90000e6f908 EFLAGS: 00010246 [ 135.601137][ T6226] RAX: 1ffff1102650cd97 RBX: ffff888132866cb8 RCX: 0000000000040000 [ 135.609299][ T6226] RDX: ffffc900017bb000 RSI: 000000000001f379 RDI: ffff8881366cf9c0 [ 135.617187][ T6226] RBP: ffffc90000e6f930 R08: ffffffff841d8447 R09: ffff8881002a6900 [ 135.625082][ T6226] R10: 0000000000000010 R11: dffffc0000000001 R12: 0000000000000004 [ 135.632896][ T6226] R13: dffffc0000000000 R14: ffff8881366cf9c0 R15: dffffc0000000000 [ 135.640713][ T6226] FS: 00007fc1a658e6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 135.649559][ T6226] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 135.655980][ T6226] CR2: ffffffffffffffd6 CR3: 00000001098e1000 CR4: 00000000003506a0 [ 135.663798][ T6226] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 135.671604][ T6226] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 135.679416][ T6226] Kernel panic - not syncing: Fatal exception [ 135.685717][ T6226] Kernel Offset: disabled [ 135.689837][ T6226] Rebooting in 86400 seconds..