last executing test programs: 20.899531427s ago: executing program 3 (id=9483): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000480)={0x4, &(0x7f00000004c0)=[{0x2d, 0x0, 0x2}, {}, {}, {0x6}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) (async) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0xf6, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x31, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xd364, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 20.740599085s ago: executing program 3 (id=9487): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ca80, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x123c02, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40047438, 0x110c230041) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1C\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000910300000000"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 20.552226534s ago: executing program 3 (id=9489): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xd, 0x17, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x84be}, {}, {}, [@ringbuf_query, @initr0={0x18, 0x0, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0x9, 0x33, &(0x7f00000001c0)=""/51, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xf, 0x7ff, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0x1, 0xffffffffffffffff], &(0x7f00000002c0)=[{0x1, 0x5, 0xe, 0x9}, {0x4, 0x3, 0xb, 0xa}, {0x1, 0x5, 0xd, 0x2}, {0x0, 0x3, 0x0, 0x5}, {0x1, 0x5, 0x9, 0x4}], 0x10, 0x401}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x4, r2}, 0x10) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000440)=""/20) (async) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)=@o_path={&(0x7f0000000480)='./file0\x00', 0x0, 0x4000, r0}, 0x18) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000500)=0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x7, 0x1, 0x0, 0x4, 0x1, 0x7, [{0xe, 0x3, 0x8}]}, @func={0x3, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x5f, 0x2e, 0x70, 0x0, 0x61, 0x5f, 0x2e, 0x30]}}, &(0x7f00000005c0), 0x46, 0x0, 0x1, 0x8}, 0x28) (async, rerun: 64) ioctl$TUNSETLINK(r0, 0x400454cd, 0x103) (rerun: 64) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000640)=r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r3, 0x58, &(0x7f0000000680)}, 0x10) (async, rerun: 32) r4 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000740)='devices.deny\x00', 0x2, 0x0) (rerun: 32) write$cgroup_devices(r4, &(0x7f0000000780)={'c', ' *:* ', 'w\x00'}, 0x8) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0), 0x200000, 0x0) ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000800)={0x0, 0x4, [@multicast, @multicast, @remote, @remote]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ac0)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x128, 0x128, 0xb, [@enum={0x7, 0x9, 0x0, 0x6, 0x4, [{0x3, 0x10000}, {0xd, 0x10001}, {0xd, 0x6}, {0x1, 0x1000}, {0x2, 0x8}, {0x3, 0xfffffffd}, {0x1, 0x6}, {0xe, 0x5}, {0x3, 0x6}]}, @fwd={0xf}, @union={0xe, 0xa, 0x0, 0x5, 0x0, 0x7f, [{0x6, 0x0, 0x3}, {0x10, 0x0, 0x927}, {0x0, 0x5, 0x3}, {0x6, 0x0, 0x9}, {0x3, 0x1, 0x9}, {0x6, 0x3, 0x40000}, {0xe, 0x3, 0x2}, {0x10, 0x4, 0x5}, {0xc, 0x4, 0xf}, {0xb, 0x5, 0x3}]}, @enum={0xb, 0x1, 0x0, 0x6, 0x4, [{0x2, 0x7}]}, @union={0x7, 0x3, 0x0, 0x5, 0x0, 0x8, [{0x9, 0x5, 0x4e}, {0xf, 0x5, 0x80000001}, {0xa, 0x2, 0x5}]}]}, {0x0, [0x2e, 0x2e, 0x5f, 0x30, 0x0, 0x0, 0x30, 0x0, 0x4fe96c614b2d61ad]}}, &(0x7f00000009c0)=""/199, 0x14b, 0xc7, 0x1, 0x40}, 0x28) write$cgroup_pid(r2, &(0x7f0000000b00)=0xffffffffffffffff, 0x12) (async) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000b40)={0x9, 0x0}, 0x8) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000b80)=r6, 0x4) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000bc0), 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r8, &(0x7f0000000c40)='devices.allow\x00', 0x2, 0x0) (async) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) (async) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000c80)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000cc0)={@map=r3, r9, 0x20, 0x4, 0x0, @void, @value=r2}, 0x20) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001f00)={&(0x7f0000000d00)="729ac3e1a4d3cea143b72c7f4cbd0d411eb4ea66a82e52357486155b4b9442aca70048c64ff1697d35bc455cb0258000b491f8b6bff7f0961f075f0b32c6accc7c78ba2311ef8fb273665fd1d97744437c7b31c9c709b3c67e4e355fa63cd2190e807dc562af36e3123c16d6a9c5ef5e5ea4fe937dbc669eb81a501ed04097a000a64752d353275ecf5ab639c592bacbb556eebd210e29dfc2fa572412b56200b2907a58cb6eb8b93fc7f2488f144544523b637c321a6ecf6c1d993788208680922a1f91d814deab795ffae7257a9e1e7faa913cb159bb256a76b8934cde0d86dd6e563bcaa8253fdd84479744a93689a7", &(0x7f0000000e00)=""/189, &(0x7f0000000ec0)="f3ca6de9fd9bb8b324f2c1f1dc", &(0x7f0000000f00)="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", 0x668966bb, r3}, 0x38) (async) openat$cgroup_type(r7, &(0x7f0000001f40), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002000)={r3, 0x58, &(0x7f0000001f80)}, 0x10) (async, rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000020c0)={{r3}, &(0x7f0000002040), &(0x7f0000002080)='%pi6 \x00'}, 0x20) (rerun: 32) 20.487099297s ago: executing program 3 (id=9490): bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0a0004000000ff0f000005000000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000100ffff00000000000000001801000020756c2500000000002020207b1ab8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000000850000000e000000850000000e00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000001c0)=0x3) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r3) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0800000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="000000000000000000b4397b0900"/28, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x25, 0x80000, 0x1, &(0x7f0000000180)) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x31, 0x0, &(0x7f0000000200)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb5", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) socketpair(0x10, 0x3, 0x6, &(0x7f0000000280)) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random}) (async) write$cgroup_devices(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="1e030800dd5c9801288563"], 0xffdd) 20.271172717s ago: executing program 3 (id=9498): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8971, &(0x7f0000000040)={'sit0\x00', @local}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3ff) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 20.239485509s ago: executing program 3 (id=9502): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x40089, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xa}, 0x118604, 0x4, 0x0, 0x5, 0x0, 0x7ff, 0xc51, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x103000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000001000000000000000000000000000000000031305f81d07d936f98a4b3ff50ba162a0000000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x22400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xff}, 0x8, 0x1, 0x0, 0x9, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 4.945018618s ago: executing program 32 (id=9502): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x40089, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xa}, 0x118604, 0x4, 0x0, 0x5, 0x0, 0x7ff, 0xc51, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x103000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000001000000000000000000000000000000000031305f81d07d936f98a4b3ff50ba162a0000000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000019800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x100) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x22400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xff}, 0x8, 0x1, 0x0, 0x9, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 1.695200167s ago: executing program 1 (id=9833): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="b4000000020000006600000000000000730135000000000095000000000000004bb5eea0a6ec9fcd4b0a008a8443f22702000000e63bde9e4a0587536a966992ae7011d6e6c03175717e9912e0dd1a59541f7cbb1548ee5bd627f5b0b8ec77bd6d5f7b543f9aafaabe53339b12fbbe7decc4aa61b8aad0359083bdd61543fbeee8d560bb4b5925fae801f4c91e31674b124a1b38000000bc4da4a9b3d5cc9e0000f6a7a729009973ff07000000000000ac79e5d84abbec7d96629490727375b853f6308a980fba61fbe0131f3c7a026d8f000008000000000000000b20d7ac2df89d7989bf53bec908213d396edf24e9fc3cc004a1097fddc65c1b1b328277ff85ed56b9261eb7bcee28ec2d3616689ab3f31f849eebce6f21e6302003c0467844e000000000db0700bd694a09b253a1c6c7c138b3ec6ee9b83edcc55d3403acd5c50e2740a7ab7069790da79b7ab45184caffff00009bab066bf7a4ab148d44c7e2e4d219cdd7ebeb51511d9df85a648b1b85f93cb6cd21f93d5ea3da2b31657c065d052d9b9ee00320def97ebac25b929b3c15e33be6e7d54e622b427ee8d181d2f18d772fb5c58a936620ba1f5fbb48703ab211f442697edc165b449db2e3c221fbf270a6db414516949b97c200000096a1cbe81a38a23f03bd741a3e60c2e294f828e06f1b2cb70328f151f949e369efed52a28b87aae9d7d2800c8eff7f93c05adc9086d3f143a7b87d06838c6525cafdc01820a8912a131ff1f6acb9439f2d95a746291641b38333ce1c84b0d9d033edc9da00c8a2b42e8adfeff69fce7a35f79748e3e5b235269310988a05bf7c4e4cef3d1aa550c83d6328eb000000044a6458c31431d58973c93f5e9452258a7098bc3d014afe638a40948498fa9561213bc20845526e054d6b3ba5ca8f357df67c41acc28edacb31d38994544c3511ea1e8a448e66039425cfb03efb5d5eb81a306746adb8809ef969187763c00085e2dc401325327e54cbfceb400c2663466cd4a79c94b62c9882626499a8a29c564464f2a7aee6a929f831c93d23005787d272b5eaf0c6e11a7f0f1f39f68df44f6bf2d9b51d99c89e327b4bf7b96ad33abbd3a8b5814b5e7f85d1a47ee604ccef20bda53c9ce06910568fc200eee12fc6ef2734a6e9af5132f0c507e277fd97f9b48c840697289d38e454467f4d2f94b2f76d06edd083dafefd76deb251b5818de9c27d0df6e7b8862fe42f6c453f551f35b6d76395a1d205f276ae628fbdb8081905a1d7c2805532d3387b88f2997e8ce41c5dca83659cfb7f3a1c7b2bec8a7575dc4241dde6c680ee9a27b197739f4ad86f3bad3e42d4954bef864586ad02c27858d63efc495bcfb6ed49a5ca8987b0f2a8b14054e30f30fedf536d63769a196fc3b472195d0a1a13ecf803136d751cefb0edb5794cab8681214b39f86d88f3aebea4d465ef05f975b09f264d6c8d8e3bb6ea7d21c6602bcc8f76f2546cccc074f55c22aa8b502968040000000000000047c8a50036dd268a1aeff951f5090492b5e941feb1d3785aafe1655876e5a36c40fb5afcfd1eb2895266d1aa3de0c06bb7dc27cf1a546b6aa6ce9932f3c6a013bc3791da4d8a33680ba8f1334d75a43e991ebd4582d786ec05cdd3152d52ab15fc7595cbd339f730d2ec8e37e6c500c4c30280a6af986f62a22d9c5c275e7798c165545abfcd304243274db15924a136a0896d56576ed7de90b1bda90f4024b9a0b3b33f688db8e38f784ae3942aba874f95d10c47e2405ceb0438cc272133fac718a6553710e4ca97df646b21d02652c54eade2e99344e11a2671cf274d397650fba8fcfb7e51a926e37b3980a1732111175dd99b9d979042b3ea411a7b4f9081ae9b82974d5eb6fd4e4bcd95e4f897dfba4e44777e6d02a896b650a66d9139696b926c36a33eb3bdc092bf4586bfab34002f802bbfe6a7679cec20cc25e01f129bbe92a65961fac7bffa3d8feda2ac927743d2bce57ee39b671948576337535180aa754e035421cf1709bc1b5e46c35515fb1fcda637a6405e9b216d2ca09795c5d2f27665da5b17bcf0f387e6dd58202a3a1148e46e55ac7ea027eb3022eee4a000ca543ab566921e5db4f741a762e5705f942855a9fa30b912045f78ab1e3fdeada84bc8ac36cc1223901e56f6ecbabbc3263098c9c47a1f505a8299b5715a455e834ddddc430f387cafa07bf915522f9a42e34eea5169b796320e892d27924045bcf56135684ca96ada82749371d5766c0d0cae8772f140eef001ca39dc28aef8a5236393fce29b0531cbd3265c209761ed41a2e473fbd84ca9b67e3ceb58a4b774ee127628faba8702c0a73f8311d269429aaadf74c439404fc9f864e69807dfe257c0c4a26c60bfa77f89bae2bd4c498a10d4e17dddb1f7539bfeb392e22e7b93d0ecf66cd253a4062bbc8a437f8924ee7a89ab73dd7c11be13707482c369f02d7b6f242599f95dbfcb55bea158665231f8fe04ed2a8c407fed1a8702e2486386f2ae6347231128be789186ff5651208c80781f85d3fb51bd28b939a8bc88a471c36fa17fd04c3fbdbd3f7bf144b1466014a77c582aa0380e612cd101d557dd1e5b7bae3da3ea2659f66a3641eaa3b008b9788a63c8f7009f9149fd9c740eddd300000000000000000000e620e3657ac82a5bd27dfa4f2add31a402346571e87b2644edb73d4affdcbbe2b8e2539b44554c10dc0ac8ba67ab9901c8e9564b4c26a87cf59b11978a86d4938ca4db017f3b5744b5a4f813fd7330000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f0000000080)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x50}, {0x6}]}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32=r0], 0x14) 1.613211841s ago: executing program 1 (id=9837): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40305839, &(0x7f0000000540)={'macsec0\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x1e, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="00000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000182a0000", @ANYRES32=r0, @ANYBLOB="00000000305e0000309804000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x20, &(0x7f0000000240)={&(0x7f0000000600)=""/131, 0x83, 0x0, &(0x7f0000000780)=""/124, 0x7c}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x18, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007b000000850000004000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r1, 0x4) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socketpair(0x23, 0x6, 0x7f, &(0x7f0000000080)) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x5, 0x0}, 0x2) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="15000000202000000000000f", @ANYRES32=r4, @ANYBLOB, @ANYRES64=0x0], 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000047020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd6372ce22fdb911"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r8, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) 1.172560913s ago: executing program 1 (id=9844): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, @perf_config_ext={0x0, 0x1000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x5}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x6, 0x80, 0x0, 0x0, 0x40, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000002000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x66) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x813ad8760df92fef, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x1010000}, 0x10}, 0x94) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x1886e5ad6ab3e97, 0x0, 0x0, 0x3, 0x0, 0x40004, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x400}) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x24}, 0x94) openat$cgroup_procs(r7, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.158451334s ago: executing program 4 (id=9845): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x24, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x11, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0x57, &(0x7f00000001c0)=""/87, 0x276eee1aa55ad17, 0x35, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x6, 0x6fb, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000740)=[r2], 0x0, 0x10, 0x80000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005e00000095"], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r0, 0x58, &(0x7f0000000840)}, 0x10) 1.087083577s ago: executing program 4 (id=9846): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f00000002c0)={0x5, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, r3, 0x0, r2, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f0, &(0x7f0000000080)) close(r6) socketpair(0x1, 0x1, 0x0, 0x0) 967.295753ms ago: executing program 5 (id=9850): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000000)=ANY=[@ANYRES8=0x0], &(0x7f0000000480)='GPL\x00'}, 0x94) 965.197713ms ago: executing program 5 (id=9852): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0ab0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c061c6238975d43a4505f80e39c9f3c530cf08e467b592f868ee3caa435df0a0e8c1bf176db2a6b2feb4b77d3d5707bfd2d84aaa3b1d4e984c46ea7e2b347a36f5662403e1b2be4284322a4908ad10b97163c066d0e196bf02f46c7953ab1abdaf9de9ca3c00cb9bf4e418d076feafa22f0610a70f2bdf4000200000066b60d00b0c2c1254f0963f63223b7b80197aa3161f45346b100000000000000000089e399f6609876b5887437a172ebc02a740694298b79dc194e533583412dff048fc21f28bdd3e26a1a8a0481e9f0da43bb6ca66e2f55a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a367c24a9fb2a6991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3b404984e1a2c6e94bd0339454c13ad3c328a182c15dc760a3000000005dc2ed0e0b29e98fa883c71949a34d84030323e3d54f45b29d27643453ad9211e3550ee5520211d9370175133f260c6882a146880b9387f1beb5418618bc83a3becf9bb57da7ba8b913c685fc6700848dc6665d73248c1f74e08ad04ce903eaf32706e0000249a028044ede964362cfb7830a246c3b2f60000fc4deb8eda1368b0960b8d69bd99c64893d44f962526528e7e541c903869d96989b9a986620cb2c95c83f2a082c52764f49e51188f9418b01bcd8ae164acdac95318ec8b2c6feacdcf4b528e5e582160ed048c46e1dccca85bfa1d67c83795eae2d31968c055d325a9c794ef88b30c2de4a274878b73c05ffa88b7033be648b12bb1fee58b58d6a6f31bfe568215dfbde59dad00008a73b40f09cf018cd496b36050d70c28f76749262e33e16429a6da35ceb1a989de81c3f8b8bc3a4763948a1cbc10348ef2ac3781b847611fcb0a26acafdd6d9ab05865fcf7c493d8f8cd344a1d470ca0d6f16ab0293774b5509fb0e7113936d59d5a60dbd84a938476adeebab9ff44f531bb81c53f16d80f51006cbc71570a5e272b223425e09dc6b6cc1fbc455a64fd449284f71761092a0342000000000000008a05d36fd9b814b4292745418c92d944763a4bf5e138d810e29a31f08f7dea7762d28484e15dc4320e4f85c16a8fbffadf8214d6d24cabe17ad4135d8872935ce0e6a468fd20fa4461d1d600234feac6eb4f046f2acc1b0efb4438abddcabb4e4e72a450aab72b589bec83bbb688e659fb426cb43d0ee993516fd4e867232cde69b6ffad447dcd92e0ef8234ff850ec3948dd1fa7afb77d951fe4abf618121b7894c1044ef221973432ccc7e62b151eb898a01010a7ec5acd0a5dcb2de443880ada682515d1da9a3048744acb44384d1591df789883c0560495cb0cb32283529926d25e5c7f4815237c3aa356217738898a16ba603439f6eaad8e70b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x4, 0xa, 0x82, 0x140}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000080), 0x619, r1}, 0x38) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a00000084000000000100000100000000000000", @ANYRES32, @ANYBLOB="00000000fdfffffffffffffff62e2e"], 0x50) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0x4) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0ab0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c061c6238975d43a4505f80e39c9f3c530cf08e467b592f868ee3caa435df0a0e8c1bf176db2a6b2feb4b77d3d5707bfd2d84aaa3b1d4e984c46ea7e2b347a36f5662403e1b2be4284322a4908ad10b97163c066d0e196bf02f46c7953ab1abdaf9de9ca3c00cb9bf4e418d076feafa22f0610a70f2bdf4000200000066b60d00b0c2c1254f0963f63223b7b80197aa3161f45346b100000000000000000089e399f6609876b5887437a172ebc02a740694298b79dc194e533583412dff048fc21f28bdd3e26a1a8a0481e9f0da43bb6ca66e2f55a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a367c24a9fb2a6991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3b404984e1a2c6e94bd0339454c13ad3c328a182c15dc760a3000000005dc2ed0e0b29e98fa883c71949a34d84030323e3d54f45b29d27643453ad9211e3550ee5520211d9370175133f260c6882a146880b9387f1beb5418618bc83a3becf9bb57da7ba8b913c685fc6700848dc6665d73248c1f74e08ad04ce903eaf32706e0000249a028044ede964362cfb7830a246c3b2f60000fc4deb8eda1368b0960b8d69bd99c64893d44f962526528e7e541c903869d96989b9a986620cb2c95c83f2a082c52764f49e51188f9418b01bcd8ae164acdac95318ec8b2c6feacdcf4b528e5e582160ed048c46e1dccca85bfa1d67c83795eae2d31968c055d325a9c794ef88b30c2de4a274878b73c05ffa88b7033be648b12bb1fee58b58d6a6f31bfe568215dfbde59dad00008a73b40f09cf018cd496b36050d70c28f76749262e33e16429a6da35ceb1a989de81c3f8b8bc3a4763948a1cbc10348ef2ac3781b847611fcb0a26acafdd6d9ab05865fcf7c493d8f8cd344a1d470ca0d6f16ab0293774b5509fb0e7113936d59d5a60dbd84a938476adeebab9ff44f531bb81c53f16d80f51006cbc71570a5e272b223425e09dc6b6cc1fbc455a64fd449284f71761092a0342000000000000008a05d36fd9b814b4292745418c92d944763a4bf5e138d810e29a31f08f7dea7762d28484e15dc4320e4f85c16a8fbffadf8214d6d24cabe17ad4135d8872935ce0e6a468fd20fa4461d1d600234feac6eb4f046f2acc1b0efb4438abddcabb4e4e72a450aab72b589bec83bbb688e659fb426cb43d0ee993516fd4e867232cde69b6ffad447dcd92e0ef8234ff850ec3948dd1fa7afb77d951fe4abf618121b7894c1044ef221973432ccc7e62b151eb898a01010a7ec5acd0a5dcb2de443880ada682515d1da9a3048744acb44384d1591df789883c0560495cb0cb32283529926d25e5c7f4815237c3aa356217738898a16ba603439f6eaad8e70b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x4, 0xa, 0x82, 0x140}, 0x50) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000080), 0x619, r1}, 0x38) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) (async) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f00000002c0)=r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a00000084000000000100000100000000000000", @ANYRES32, @ANYBLOB="00000000fdfffffffffffffff62e2e"], 0x50) (async) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0x4) (async) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) 963.813613ms ago: executing program 4 (id=9853): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="01feffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030001000000000003000000f4ffffffffffffff0000000000000000"], 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) sendmsg$unix(r0, &(0x7f00000001c0)={&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f00000002c0)="d359c340e4c071b9dcdefc88b2402b9037bcd98e5ee2b7b0c08b8eaaef016e8d0ffcbe1e94d2211c5b391824bfc73556ae055a4d4055c44ec8bed707f250c66a6a87dde9f87ea2137b505becd67541154d0aad07574204f26f693418465774b3413359cb28ac429fc963cdc0dc8e838280a8e2595a3ac9f5447ada91bab6570aba6854f1e4ca2784a16e8b13617d89801ae5a203bab8c24e278d79f77fc46c74b837a11cedd01170942cabcca12b945e5cb5091f31af2970a1d97c8bd7cae9ef982379bb808f53f1b1b53d46d0da9f5b57d0df670992545bef87da2d50bf541e9594c0100f45ce484d775c9a", 0xec}, {&(0x7f00000003c0)="4043c2d5e6292fe10c00dc4ea8bdc3c04009d0259d31cf3a5deb73510c80481260415ecc133011b57e874e38a44707154c1131dfe561827af548fc03727b2792b6ae383e7cb08337eb5bc19b177eba3e263e4237d994f7fb785efffe81955a851f9c50bcc420ca3ab0ebdcaa1d3bbcaeac8bf55709f3814359f9f24f2641203661d3971c9ee7d709fd88006b017ff3bf40b8976a137d8c10f13d3da91b0393df8d84762c", 0xa4}, {&(0x7f0000000480)="e3c0bb5b92db14e186ebe24d1c34c8dd6217e31ce62e53d6839c4c65d776ee0147576e41963da837bde765f48219b5573047799567b0739aa81fa9e327d68d29753db6c61f0b59c7615d0691b2817eb5f80d45633a0d65b779ed568652759ebce64e6451e90517e054f364706cbaf29947e45a4f663fafd18302bf987c7908d6b775021ea7e55180fe8c818cdf63ad368fde2e628e4c3d5e9ef655135af9539743f3330bba00"/175, 0xaf}], 0x3, 0x0, 0x0, 0x4000000}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x404000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) 912.471986ms ago: executing program 0 (id=9855): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x101}, 0x50) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000009500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=@base={0x12, 0x2, 0x8, 0x2}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='\a'], 0x10) close(0x3) close(0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000000000000000000000000009500"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000013c0)={0x1b, 0x0, 0x0, 0xffff1383, 0x0, 0x1, 0xee80, '\x00', 0x0, r6, 0x1, 0x3, 0x2}, 0x50) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r6}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r1, 0xe0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001140)=[0x0], 0x0, 0xe3, &(0x7f0000001180)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000011c0), &(0x7f0000001200), 0x8, 0x72, 0x8, 0x8, &(0x7f0000001240)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x16, 0x1ff, 0x10000, 0x8, 0x80, r7, 0xfffffffc, '\x00', 0x0, r7, 0x2, 0x3, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r8, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r8, &(0x7f0000000a80), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 905.178596ms ago: executing program 4 (id=9856): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x1e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xe7, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x88541, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)=r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'veth0_to_team\x00', 0x700}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\xe0\xff\xff\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)}, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x10eda2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r6}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x15, &(0x7f0000000040), 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {}, {0x3d}, {0x6}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='memory.current\x00') 803.296071ms ago: executing program 2 (id=9857): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'syzkaller0\x00', 0x9d12}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000100)) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)=0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x2100c0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x1) (async) close(0x3) 803.079431ms ago: executing program 5 (id=9858): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000900), 0x5, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000500)="818a77", 0x0}, 0x20) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001e80)={&(0x7f0000001d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/154, 0x1a, 0x9a, 0xffffffff, 0x0, 0x10000, @value=r1}, 0x28) 709.937055ms ago: executing program 4 (id=9859): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101c01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f0000000380)) close(r0) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 640.261348ms ago: executing program 2 (id=9860): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="61104000000000007a000000000000009500000000000000"], &(0x7f0000000280)='GPL\x00'}, 0x80) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1}, 0x50) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x2, 0x300}, {0x6e}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000001000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f00000003c0)=r3}, 0x20) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r5}, &(0x7f00000000c0), &(0x7f0000000100)='%pB \x00'}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x8, &(0x7f0000000180)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 639.711029ms ago: executing program 0 (id=9861): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000f9ff00000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000140000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4810}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000300)={'netdevsim0\x00', @multicast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd000, 0x0, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0xfffffffffffffffc, 0xc5103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8140, 0xc9, 0x1000003, 0x1, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414"], 0xfdef) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000150600000fff070067060000200000006a0200000ee60000bf050000000000003d350000000000006507000002000000070700004a0000000f75000000000000bf54000000000000070400000400f9ff3d53010000000000840400000000000073720000000000009500000000000000db13d5d8b741f2cdaabc8383caf56b8c2b84a8d09535a157f9005bd38addaa65b925cd3ded25b8b9e2a095d2c51ef45c5588ec78c7f32946b17cecfe54c53ab530c58b67851b7e0e82452a083b98a6aa766401047d150203b0417edef332233b081df18961d6822d133bf72a4de1c2ea17f04537fc211576846ac629d1d93265ba4580047a9dc88de358ce795731891a2031de4e09740c64e5506f991ed4785a9773a433e0db9c1a7d4ab9d658ce9cfdb4db3bed62bcb2bc91ddcdfadfe6d4421c49fb6641cbf56914e76702f673b586c767562a90a3967093b000e3806f825f1d0da2a304e06543b56d35235d78b7a7fe912971aab876022e96f5143b6234f5a6b701690b07fb664a44e22b72e843e7cf55f394cf75d1cd3ee79a25fb98cc45b3fde43e42e150d4a2fddd9a97677400ef0bd697d135324ce480c2960344de346bd511dea4ff7a07400b2d12dd1a8c4c300aee5f948777085ca142b79dfc3aca5fadaa0532ab0572169f68584ff2ee063bc7e75ecd5cc8973464629ba236e3ff97f6033d0800000000000000cef54a60aff12590a50ef147e3e640193d00263003a4ef412420a070dd0327e47c8c7abb77b4b53874788d7e2e5d554de4713db957afb56d4673f1b904c5a317d3670003000000183fb7d36e173044080034"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffa0}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5e) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x10001) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd"], 0xa) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32, @ANYBLOB="00000000000000006100640000000000180000000000000000000000000000009500000000000000950000000000000038604b707eceebb696df76990000000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x1400, 0x200002000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 553.541833ms ago: executing program 2 (id=9862): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x2000000, 0x4, 0x0, &(0x7f00000001c0)="5cdd3086", 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$ppp(0xffffffffffffff9c, 0x0, 0x100, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x0, 0x9f, 0xd4, 0x0, 0x0, 0x2010e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x4, @perf_config_ext={0xead6, 0x8c}, 0x806, 0xc8, 0x0, 0x4, 0x400, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40002100) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={r3, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0], 0x0, 0x9d, &(0x7f0000000c80)=[{}], 0x8, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xd7, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) sendmsg$inet(r1, &(0x7f0000001000)={&(0x7f0000000840)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000880)="aa2fad509e596c4ba06a8a9a663019e8459b843ce01ed60a25f13c91997957c031dc9dac635687898a1f13822d4cedad6ffd85da631df14a1f58b677c27028899ee137f08996cdcd813c27b8480720c698a093ad84df4b4366bfa818b634d995d7ff3a7f88a600e900f0797207335b73e5d9f11d6aa172347195b25e3778c13535d7ceb661f811da25f69ffb86c831aa5782c3eb34be3c6df0820ccd08bc7147db7bd3ca54a80434377ac8bda05ddfe141d027d08823dbd5112c4d0a683d1d314bdc925ac41328", 0xc7}, {&(0x7f0000000980)="8015c957fac261e567a1f4efcda8a20c37125e3b744653581224cac6dd9869ce", 0x20}, {&(0x7f00000009c0)="d7b60e13c8047c12ac2ba64798f3d87cba759ee4b2829a16502f1daac2088e6db56c1a003c475b", 0x27}, {&(0x7f0000000a00)="865506a92a04db846fc3c72754edf15759a252822b6871a8d3cc48eb4c45d29ab0bbcbf1a539858e15ff8c7609614531b4004a10f256828392", 0x39}, {&(0x7f0000000a40)="5762aca70c6dc81390b1a29225a4d39967263a6f0bafc0cf60382f7f71546c92c3ba1215b4de2c6c5e2f97ecd7458d468cccef27bd6f9386424bac7da02588847a1b3eee9c65768b90fe2e8955629d9ab3c9ed6a9587014be070218fb1f80941c5a7222abe90a3bc09bdf24c4d54ee0e38f7cd856bae204feb4f47db1dc68c5141fdeca9c052d41fba4804639830bbb0a2d7f7cb5860daec04f043cb8db152ebc96bb488ba", 0xa5}], 0x5, &(0x7f0000000ec0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xf07}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@cipso={0x86, 0x31, 0x3, [{0x1, 0xd, "6cb2796a5d1bbbdc22365a"}, {0x7, 0xc, "cc9f633aff6ae27d4e1f"}, {0x0, 0x9, "94eb5801b2ebe4"}, {0x2, 0x9, "f8854d1ce6ed5e"}]}, @timestamp={0x44, 0x8, 0xef, 0x0, 0x9, [0x4]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x401}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @initdev={0xac, 0x1e, 0x1, 0x0}, @local}}}], 0x118}, 0x4004000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='GPL\x00') r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0xb1, 0x400, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001040)={0x0, r0}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001080)={0xd, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x3e88c110f387cf51, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @value=r7}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000300)=r3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x27, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_fd={0x18, 0xb, 0x1, 0x0, r6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @call={0x85, 0x0, 0x0, 0xa6}, @alu={0x7, 0x1, 0x7, 0x8, 0xb, 0xfffffffffffffff0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000600)='syzkaller\x00', 0x7, 0x32, &(0x7f0000000640)=""/50, 0x41100, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000700)=[r6], &(0x7f0000000740)=[{0x1, 0x5, 0x9, 0x2}, {0x4, 0x4, 0x5, 0x9}], 0x10, 0x7}, 0x94) r10 = openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:'], 0x6a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r5, &(0x7f0000000a00), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711813000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 434.844459ms ago: executing program 2 (id=9863): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000d80)=ANY=[@ANYBLOB="18000000ff7f000000000000060000008500000018000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x20, 0x0}, 0x10) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000380)={0x1, 0x3, [@broadcast, @broadcast, @random="89e3214186ca"]}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd"], 0xfdef) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xffffff00, '\x00', 0x0, r3, 0x4, 0x1}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x10000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x6}, 0x2c) 351.058113ms ago: executing program 4 (id=9864): bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000016000000b40000007f"], 0x48) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0xff, 0x9}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9a}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f3, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f008004de7f9c764360000000100", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1980, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230004) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300001a930000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) 350.383193ms ago: executing program 0 (id=9865): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) (async) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00001c8834ff"]) (async) socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, 0x0, 0x4040014) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80000e4) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000000000000000000400000003000000000100000601000000000000000000000d020000000000"], 0xffffffffffffffff, 0x18, 0xb1, 0x2}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="b702000000000080bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e240000000000004504040001ffffff9404000001000a00b7040000000100006a0af2fe000000008500000078000000b70000000000000095000000000000009e17f199a68b061b93d83298a8cdda1ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97ce8df1bc9a0c4eeceb9171e43405d621ffbc9b0d8ca56b50f0c010d631f6dbc8486bc5d5bf2ca8285056892db03cf1c62dd7c08a90b189d190c341035de53a9a53608c10556e5734eb84049761451ce540c772e069f80cb201b2de17dfdb4b60939d5d6aed4062049b87e03e2cd18568136207304e26f7fcc059c062234d5595f6fbaa187b81d1106000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61bd99dc89f12907af7dccd106cb937b450f859ce8292a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231a2d73148be428ba953df4aece69311687f4122073a236c3a32efa04137d46f0247d2638da3261c8162bb7c7824be6195a66d2e17e122040e11001131ce319045e5b3334e68475ac3f46aa2837f9004600daded9b19b35eebe52613c346e255421b23a278fd00004270b1cd5fc9aa2286ccca37db965d9dd366598f5ec993cb0cf127e2a46cfbdf63eea190d86a4d1b75ae98480100d33128954a7d093a54f7e75b3753508ca3c41685d1e407315e59d626c23b3f89a926e9382966853774e7dd1f1a2177cdf2802237c177d543e8da47a01f05e117e53518270239b69c117e2637c31085f4d8a596b6edab26afaf6605b231199f38a6fc7eb83714387450ea18eafbace8eec18a4b2c442e7b88a7611c1283bec84e1715fb9f4fcaf52c08058fc4f21c0ad71adabdd850aed3feec6eaab347bdf474e17b9aa345d1e6e3bb83f90230bdf53e7d0e5c3f914d905422b83f30936674ba8f0bffaf2305c0972df71fe5f4e01506471e897bced7798509e64df360d95f9a4099f864b0ba45efbdbd1d9db21a1d5c065567fd70aae68096827fa5c2d9bd20292344c7dcf6241447cfbb05b5d0fdb4e08afbac5397b64aa369922ed7ed8918f97294b6854210d2b93aaf92159dbaa2f186d4a420c68d6baf1c31de4f0bf478bfd51bb1e96ea849a80ae5a89be7e38474c7aade344d68324f9e12a6b9770e6bd12ae69efffaee58040753701af84c2924c1b5aea1650f42c9ae9820a33095f062fb88313d035ea405515a61a4be64f9fa0985c5be592090cc48291004609fdac2ab6100000000000000a84570c7c00d647daf8af334050b61e9b2d3f0adad1d1ff47be19b8da2799e9ecef8efabe73f92dbd0760f8bbd9c710bd1371e2b5d9a2ea2190f5e4f5cd641cdfe5d89f84a368ef7e6ff1eacdc0ec9e97b8f9c9e314661ea0aa8a104008d188b66b3a4aedeed9df4238a08fc2fb1007233cc2c87fcaa0cccd8ec03444471c1dd660c73acc17bff740d199a7c0c52c63c0408b5158e0000000c275eedb02f141113cf2c55b2c08c2c68cc99d2bb5840fba332e1c82862ec9b90104c48e41d32a47ac94ddee815dba8aeb5d3121cf247a81aef7805b020e9eec44cbe3055be69fe066824ba2292b9cdce41635fc00df96fb10a3a8cc60c4a76c65ebbb0640e0a29de94edf5cbefac1c5fa96e7080af804b22cabce10ea52f1018527f4aa39cdafa3eff63de2a7f50d042667820f6f86f276afb2b81da301e031351ee13013137e9d5cec0c84d7e3f82c6fd12eb98f9ea654bcb9ce59a2015183c6e65bb0537e611b830d74c30fb8207fca0990acdbb51e4e234026e00000000b3ebae3eb52c140953a350fcf0124b1a30b1afc29ea56f8413686d912eb8118d73ef9c6d3843ebcb555301c0205dd3040000002e334319c8979c322e92fbc2c400009f2404b941553843de114fdb03c19d606bd760c40f7f28360820b82d548198041562bcbd9edce223b54cf3c35823f3c446f0a20160ac181c96606dbc967673aca98d6f5637b20fd2809a29ea5e40139a19415f7fc5d852209bdfed74008651752b5e052412d3e00a44417b7caf91a173925a66ee6e30723e73f3b7d66d2a5d09ff40c0bc6e7a5cfef7f327018578892a23014c3629f2e41af619f0d9f0ec8d551415051ff94391c03f3501c928ed7818af61729278f84d4730ef28af4c202e0f175e2a5cbddc8b973e2701b33f1b963025220c04817010b6fb70"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) 348.089673ms ago: executing program 5 (id=9866): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0x10, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffff0}], {{}, {0x5, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x75, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x89, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000180)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_val, @exit]}, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x0, 0x1010000}, 0xfdeb}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x14, 0x4, 0x0, 0x8, 0x100, r0, 0x8, '\x00', r1, r2, 0x0, 0x3, 0x3}, 0x50) 337.371534ms ago: executing program 0 (id=9867): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x3}]}, @ptr, @restrict={0x1, 0x0, 0x0, 0x4, 0x4}]}, {0x0, [0x2e]}}, 0x0, 0x4b}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @multicast}) 321.404624ms ago: executing program 2 (id=9868): socketpair(0x10, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a0000000000006111700000000000180000000000000000000000000000009500000002000000"], &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="19000000080000000000000009cc0307fbd28100000000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 307.809395ms ago: executing program 5 (id=9869): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0xe, &(0x7f0000000000)=@raw=[@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @tail_call], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x1f, &(0x7f00000001c0)=""/31, 0x41100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x7, 0xff, 0xffffff96}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[0xffffffffffffffff], 0x0, 0x10, 0x5a}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@map=0x1, 0xb, 0x1, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000680)='$(!\x00', 0x0}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@fallback=r0, r1, 0x0, 0x30, 0x0, @void, @void, @void, @value=r3, r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='syzkaller\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x94) 238.505929ms ago: executing program 2 (id=9870): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000014000000000000000000030018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000008807b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000810a00007b8af8ff00000000bfa200000008000000b70400000200000085000000820000009500"/72, @ANYRES64=r2, @ANYRES8, @ANYRES64=r2, @ANYRES16=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x6400, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdfe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x425}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000480), 0x40) socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000600), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0xb1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x1}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, 0x0, 0x4040014) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x80000e4) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000004ffffffff000000000300000000000000000000e7e6000000000000000000020000000000000000000000060000000000"], 0x0, 0x56, 0x0, 0x0, 0x200}, 0x28) 237.468589ms ago: executing program 5 (id=9871): r0 = perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4fffd, 0x0, @perf_config_ext={0x9}, 0x0, 0x7, 0x0, 0x0, 0x768, 0x0, 0xfffc}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'ip_vti0\x00', @multicast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x6b, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8400, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r6) r7 = syz_clone(0x80010480, &(0x7f0000000600)="12213a21ddd75207a26468586c4b1d989b3d854c3910906932f99c77b130c50be7fe3bbba64de51df085785cb88c2781ab306fe0d59d18fd6d5689650a8a35ea7f432e4295a034dbee477198f255349ca2021e14f6b4c8f5fef659196755e33e1a8c1708eb5690aa7d0d6f8dcdefbb8667b3cfdf8dbf8e91f6a152b9e9b50aeecb38ea3d8c8b33f1696c815b18aab04df7c18289141d0ad98d370c350179a2befe9831ac279ece3a0b6a5efbf910d96f2b5d481c6a2b96d6e6c1bcd43dafefce1ed44e039c60891e6ad5b992d68e124b12cd8904", 0xd4, &(0x7f0000000400), &(0x7f0000000700), &(0x7f0000001040)="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") perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x5, 0x6f, 0xd, 0xfc, 0x0, 0x3, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000003c0), 0x5}, 0x100480, 0x5, 0x5, 0x5, 0xbe07, 0x7b, 0x15aa, 0x0, 0xd, 0x0, 0x3}, r7, 0x8, r3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18300000034f0e61000000000000000004000000bb7f1a007600feff000020009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) ioctl$SIOCSIFHWADDR(r6, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random='-\x00\x00\x00\x00\b'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') syz_clone(0x20100000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x6, 0x0, 0x45, 0x0, 0x8, 0x201a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040)}, 0x10000, 0x38, 0xfffffff8, 0x3, 0x5, 0x0, 0x80, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r8) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 236.814299ms ago: executing program 0 (id=9872): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x20100, 0x0) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, 0x0, 0x2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x52) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000640)=""/162}, 0x20) (async) bpf$BPF_PROG_DETACH(0x8, 0x0, 0xa) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000380)=r6, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r7, r5, 0x4, r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e00000000100000050000000200000000010000", @ANYBLOB="0400"/20, @ANYRES32, @ANYBLOB="03000000030000005d00000000000000"], 0x50) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@ifindex, 0x1d, 0x0, 0x8001, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x0}, 0x40) (async) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup=r10, r3, 0x32, 0x8, 0x0, @void, @value=r4, @void, @void, r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x0, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x80000000}, 0x10}, 0x94) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r8) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 221.399469ms ago: executing program 0 (id=9873): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000002000000310a000008"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000900), 0x207, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000fc0), &(0x7f00000004c0)=""/49}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x5}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0a00000084000000000100000100000000", @ANYBLOB="00000000fdfffffffffffffff65f5f"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xb, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000800000000000000080000006b110b000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000040)=0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000006000000080000000800000040000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000b17aa2d7ee30d3ad69e800"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 195.81266ms ago: executing program 1 (id=9874): socketpair(0xf, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000100)=@xdp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/165, 0xa5}, {&(0x7f0000000000)=""/17, 0x11}, {&(0x7f0000000380)}], 0x3, &(0x7f0000000400)=""/232, 0xe8}, 0x30122) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000043df47ef004000000040020000000000000903000000000000000000000105000000080000000100000000000007000000000000000000000003000000009b3b6e35af0ad4050000000000610000000000000000"], 0x0, 0x5b}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x4003, 0xffffff00}}, 0x10, 0x0}, 0x4040005) 115.079944ms ago: executing program 1 (id=9875): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xdf}, 0x10020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r2}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800007d0b9563cb00ff070000000000000000edff84308296220000001801000064775bdbfe0fb056c6edd46c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095000000000000003da61e3de5daecc5085f7b2676e5babfab0a6bd17a582b0e720fd137315e15f230178e05858910dd1b8b6a5ca7f12349d6532b28e950f679831bc5fee40adc4e8d39235933bdec068fc0d176b2a753e3f6b021371c9e63fb"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15004dab"], 0xfdef) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x306) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000a000000040000000000000804000000000000000000000a01000000060000000000000e020000000100000008000000000000070000000000000000612e5f002e"], 0x0, 0x56}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 0s ago: executing program 1 (id=9876): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d0300000000000000030000000000000000000001050000002000"], 0x0, 0x56}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d0300000000000000030000000000000000000001050000002000"], 0x0, 0x56}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) close(0xffffffffffffffff) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x410, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfac8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfac8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ca80, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x123c02, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, 0x0) (async) ioctl$TUNSETQUEUE(r1, 0x400454d9, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047438, 0x110c230041) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000001f40)='lo:\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1C\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\xf5\a\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'5\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\x06\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5\xdcZ\xb9\xd7Z\x88\x9b\xdff[\x90\xfa\x9a{b\xf4Dq') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00"], 0x48) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="000000009c23c9cd0000000004000000000000008c5d9c6d812859c7db6c161de456836ed3ad85bd9f75c91b0ab05a8604bf5023652cf6a19007c2a43e4c723a9d5a96cdc259c133d79e3f7c7aaec9943f2c064606e49062aa032fbf364d117f1b13d04538e6e886bd1c9866a1d41dca46a62a44087a67f257f95e270db5d27e5cb46450d0d64ddfbeb32e543ce79f549b2a951fb30084e05e89484e39a8f733b109d17206a2892b12a4aeb5f5890108935e61f4bbd154957ecc8274f11f0b265c703b86166d51da0010d13e283514636f91d5ad39103f7b384284b49df4f31de6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="000000009c23c9cd0000000004000000000000008c5d9c6d812859c7db6c161de456836ed3ad85bd9f75c91b0ab05a8604bf5023652cf6a19007c2a43e4c723a9d5a96cdc259c133d79e3f7c7aaec9943f2c064606e49062aa032fbf364d117f1b13d04538e6e886bd1c9866a1d41dca46a62a44087a67f257f95e270db5d27e5cb46450d0d64ddfbeb32e543ce79f549b2a951fb30084e05e89484e39a8f733b109d17206a2892b12a4aeb5f5890108935e61f4bbd154957ecc8274f11f0b265c703b86166d51da0010d13e283514636f91d5ad39103f7b384284b49df4f31de6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000d8b5d156e57af0069bb9401bd206000000d7fc9d2c7539e847fd362320ac687e47df4d3eb3bd12d609310ec531c53e8684bc52c80928978d07", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) kernel console output (not intermixed with test programs): ec0 entered promiscuous mode [ 256.265607][ T24] audit: type=1400 audit(1773824534.280:176): avc: denied { ioctl } for pid=12869 comm="syz.2.3684" path="" dev="cgroup2" ino=452 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 256.758368][T12908] device syzkaller0 entered promiscuous mode [ 256.921512][T12909] device wg2 entered promiscuous mode [ 257.588966][T12946] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.643583][T12946] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.650672][T12946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.397662][T13003] bridge0: port 3(veth0_vlan) entered blocking state [ 258.432651][T13003] bridge0: port 3(veth0_vlan) entered disabled state [ 258.646464][T13003] bridge0: port 4(veth1) entered blocking state [ 258.710729][T13003] bridge0: port 4(veth1) entered disabled state [ 258.750599][T13003] device veth1 entered promiscuous mode [ 258.799737][T13003] bridge0: port 4(veth1) entered blocking state [ 258.806067][T13003] bridge0: port 4(veth1) entered forwarding state [ 259.089894][T13030] bridge0: port 3(veth1) entered blocking state [ 259.106638][T13030] bridge0: port 3(veth1) entered disabled state [ 259.135018][T13030] device veth1 entered promiscuous mode [ 259.169860][T13030] bridge0: port 3(veth1) entered blocking state [ 259.176155][T13030] bridge0: port 3(veth1) entered forwarding state [ 259.283204][T13035] device veth1 left promiscuous mode [ 259.310450][T13035] bridge0: port 3(veth1) entered disabled state [ 260.013275][T13081] syz.3.3746[13081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.481183][T13119] ÿÿÿÿÿÿ: renamed from vlan1 [ 260.804945][T13154] device wg2 entered promiscuous mode [ 263.576754][T13333] device syzkaller0 entered promiscuous mode [ 264.711580][T13379] syz.3.3831[13379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.566489][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.609499][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.636441][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.658973][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.674753][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.690886][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.714389][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.738023][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.761127][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.773270][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.805012][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.813214][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.836182][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.852110][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.885179][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.899070][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.931192][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.961071][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 266.994481][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.012362][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.050069][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.081341][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.104252][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.135203][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.152295][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.179287][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.208238][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.236489][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.256230][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.299242][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.308299][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.346760][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 267.374074][T13514] batadv0: tun_chr_ioctl cmd 1074025673 [ 268.767677][T13599] tun0: tun_chr_ioctl cmd 1074025676 [ 268.779645][T13599] tun0: owner set to 0 [ 268.862925][T13602] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.870789][T13602] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.079217][T13608] device syzkaller0 entered promiscuous mode [ 269.116700][T13620] device syzkaller0 entered promiscuous mode [ 269.219791][T13630] device syzkaller0 entered promiscuous mode [ 269.227618][T13629] syzkaller0: create flow: hash 977492245 index 0 [ 269.241870][ T444] syzkaller0: tun_net_xmit 48 [ 269.357104][T13628] syzkaller0 (unregistered): delete flow: hash 977492245 index 0 [ 269.716475][T13694] device macsec0 left promiscuous mode [ 271.552118][T13780] device syzkaller0 entered promiscuous mode [ 272.811681][ T24] audit: type=1400 audit(1773824550.830:177): avc: denied { create } for pid=13871 comm="syz.4.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 272.896073][T13867] device syzkaller0 entered promiscuous mode [ 274.178255][T13960] device syzkaller0 entered promiscuous mode [ 275.480399][T14027] 6±ÿ: renamed from team_slave_1 [ 277.641761][T14095] device sit0 left promiscuous mode [ 277.856535][T14095] device sit0 entered promiscuous mode [ 278.172382][T14113] device syzkaller0 entered promiscuous mode [ 278.608875][T14133] device syzkaller0 entered promiscuous mode [ 279.723404][T14198] device syzkaller0 entered promiscuous mode [ 280.206817][T14213] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.218702][T14213] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.226709][T14213] device bridge_slave_0 entered promiscuous mode [ 280.338788][T14213] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.345886][T14213] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.356741][T14213] device bridge_slave_1 entered promiscuous mode [ 280.434410][T14213] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.441474][T14213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.448813][T14213] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.455842][T14213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.477978][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.485220][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.513567][T14213] device veth0_vlan entered promiscuous mode [ 280.521013][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.532661][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.542066][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.550892][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.559322][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.566386][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.573905][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.582702][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.590943][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.597982][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.605322][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 280.613579][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.621537][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.629552][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.637662][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.645949][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.654374][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.662307][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.670481][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.678041][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.691162][T14213] device veth1_macvtap entered promiscuous mode [ 280.703474][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.712097][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.720649][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.747945][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.756188][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.780138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.789300][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.894429][T14305] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 281.903588][T14305] device syzkaller0 entered promiscuous mode [ 281.948683][ T49] nr0: port 1(macsec0) entered disabled state [ 284.496746][T14418] device sit0 entered promiscuous mode [ 284.814562][T14449] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 286.794079][T14525] device syzkaller0 entered promiscuous mode [ 286.959723][T14535] device syzkaller0 entered promiscuous mode [ 287.384005][T14588] device syzkaller0 entered promiscuous mode [ 287.594089][T14609] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.232333][T14649] device syzkaller0 entered promiscuous mode [ 290.961891][T14797] device syzkaller0 entered promiscuous mode [ 292.211526][T14856] device bridge0 entered promiscuous mode [ 292.654997][T14892] device wg2 entered promiscuous mode [ 293.762262][T14967] : port 1(syz_tun) entered blocking state [ 293.823170][T14967] : port 1(syz_tun) entered disabled state [ 293.999675][T14967] device syz_tun entered promiscuous mode [ 294.008268][T14970] device syz_tun left promiscuous mode [ 294.013858][T14970] : port 1(syz_tun) entered disabled state [ 294.815335][T14986] device syzkaller0 entered promiscuous mode [ 296.038979][T15027] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.124601][T15033] device bridge_slave_1 left promiscuous mode [ 296.134436][T15033] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.163146][T15033] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.239376][T15032] device wg2 left promiscuous mode [ 297.154079][T15124] device syzkaller0 entered promiscuous mode [ 297.221201][T15115] device syzkaller0 entered promiscuous mode [ 297.348844][T15136] device syzkaller0 entered promiscuous mode [ 297.546092][T15168] device syzkaller0 entered promiscuous mode [ 297.641840][T15163] device syzkaller0 entered promiscuous mode [ 299.394756][T15295] @ÿ: renamed from bond_slave_0 [ 299.453177][T15300] device syzkaller0 entered promiscuous mode [ 301.078825][T15375] tap1: tun_chr_ioctl cmd 1074025677 [ 301.122153][T15375] tap1: linktype set to 6 [ 301.157037][T15376] tap1: tun_chr_ioctl cmd 1074025698 [ 301.401659][T15389] device syzkaller0 entered promiscuous mode [ 301.808536][T15404] device syzkaller0 entered promiscuous mode [ 302.386497][T15468] tap0: tun_chr_ioctl cmd 35108 [ 303.527013][T15513] device wg2 entered promiscuous mode [ 305.604845][T15594] device team_slave_1 entered promiscuous mode [ 305.687365][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.696024][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.900054][T15617] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 306.577673][T15664] -: renamed from syzkaller0 [ 306.956523][T15672] device veth0_vlan left promiscuous mode [ 307.059007][T15672] device veth0_vlan entered promiscuous mode [ 307.137201][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.147737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.155318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 307.188163][T15683] device syzkaller0 entered promiscuous mode [ 310.601660][T15831] nr0: port 1(macsec0) entered blocking state [ 310.608816][T15831] nr0: port 1(macsec0) entered disabled state [ 310.880648][T15855] -: renamed from syzkaller0 [ 310.912801][T15861] tap0: tun_chr_ioctl cmd 1074025675 [ 310.921827][T15861] tap0: persist enabled [ 310.932967][T15861] tap0: tun_chr_ioctl cmd 1074025675 [ 310.938441][T15861] tap0: persist enabled [ 310.942974][T15864] device syzkaller0 entered promiscuous mode [ 310.950133][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 311.195631][T15891] device syzkaller0 entered promiscuous mode [ 311.373555][T15911] device syzkaller0 entered promiscuous mode [ 312.685027][T15997] device syzkaller0 entered promiscuous mode [ 313.158580][T16059] device syzkaller0 entered promiscuous mode [ 317.025987][T16284] device wg2 entered promiscuous mode [ 317.428789][ T24] audit: type=1400 audit(1773824595.450:178): avc: denied { create } for pid=16315 comm="syz.1.4702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 317.683903][T16329] device syzkaller0 entered promiscuous mode [ 319.336047][T16405] bridge0: port 4(veth1) entered disabled state [ 319.342437][T16405] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.349602][T16405] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.280560][T16530] Ÿë: port 1(vlan1) entered blocking state [ 321.293446][T16530] Ÿë: port 1(vlan1) entered disabled state [ 321.310084][T16530] device vlan1 entered promiscuous mode [ 322.237224][T16608] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 322.246110][T16608] device syzkaller0 entered promiscuous mode [ 322.319926][T16612] batadv0: tun_chr_ioctl cmd 2148553947 [ 322.755184][T16625] : port 1(ip6gretap0) entered blocking state [ 322.849392][T16625] : port 1(ip6gretap0) entered disabled state [ 322.895166][T16625] device ip6gretap0 entered promiscuous mode [ 323.005248][T16629] device ip6gretap0 left promiscuous mode [ 323.036690][T16629] : port 1(ip6gretap0) entered disabled state [ 324.084842][T16744] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.092153][T16744] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.130662][T16744] device bridge0 left promiscuous mode [ 324.493317][T16792] device syzkaller0 entered promiscuous mode [ 324.650597][T16816] ÿÿÿÿÿÿ: renamed from vlan1 [ 324.999371][T16843] batadv0: tun_chr_ioctl cmd 2148553947 [ 325.250374][T16857] device syzkaller0 entered promiscuous mode [ 325.807606][T16882] device syzkaller0 entered promiscuous mode [ 326.869690][T16921] €Â0: renamed from pim6reg1 [ 327.163122][T16935] batadv0: tun_chr_ioctl cmd 2148553947 [ 327.537589][T16981] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 327.647936][T16981] dvmrp1: tun_chr_ioctl cmd 1074025680 [ 327.653844][T16997] lo: mtu less than device minimum [ 329.328218][T17077] device syzkaller0 entered promiscuous mode [ 330.752632][T17133] @ÿ: renamed from bond_slave_0 [ 331.001311][T17137] device syzkaller0 entered promiscuous mode [ 331.391177][T17147] device veth0_vlan left promiscuous mode [ 331.424530][T17147] device veth0_vlan entered promiscuous mode [ 333.479514][T17220] syzkaller0: refused to change device tx_queue_len [ 333.639809][T17235] device syzkaller0 entered promiscuous mode [ 334.626796][T17289] device syzkaller0 entered promiscuous mode [ 334.648577][ T4199] syzkaller0: tun_net_xmit 48 [ 336.178423][T17398] nr0: port 1(macsec0) entered blocking state [ 336.184524][T17398] nr0: port 1(macsec0) entered disabled state [ 336.201325][T17398] device macsec0 entered promiscuous mode [ 337.285008][T17471] device syzkaller0 entered promiscuous mode [ 337.935051][T17521] device vlan0 entered promiscuous mode [ 338.611453][T17545] device syzkaller0 entered promiscuous mode [ 338.933385][T17561] device syzkaller0 entered promiscuous mode [ 338.992329][T17561] device syzkaller0 left promiscuous mode [ 340.981533][T17688] syz.0.5098[17688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.981589][T17688] syz.0.5098[17688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.002344][T17936] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.020835][T17936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.028151][T17936] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.035182][T17936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.118653][T17936] device bridge0 entered promiscuous mode [ 345.391415][T17958] device pim6reg1 entered promiscuous mode [ 345.543871][T17955] device wg2 left promiscuous mode [ 345.727026][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.419424][T18026] cgroup: fork rejected by pids controller in /syz3 [ 349.729240][T18169] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.736344][T18169] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.744219][T18169] device bridge_slave_0 entered promiscuous mode [ 349.784480][T18169] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.794730][T18169] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.803975][T18169] device bridge_slave_1 entered promiscuous mode [ 349.990535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.003904][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.057440][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.107221][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.137785][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.144847][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.206163][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.241561][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.294696][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.301872][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.357099][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.378505][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.467119][T18190] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 350.475750][T18190] device syzkaller0 entered promiscuous mode [ 350.521291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.578455][T18203] device syzkaller0 entered promiscuous mode [ 350.601940][T18169] device veth0_vlan entered promiscuous mode [ 350.612474][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.624805][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.633402][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.642074][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.656019][T18169] device veth1_macvtap entered promiscuous mode [ 350.664893][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.712309][T18210] device syzkaller0 entered promiscuous mode [ 350.746526][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.768378][T18214] device syzkaller0 entered promiscuous mode [ 350.779266][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 351.782799][T18282] device syzkaller0 entered promiscuous mode [ 351.918321][T18300] device veth0_vlan left promiscuous mode [ 351.947965][T18300] device veth0_vlan entered promiscuous mode [ 352.335769][T18358] device syzkaller0 entered promiscuous mode [ 352.588678][T18375] device syzkaller0 entered promiscuous mode [ 353.106379][T18420] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 353.165290][T18420] device syzkaller0 entered promiscuous mode [ 353.300794][T18445] device syzkaller0 entered promiscuous mode [ 353.540123][T18463] device syzkaller0 entered promiscuous mode [ 354.474757][T18518] device syzkaller0 entered promiscuous mode [ 354.520756][T18519] device syzkaller0 left promiscuous mode [ 354.645838][T18524] device syzkaller0 entered promiscuous mode [ 356.323358][T18609] device syzkaller0 entered promiscuous mode [ 357.397695][T18666] FAULT_INJECTION: forcing a failure. [ 357.397695][T18666] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 357.460621][T18666] CPU: 1 PID: 18666 Comm: syz.2.5365 Tainted: G W syzkaller #0 [ 357.469485][T18666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 357.479556][T18666] Call Trace: [ 357.482861][T18666] __dump_stack+0x21/0x24 [ 357.487207][T18666] dump_stack_lvl+0x1a7/0x208 [ 357.491890][T18666] ? show_regs_print_info+0x18/0x18 [ 357.497097][T18666] ? vfs_write+0xb27/0xdc0 [ 357.501528][T18666] dump_stack+0x15/0x1c [ 357.505691][T18666] should_fail+0x3c1/0x510 [ 357.510115][T18666] should_fail_usercopy+0x1a/0x20 [ 357.515151][T18666] _copy_from_user+0x20/0xd0 [ 357.519754][T18666] __se_sys_bpf+0x1bb/0x740 [ 357.524259][T18666] ? __x64_sys_bpf+0x90/0x90 [ 357.528868][T18666] ? debug_smp_processor_id+0x17/0x20 [ 357.534248][T18666] __x64_sys_bpf+0x7b/0x90 [ 357.538681][T18666] do_syscall_64+0x31/0x40 [ 357.543116][T18666] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 357.549035][T18666] RIP: 0033:0x7f210822e799 [ 357.553467][T18666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 357.573181][T18666] RSP: 002b:00007f2106c89028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 357.581608][T18666] RAX: ffffffffffffffda RBX: 00007f21084a7fa0 RCX: 00007f210822e799 [ 357.589585][T18666] RDX: 0000000000000094 RSI: 00002000000002c0 RDI: 0000000000000005 [ 357.597571][T18666] RBP: 00007f2106c89090 R08: 0000000000000000 R09: 0000000000000000 [ 357.605552][T18666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.613533][T18666] R13: 00007f21084a8038 R14: 00007f21084a7fa0 R15: 00007fff319039a8 [ 358.230737][T18687] tun0: tun_chr_ioctl cmd 1074025677 [ 358.290504][T18687] tun0: linktype set to 820 [ 358.381045][T18693] tun0: tun_chr_ioctl cmd 35106 [ 361.283040][T18789] device syzkaller0 entered promiscuous mode [ 363.977109][T18932] device macsec0 entered promiscuous mode [ 364.057472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.648180][T19083] device syzkaller0 entered promiscuous mode [ 366.083244][T19111] device syzkaller0 entered promiscuous mode [ 366.152738][T19121] syz.2.5497[19121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.152803][T19121] syz.2.5497[19121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.198427][T19123] device xfrm0 entered promiscuous mode [ 366.342925][T19131] device syzkaller0 entered promiscuous mode [ 367.002936][T19199] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.010500][T19199] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.027192][T19199] device bridge0 left promiscuous mode [ 367.059545][T19199] device bridge_slave_1 left promiscuous mode [ 367.067863][T19199] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.081766][T19199] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.884185][T19253] device pim6reg1 entered promiscuous mode [ 368.537027][T19274] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.544126][T19274] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.586714][T19274] device bridge_slave_0 entered promiscuous mode [ 368.624607][T19274] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.632872][T19274] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.647760][T19274] device bridge_slave_1 entered promiscuous mode [ 369.364974][T19299] device syzkaller0 entered promiscuous mode [ 369.470386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 369.487393][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.517085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 369.525356][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.547164][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.554228][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.567598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 369.586064][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.600505][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.607555][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.629361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.647252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.655246][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.675505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.707103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 369.728445][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.750992][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.776178][T19274] device veth0_vlan entered promiscuous mode [ 369.795784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.821415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.852788][T19274] device veth1_macvtap entered promiscuous mode [ 369.962050][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.978568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.023418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 370.066261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 370.084915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 370.120005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.142016][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.160671][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.169862][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.663234][ T327] device veth1_macvtap left promiscuous mode [ 370.697046][ T327] device veth0_vlan left promiscuous mode [ 373.132340][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.157800][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.165076][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.221739][T19489] device vlan0 entered promiscuous mode [ 373.363442][T19503] device syzkaller0 entered promiscuous mode [ 373.713349][T19525] device syzkaller0 entered promiscuous mode [ 376.956380][ T24] audit: type=1400 audit(1773824654.970:179): avc: denied { create } for pid=19608 comm="syz.2.5642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 377.594397][T19673] device syzkaller0 entered promiscuous mode [ 379.325479][T19750] device wg2 entered promiscuous mode [ 380.903763][T19820] tun0: tun_chr_ioctl cmd 1074025676 [ 380.918073][T19820] tun0: owner set to 0 [ 381.198389][T19842] batadv0: tun_chr_ioctl cmd 2148553947 [ 381.213957][T19841] batadv0: tun_chr_ioctl cmd 1074025673 [ 381.351699][T19855] device syzkaller0 entered promiscuous mode [ 381.932204][T19888] device wg2 left promiscuous mode [ 383.832732][T20002] device syzkaller0 entered promiscuous mode [ 384.472291][T20046] ³þ: renamed from bond_slave_0 [ 384.883304][T20049] device syzkaller0 entered promiscuous mode [ 384.919020][T20058] device bridge0 entered promiscuous mode [ 384.930987][T20057] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 384.948012][T20057] device syzkaller0 entered promiscuous mode [ 386.869660][T20172] nr0: port 1(macsec0) entered blocking state [ 386.877212][T20172] nr0: port 1(macsec0) entered disabled state [ 386.895076][T20172] device macsec0 entered promiscuous mode [ 387.369591][T20227] device syzkaller0 entered promiscuous mode [ 388.893153][T20273] lo: mtu less than device minimum [ 388.913561][T20272] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 389.096438][T20272] device syzkaller0 entered promiscuous mode [ 390.105264][T20355] device syzkaller0 entered promiscuous mode [ 390.318688][T20357] ªªªªªª™™: renamed from vlan0 [ 390.718748][T20381] device syzkaller0 entered promiscuous mode [ 391.335601][T20430] device syzkaller0 entered promiscuous mode [ 392.110050][T20450] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.117408][T20450] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.124896][T20450] device bridge_slave_0 entered promiscuous mode [ 392.133315][T20450] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.140457][T20450] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.147839][T20450] device bridge_slave_1 entered promiscuous mode [ 392.190140][T20450] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.197224][T20450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.204492][T20450] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.211560][T20450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.234251][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.247415][ T3759] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.267192][ T3759] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.292145][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.300653][ T3759] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.307722][ T3759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.326497][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.334769][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.341943][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.350992][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.358966][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.376704][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.416026][T20450] device veth0_vlan entered promiscuous mode [ 392.422486][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.460748][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 392.488404][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.516076][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.557749][T20450] device veth1_macvtap entered promiscuous mode [ 392.635853][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 392.654615][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.582671][T20516] device syzkaller0 entered promiscuous mode [ 393.597133][T20520] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 394.778361][T20569] device syzkaller0 entered promiscuous mode [ 395.177987][T20585] device veth1_macvtap left promiscuous mode [ 396.411583][T20667] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.418697][T20667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.426170][T20667] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.433326][T20667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.540041][T20667] device bridge0 entered promiscuous mode [ 397.137777][T20700] device syzkaller0 entered promiscuous mode [ 397.294001][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 397.543755][T20731] device sit0 entered promiscuous mode [ 399.036264][T20865] device syzkaller0 entered promiscuous mode [ 400.074956][T20922] device veth1_macvtap left promiscuous mode [ 400.549741][T20944] device syzkaller0 entered promiscuous mode [ 400.821891][T20959] device wg2 entered promiscuous mode [ 401.298870][T20973] +: renamed from team_slave_1 [ 401.462999][T21016] syz.2.6057[21016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.464956][T21016] tap0: tun_chr_ioctl cmd 1074025677 [ 401.509869][T21016] tap0: linktype set to 6 [ 403.478504][T21104] tap0: tun_chr_ioctl cmd 1074025681 [ 404.016762][T21105] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.024730][T21105] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.039114][T21105] device bridge_slave_0 entered promiscuous mode [ 404.370127][T21105] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.380331][T21105] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.388017][T21105] device bridge_slave_1 entered promiscuous mode [ 404.533857][T21105] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.540934][T21105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.548303][T21105] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.555340][T21105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.637387][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.644781][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.667088][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 404.674565][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 404.683920][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 404.692832][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.701354][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.708432][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.716096][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 404.724901][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.733121][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.740207][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.751078][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 404.759176][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.779887][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 404.788075][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.799630][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 404.808199][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.822257][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 404.830385][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.838687][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.846136][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.853747][T21105] device veth0_vlan entered promiscuous mode [ 404.875065][T21105] device veth1_macvtap entered promiscuous mode [ 404.891405][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 404.907311][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.925082][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 404.937004][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 404.951009][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 404.959710][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 404.972987][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 405.898509][ T9] device veth1 left promiscuous mode [ 405.903899][ T9] bridge0: port 4(veth1) entered disabled state [ 405.931413][ T9] bridge0: port 3(veth0_vlan) entered disabled state [ 405.946543][ T9] device bridge_slave_1 left promiscuous mode [ 405.952928][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.960721][ T9] device bridge_slave_0 left promiscuous mode [ 405.977011][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.985599][ T9] device veth0_vlan left promiscuous mode [ 406.207070][T21203] device wg2 entered promiscuous mode [ 406.898647][T21279] device veth0_vlan left promiscuous mode [ 406.933056][T21279] device veth0_vlan entered promiscuous mode [ 409.676595][T21393] device syzkaller0 entered promiscuous mode [ 410.012766][T21427] device syzkaller0 entered promiscuous mode [ 411.533214][T21514] device wg2 left promiscuous mode [ 411.612235][T21528] device wg2 entered promiscuous mode [ 411.895069][T21547] device syzkaller0 entered promiscuous mode [ 414.205772][T21666] nr0: port 1(macsec0) entered blocking state [ 414.212080][T21666] nr0: port 1(macsec0) entered disabled state [ 414.224045][T21666] device macsec0 entered promiscuous mode [ 414.268746][T21676] device syzkaller0 entered promiscuous mode [ 414.523081][T21708] device syzkaller0 entered promiscuous mode [ 414.592337][T21713] syz.0.6272[21713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.592373][T21713] syz.0.6272[21713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.775142][T21725] device syzkaller0 entered promiscuous mode [ 415.312871][T21780] device wg2 entered promiscuous mode [ 415.926109][T21807] device syzkaller0 entered promiscuous mode [ 416.615843][T21841] device sit0 left promiscuous mode [ 416.734642][T21849] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.743910][T21849] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.845480][T21850] device sit0 entered promiscuous mode [ 417.368180][T21867] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.378129][T21867] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.491034][T21857] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.498229][T21857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.505557][T21857] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.512598][T21857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.520894][T21857] device bridge0 entered promiscuous mode [ 417.537992][T21865] device syzkaller0 entered promiscuous mode [ 417.656247][T21874] device syzkaller0 entered promiscuous mode [ 418.179669][T21907] cgroup: fork rejected by pids controller in /syz4 [ 418.275018][T21918] device syzkaller0 entered promiscuous mode [ 418.561423][ T24] audit: type=1400 audit(1773824696.580:180): avc: denied { create } for pid=22020 comm="syz.0.6334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 419.186071][T22040] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.224009][T22040] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.244309][T22040] device bridge_slave_0 entered promiscuous mode [ 419.256007][T22040] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.263450][T22040] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.314260][T22040] device bridge_slave_1 entered promiscuous mode [ 419.580057][T22065] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.587391][T22065] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.679699][T22070] device bridge_slave_1 left promiscuous mode [ 419.686030][T22070] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.707451][T22070] device bridge_slave_0 left promiscuous mode [ 419.713787][T22070] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.846296][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 419.853890][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 419.873969][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 419.897559][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 419.925847][ T3759] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.932922][ T3759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.945398][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 419.954342][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 419.963107][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.970176][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.995625][T22083] device wg2 left promiscuous mode [ 420.032677][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 420.040446][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 420.094625][T22083] device wg2 entered promiscuous mode [ 420.128103][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.162411][T22040] device veth0_vlan entered promiscuous mode [ 420.177149][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.185279][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.196811][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.209304][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 420.235110][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 420.268162][T22040] device veth1_macvtap entered promiscuous mode [ 420.378523][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 420.427535][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 420.512850][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 420.557747][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 420.918342][T22110] device syzkaller0 entered promiscuous mode [ 420.964221][T22120] device syzkaller0 left promiscuous mode [ 421.737747][ T9] device macsec0 left promiscuous mode [ 421.743375][ T9] nr0: port 1(macsec0) entered disabled state [ 421.961692][ T9] device bridge_slave_1 left promiscuous mode [ 421.967916][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.975320][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.327520][T22270] @ÿÿÿ: renamed from bond_slave_0 [ 424.425154][T22277] device syzkaller0 entered promiscuous mode [ 424.887871][T22302] device veth0_vlan left promiscuous mode [ 425.022608][T22302] device veth0_vlan entered promiscuous mode [ 425.758499][T22361] device syzkaller0 entered promiscuous mode [ 426.072382][T22378] : port 1(ip6gretap0) entered blocking state [ 426.078881][T22378] : port 1(ip6gretap0) entered disabled state [ 426.090040][T22378] device ip6gretap0 entered promiscuous mode [ 426.140535][T22369] device ip6gretap0 left promiscuous mode [ 426.147082][T22369] : port 1(ip6gretap0) entered disabled state [ 426.330231][T22387] device syzkaller0 entered promiscuous mode [ 426.472282][T22406] tun0: tun_chr_ioctl cmd 1074025678 [ 426.477924][T22406] tun0: group set to 1 [ 426.488060][T22405] tun0: tun_chr_ioctl cmd 1074025678 [ 426.537442][T22405] tun0: group set to 1 [ 426.936043][T22444] device syzkaller0 entered promiscuous mode [ 427.833995][T22497] tun0: tun_chr_ioctl cmd 1074025677 [ 427.849535][T22497] tun0: linktype set to 820 [ 428.148774][T22526] device syzkaller0 entered promiscuous mode [ 428.427807][T22547] device veth1_macvtap left promiscuous mode [ 428.801327][T22602] bridge0: port 3(veth1) entered blocking state [ 428.807687][T22602] bridge0: port 3(veth1) entered disabled state [ 428.814330][T22602] device veth1 entered promiscuous mode [ 428.820554][T22602] bridge0: port 3(veth1) entered blocking state [ 428.826828][T22602] bridge0: port 3(veth1) entered forwarding state [ 428.833714][T22604] device veth1 left promiscuous mode [ 428.839212][T22604] bridge0: port 3(veth1) entered disabled state [ 429.092067][T22636] 7B’ç÷ï: renamed from syzkaller0 [ 429.613732][T22652] device syzkaller0 entered promiscuous mode [ 430.366271][T22714] device syzkaller0 entered promiscuous mode [ 430.498236][T22730] Â: renamed from pim6reg1 [ 431.031548][T22764] syz.2.6551[22764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.031602][T22764] syz.2.6551[22764] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.104873][T22768] device pim6reg1 entered promiscuous mode [ 432.188701][T22819] device syzkaller0 entered promiscuous mode [ 432.652380][T22856] : renamed from bond_slave_0 [ 435.758117][T23021] device syzkaller0 entered promiscuous mode [ 436.789763][T23046] tap0: tun_chr_ioctl cmd 1074025692 [ 437.201880][T23082] device syzkaller0 entered promiscuous mode [ 437.573526][T23094] device syzkaller0 entered promiscuous mode [ 438.229878][T23121] device veth1_macvtap left promiscuous mode [ 438.596881][T23133] device syzkaller0 entered promiscuous mode [ 439.016883][ T24] audit: type=1400 audit(1773824717.030:181): avc: denied { create } for pid=23148 comm="syz.3.6666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 439.440786][T23171] device wg2 left promiscuous mode [ 439.513232][T23171] device wg2 entered promiscuous mode [ 441.152298][T23247] device sit0 left promiscuous mode [ 441.297048][T23239] device sit0 entered promiscuous mode [ 441.841896][T23300] device syzkaller0 entered promiscuous mode [ 441.956367][T23310] batadv0: tun_chr_ioctl cmd 2148553947 [ 442.054579][T23310] batadv0: tun_chr_ioctl cmd 1074025672 [ 442.070899][T23310] batadv0: ignored: set checksum disabled [ 444.244712][T23388] device syzkaller0 entered promiscuous mode [ 446.654124][T23527] device syzkaller0 entered promiscuous mode [ 448.520761][ T24] audit: type=1400 audit(1773824726.540:182): avc: denied { create } for pid=23601 comm="syz.0.6793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 449.048415][T23629] device wg2 left promiscuous mode [ 449.140592][T23633] device veth0_vlan left promiscuous mode [ 449.159238][T23633] device veth0_vlan entered promiscuous mode [ 449.210531][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.422363][T23722] device syzkaller0 entered promiscuous mode [ 452.487274][T23766] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.636171][T23781] device syzkaller0 entered promiscuous mode [ 452.900090][T23812] device syzkaller0 entered promiscuous mode [ 453.694691][T23880] device syzkaller0 entered promiscuous mode [ 454.481500][T23953] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.530412][T23953] device bridge0 left promiscuous mode [ 454.606059][T23956] device bridge_slave_1 left promiscuous mode [ 454.616157][T23956] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.640790][T23956] device bridge_slave_0 left promiscuous mode [ 454.657142][T23956] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.891291][T24062] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 457.887017][T24116] device syzkaller0 entered promiscuous mode [ 457.964067][T24118] device syzkaller0 entered promiscuous mode [ 458.269177][T24140] syz.0.6946[24140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.269232][T24140] syz.0.6946[24140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.556290][T24207] device syzkaller0 entered promiscuous mode [ 459.905143][T24229] device syzkaller0 entered promiscuous mode [ 460.794427][T24300] device syzkaller0 entered promiscuous mode [ 460.887547][T24305] device veth1_macvtap entered promiscuous mode [ 460.907499][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 462.071415][T24366] device bridge_slave_0 entered promiscuous mode [ 462.088497][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 463.280461][T24431] device syzkaller0 entered promiscuous mode [ 464.246971][T24484] device syzkaller0 entered promiscuous mode [ 464.671423][T24514] device syzkaller0 entered promiscuous mode [ 465.200479][T24581] device team_slave_1 entered promiscuous mode [ 465.224250][T24580] device syzkaller0 entered promiscuous mode [ 465.248682][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 465.261513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 465.421043][T24610] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 467.556807][T24690] device bridge_slave_0 entered promiscuous mode [ 468.091710][T24726] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 468.169948][T24726] syzkaller0: linktype set to 825 [ 468.224690][T24731] Ÿë: port 1(veth0_to_team) entered blocking state [ 468.234087][T24731] Ÿë: port 1(veth0_to_team) entered disabled state [ 468.247321][T24731] device veth0_to_team entered promiscuous mode [ 468.703889][T24750] device syzkaller0 entered promiscuous mode [ 469.259358][T24785] device syzkaller0 entered promiscuous mode [ 469.439890][T24801] device veth0_vlan left promiscuous mode [ 469.479960][T24801] device veth0_vlan entered promiscuous mode [ 469.553768][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.952792][T24847] device syzkaller0 entered promiscuous mode [ 473.365774][T24985] device syzkaller0 entered promiscuous mode [ 473.903552][T25012] device pimreg0 entered promiscuous mode [ 474.795471][T25041] device syzkaller0 entered promiscuous mode [ 474.966124][T25050] bridge0: port 3(veth0_to_bridge) entered blocking state [ 475.002336][T25050] bridge0: port 3(veth0_to_bridge) entered disabled state [ 475.027434][T25050] device veth0_to_bridge entered promiscuous mode [ 475.041649][T25050] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 475.084208][T25050] bridge0: port 3(veth0_to_bridge) entered blocking state [ 475.091381][T25050] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 475.267870][T25068] : renamed from bond_slave_0 [ 475.407630][T25080] syz.3.7226[25080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.407675][T25080] syz.3.7226[25080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.567317][T25080] syz.3.7226[25080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.586140][T25080] syz.3.7226[25080] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 475.687645][T25095] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 476.760167][T25147] batadv0: tun_chr_ioctl cmd 1074025684 [ 477.657680][T25180] device veth1_macvtap left promiscuous mode [ 477.921996][T25220] device lo entered promiscuous mode [ 478.829220][T25272] device syzkaller0 entered promiscuous mode [ 480.383253][T25368] device syzkaller0 entered promiscuous mode [ 480.753247][T25380] device syzkaller0 entered promiscuous mode [ 482.545819][T25440] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.553648][T25440] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.561280][T25440] device bridge_slave_0 entered promiscuous mode [ 482.568392][T25440] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.575551][T25440] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.583053][T25440] device bridge_slave_1 entered promiscuous mode [ 482.637218][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.649248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.661319][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.673419][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.685465][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.697574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.709627][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.721648][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.733701][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 482.745706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.038812][T25444] device syzkaller0 entered promiscuous mode [ 483.651811][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 483.659326][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 483.697715][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 483.709196][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.725074][ T3759] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.732225][ T3759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.749795][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.764580][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.810283][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.817351][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.005404][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 484.016567][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 484.031867][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.275844][T25440] device veth0_vlan entered promiscuous mode [ 484.288731][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 484.300468][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 484.317603][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.332723][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.492655][T25440] device veth1_macvtap entered promiscuous mode [ 484.613509][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 484.622082][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.630486][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.744041][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 484.835766][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 484.929638][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 484.947272][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 485.524769][ T327] nr0: port 1(macsec0) entered disabled state [ 487.646953][ C1] net_ratelimit: 96700 callbacks suppressed [ 487.646972][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.664911][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.676995][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.688996][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.701046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.713087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.725141][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.737273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.749452][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 487.761464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.704045][T25594] device syzkaller0 entered promiscuous mode [ 492.381945][T25696] device syzkaller0 entered promiscuous mode [ 492.656882][ C1] net_ratelimit: 90173 callbacks suppressed [ 492.656896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.675060][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.687072][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.699140][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.711198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.723261][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.735258][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.747317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.759410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 492.771483][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 494.385192][T25750] device syzkaller0 entered promiscuous mode [ 496.927928][T25847] device syzkaller0 entered promiscuous mode [ 497.666942][ C1] net_ratelimit: 88644 callbacks suppressed [ 497.666955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.685070][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.697085][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.709148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.721164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.733211][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.745210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.757303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.769374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 497.781464][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.676917][ C1] net_ratelimit: 94257 callbacks suppressed [ 502.676930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.694848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.706910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.718920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.730996][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.743005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.755076][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.767062][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.779129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 502.791110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.375194][T26140] device syzkaller0 entered promiscuous mode [ 504.399674][T26140] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 504.661605][T26146] device sit0 entered promiscuous mode [ 506.972012][T26207] device syzkaller0 entered promiscuous mode [ 507.686896][ C1] net_ratelimit: 67752 callbacks suppressed [ 507.686910][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.705039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.717097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.729509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.741584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.753758][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.765828][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.778017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.790088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 507.802264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.317979][T26248] tap0: tun_chr_ioctl cmd 1074025692 [ 510.760476][T26312] syz.3.7572[26312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.760538][T26312] syz.3.7572[26312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.850278][T26314] device syzkaller0 entered promiscuous mode [ 512.696955][ C1] net_ratelimit: 36134 callbacks suppressed [ 512.702943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.716806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.729328][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.742527][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.754909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.767814][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.780407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.793342][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.805914][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.818775][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.045494][T26374] device syzkaller0 entered promiscuous mode [ 513.573640][T26382] device sit0 left promiscuous mode [ 513.945970][T26379] device sit0 entered promiscuous mode [ 514.564716][T26409] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.572352][T26409] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.638802][T26410] device bridge_slave_1 left promiscuous mode [ 514.661824][T26410] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.707608][T26410] device bridge_slave_0 left promiscuous mode [ 514.731369][T26410] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.706907][ C1] net_ratelimit: 38108 callbacks suppressed [ 517.706922][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.725059][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.737120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.749399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.761472][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.773613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.785695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.797813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.809862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.821991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.863023][T26518] device syzkaller0 entered promiscuous mode [ 519.216098][T26578] device syzkaller0 entered promiscuous mode [ 519.678698][T26601] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.685933][T26601] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.848489][T26611] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.855679][T26611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.862998][T26611] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.870039][T26611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.009948][T26611] device bridge0 entered promiscuous mode [ 520.084777][T26607] device syzkaller0 entered promiscuous mode [ 521.395560][T26695] device vlan0 entered promiscuous mode [ 521.811517][T26725] device syzkaller0 entered promiscuous mode [ 521.888148][T26727] device dummy0 entered promiscuous mode [ 522.717020][ C1] net_ratelimit: 38277 callbacks suppressed [ 522.717033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.735115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.747284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.759391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.771529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.783591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.795781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.807868][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.820006][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.832053][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.779700][T26835] syz.2.7717[26835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.779760][T26835] syz.2.7717[26835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 525.036676][T26842] device syzkaller0 entered promiscuous mode [ 525.607907][T26886] device syzkaller0 entered promiscuous mode [ 526.262133][T26908] device syzkaller0 entered promiscuous mode [ 527.149226][T26938] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 527.726859][ C1] net_ratelimit: 36698 callbacks suppressed [ 527.726872][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.744865][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.757034][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.769097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.781224][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.793298][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.805462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.817545][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.829664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.841710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.648090][T26990] erspan0: refused to change device tx_queue_len [ 532.737035][ C1] net_ratelimit: 34350 callbacks suppressed [ 532.737051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.755063][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.767067][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 532.779238][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 532.791459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.803519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.815513][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 532.827516][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 532.839720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.851768][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.030690][T27103] device syzkaller0 entered promiscuous mode [ 534.065677][T27104] device veth1_macvtap entered promiscuous mode [ 534.085074][T27104] device macsec0 entered promiscuous mode [ 534.371998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 535.491241][T27183] device syzkaller0 entered promiscuous mode [ 537.168420][T27278] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 537.746909][ C1] net_ratelimit: 54037 callbacks suppressed [ 537.746925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 537.765077][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.777148][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.789158][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 537.801265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 537.813529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.825628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.837714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 537.849927][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 537.862130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.547337][T27316] device syzkaller0 entered promiscuous mode [ 542.496191][T27428] device syzkaller0 entered promiscuous mode [ 542.756881][ C1] net_ratelimit: 55363 callbacks suppressed [ 542.756895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.770319][T27453] device syzkaller0 entered promiscuous mode [ 542.775206][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.792916][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 542.805032][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 542.817250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.829391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.841367][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 542.853375][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 542.865617][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.877696][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.397945][T27468] device syzkaller0 entered promiscuous mode [ 546.678214][T27611] tun0: tun_chr_ioctl cmd 2147767506 [ 547.766878][ C1] net_ratelimit: 57023 callbacks suppressed [ 547.766894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.784855][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 547.796935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 547.809195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.821293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.833288][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 547.845323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 547.857773][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.869834][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.881987][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 549.738882][T27735] device syzkaller0 entered promiscuous mode [ 549.973476][T27745] device wg2 entered promiscuous mode [ 550.429322][T27773] device syzkaller0 entered promiscuous mode [ 550.459888][T27770] device veth0_vlan left promiscuous mode [ 550.469779][T27770] device veth0_vlan entered promiscuous mode [ 550.853446][T27816] syz.2.7983[27816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 550.853493][T27816] syz.2.7983[27816] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 551.580848][T27867] : port 1(dummy0) entered blocking state [ 551.620812][T27867] : port 1(dummy0) entered disabled state [ 551.655974][T27867] device dummy0 entered promiscuous mode [ 551.735092][T27876] device dummy0 left promiscuous mode [ 551.762856][T27876] : port 1(dummy0) entered disabled state [ 552.347276][T27900] tap0: tun_chr_ioctl cmd 1074025681 [ 552.517083][T27900] device syzkaller0 entered promiscuous mode [ 552.776899][ C1] net_ratelimit: 56848 callbacks suppressed [ 552.776913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.795132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 552.807190][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 552.819461][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.831533][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.843559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.855634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.867711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 552.879884][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 552.892171][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.610847][T28008] device syzkaller0 entered promiscuous mode [ 556.727536][T28085] device syzkaller0 entered promiscuous mode [ 557.380753][T28115] device syzkaller0 entered promiscuous mode [ 557.415959][T28128] -1: renamed from syzkaller0 [ 557.787591][ C1] net_ratelimit: 59791 callbacks suppressed [ 557.787620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.808273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.822473][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 557.836712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 557.854542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.868653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.882239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.896489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.909892][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 557.922875][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 559.211032][T28181] device syzkaller0 entered promiscuous mode [ 559.442562][T28152] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.479108][T28152] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.552774][T28152] device bridge_slave_0 entered promiscuous mode [ 559.669702][T28152] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.778691][T28152] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.793872][T28152] device bridge_slave_1 entered promiscuous mode [ 560.225470][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 560.240533][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 560.332919][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 560.481263][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 560.607494][T25593] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.614589][T25593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.622478][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 560.630900][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 560.652603][T25593] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.659685][T25593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.708462][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 560.716665][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 560.726529][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 560.734849][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 560.775683][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 560.800319][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 560.840256][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 560.850669][T28152] device veth0_vlan entered promiscuous mode [ 560.864714][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 560.917333][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 560.973904][T28152] device veth1_macvtap entered promiscuous mode [ 561.025315][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 561.034476][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 561.084142][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 561.121184][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 561.129648][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 561.263282][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 561.596471][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 561.736286][T28281] device syzkaller0 entered promiscuous mode [ 561.795701][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 561.877231][T25593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 562.797094][ C1] net_ratelimit: 60624 callbacks suppressed [ 562.797109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.815099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.827084][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.839087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.851134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 562.863127][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 562.875313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.887368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.899341][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.911338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.771322][T28338] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 563.779450][T28338] syzkaller0: linktype set to 825 [ 564.269559][ T327] device bridge_slave_1 left promiscuous mode [ 564.283460][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.481372][ T327] device bridge_slave_0 left promiscuous mode [ 564.509135][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.990945][T28379] device syzkaller0 entered promiscuous mode [ 564.999403][ T5737] syzkaller0: tun_net_xmit 48 [ 565.004608][T28379] syzkaller0: create flow: hash 977492245 index 0 [ 566.007172][T28377] syzkaller0 (unregistered): delete flow: hash 977492245 index 0 [ 566.607140][T28458] device syzkaller0 entered promiscuous mode [ 566.710328][T28458] syzkaller0: tun_net_xmit 1280 [ 566.877983][T28481] device syzkaller0 entered promiscuous mode [ 567.053657][T28487] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 567.263359][T28499] device syzkaller0 entered promiscuous mode [ 567.436405][T28502] device xfrm0 entered promiscuous mode [ 567.697186][T28520] device syzkaller0 entered promiscuous mode [ 567.806930][ C1] net_ratelimit: 65630 callbacks suppressed [ 567.806944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.825011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.837058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.849152][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.861292][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 567.873368][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 567.885829][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.898008][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.910078][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.922178][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.857367][T28565] device bridge_slave_0 left promiscuous mode [ 570.277346][T28613] tap0: tun_chr_ioctl cmd 1074025677 [ 570.289196][T28613] tap0: linktype set to 805 [ 570.389147][T28632] device syzkaller0 entered promiscuous mode [ 570.521895][T28635] device syzkaller0 left promiscuous mode [ 571.167051][T28657] device syzkaller0 entered promiscuous mode [ 572.816891][ C1] net_ratelimit: 63385 callbacks suppressed [ 572.816904][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 572.835097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.847163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.859170][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.871176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.883229][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 572.895348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 572.907567][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.919619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.931614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.808473][T28849] syz.4.8276[28849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 575.313565][T28874] device veth0_vlan left promiscuous mode [ 575.506337][T28874] device veth0_vlan entered promiscuous mode [ 577.350256][T28968] syzkaller0: refused to change device tx_queue_len [ 577.566789][T28974] device syzkaller0 entered promiscuous mode [ 577.827048][ C1] net_ratelimit: 64029 callbacks suppressed [ 577.827061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.845011][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.857077][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.869074][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.881297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 577.893314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 577.905490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.917645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.929628][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.941662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.297653][T29001] device syzkaller0 entered promiscuous mode [ 579.077415][T29029] device syzkaller0 entered promiscuous mode [ 579.134832][T29045] device syzkaller0 entered promiscuous mode [ 581.347827][T29121] device wg2 left promiscuous mode [ 582.413310][T29152] device syzkaller0 entered promiscuous mode [ 582.839443][ C1] net_ratelimit: 46550 callbacks suppressed [ 582.839470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.858572][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.872924][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.885998][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.898645][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 582.913274][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 582.927505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.945845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.958857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.972914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.695806][T29199] device syzkaller0 entered promiscuous mode [ 583.716615][T29204] device syzkaller0 left promiscuous mode [ 584.280596][T29257] device syzkaller0 entered promiscuous mode [ 586.916990][T29402] device syzkaller0 entered promiscuous mode [ 587.847221][ C1] net_ratelimit: 60933 callbacks suppressed [ 587.847259][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.866087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.878778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.891262][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 587.903845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 587.917632][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.930543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.943254][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.955902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.968702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 588.183824][T29461] tap0: tun_chr_ioctl cmd 1074025692 [ 591.002833][T29559] device syzkaller0 entered promiscuous mode [ 591.881845][T29622] device wg2 left promiscuous mode [ 592.856940][ C1] net_ratelimit: 60679 callbacks suppressed [ 592.856952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.875059][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.887054][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.899052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.911112][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 592.923106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 592.935687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.947764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.959754][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.971757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.998291][T29769] ÿÿÿÿÿÿ: renamed from vlan1 [ 595.023089][T29788] device syzkaller0 entered promiscuous mode [ 595.311707][T29791] device syzkaller0 entered promiscuous mode [ 596.932777][T29868] device syzkaller0 entered promiscuous mode [ 597.867166][ C1] net_ratelimit: 69185 callbacks suppressed [ 597.867197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.885798][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.899961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 597.914325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.927151][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.940709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.953592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.966981][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.979533][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 597.993937][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.397343][T29947] @0Ù: renamed from bond_slave_1 [ 600.407631][T29959] device sit0 entered promiscuous mode [ 601.253891][T29985] device syzkaller0 entered promiscuous mode [ 602.876878][ C1] net_ratelimit: 55838 callbacks suppressed [ 602.876892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.894918][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.906921][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 602.919197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.931264][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.943294][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.955312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.967610][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.979600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 602.991827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.835313][T30143] device syzkaller0 entered promiscuous mode [ 607.886972][ C1] net_ratelimit: 58421 callbacks suppressed [ 607.886985][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.905097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.917088][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.929076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.941119][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.953108][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 607.965353][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.977409][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.989395][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.001436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.461939][T30270] device veth0_vlan left promiscuous mode [ 608.511391][T30270] device veth0_vlan entered promiscuous mode [ 610.379859][T30363] device syzkaller0 entered promiscuous mode [ 612.622301][T30453] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 612.684586][T30457] device syzkaller0 entered promiscuous mode [ 612.896882][ C1] net_ratelimit: 65197 callbacks suppressed [ 612.896897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.914936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 612.927177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.939257][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.951271][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.963311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.975372][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.987425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 612.999914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.012020][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 614.592188][T30537] device syzkaller0 entered promiscuous mode [ 615.191418][T30549] device syzkaller0 entered promiscuous mode [ 615.305746][T30549] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 617.906881][ C1] net_ratelimit: 63229 callbacks suppressed [ 617.906895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.925000][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.937063][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 617.949404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.961454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.973434][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.985420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.997508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.009581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 618.021802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 619.880130][T30649] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.976984][T30649] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.008034][T30649] device bridge_slave_0 entered promiscuous mode [ 620.075480][T30649] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.096744][T30649] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.104542][T30649] device bridge_slave_1 entered promiscuous mode [ 620.368865][T30649] bridge0: port 2(bridge_slave_1) entered blocking state [ 620.375924][T30649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 620.383232][T30649] bridge0: port 1(bridge_slave_0) entered blocking state [ 620.390293][T30649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 620.940262][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.983592][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.122260][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 621.133075][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 621.347907][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 621.497517][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 621.733920][ T3759] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.741081][ T3759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 621.996513][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 622.015164][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 622.025181][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.032237][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 622.367396][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 622.376045][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 622.384193][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 622.392339][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 622.417134][T30649] device veth0_vlan entered promiscuous mode [ 622.439360][T30649] device veth1_macvtap entered promiscuous mode [ 622.658228][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 622.691149][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 622.750559][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 622.817169][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.825407][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 622.833848][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 622.842219][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 622.861560][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 622.878702][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 622.895973][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 622.905032][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 622.916948][ C1] net_ratelimit: 60215 callbacks suppressed [ 622.916960][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.935016][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.946993][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.958961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.971031][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.983026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 622.995298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.007336][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.019399][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.031459][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.118282][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 623.138871][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.131981][T30771] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.443030][T30771] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.453860][T30771] device bridge_slave_0 entered promiscuous mode [ 626.490699][T30771] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.497770][T30771] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.506531][T30771] device bridge_slave_1 entered promiscuous mode [ 627.350160][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.377136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.657891][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.687122][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.858382][ T3759] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.865587][ T3759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.874639][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 627.883237][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.910483][ T3759] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.917582][ T3759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.926834][ C1] net_ratelimit: 65922 callbacks suppressed [ 627.926845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.944861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 627.957151][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.969279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.981269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.993265][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.005475][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.017453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:c2:87:98:55:95:6b, vlan:0) [ 628.022142][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 628.029842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.049109][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.085740][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 628.122714][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 628.142752][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 628.164312][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 628.213797][ T327] device veth0_to_bridge left promiscuous mode [ 628.223296][ T327] bridge0: port 3(veth0_to_bridge) entered disabled state [ 628.232787][ T327] device bridge_slave_1 left promiscuous mode [ 628.239420][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.247324][ T327] device bridge_slave_0 left promiscuous mode [ 628.253869][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.265491][ T327] device veth1_macvtap left promiscuous mode [ 628.421160][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 628.429871][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.457725][T30771] device veth0_vlan entered promiscuous mode [ 628.479116][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 628.505719][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.526419][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.534458][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.578465][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 628.586890][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 628.595597][T30771] device veth1_macvtap entered promiscuous mode [ 628.642226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 628.651085][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 628.660809][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 628.669320][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 628.679197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.121545][T30968] device team_slave_1 entered promiscuous mode [ 630.135443][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 630.157163][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 630.267156][ T327] device veth0_to_team left promiscuous mode [ 630.273441][ T327] Ÿë: port 1(veth0_to_team) entered disabled state [ 630.287725][ T327] device macsec0 left promiscuous mode [ 630.312809][ T327] nr0: port 1(macsec0) entered disabled state [ 630.967051][T30993] device team_slave_1 entered promiscuous mode [ 630.986168][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 630.996660][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 632.358009][T31042] device veth1 entered promiscuous mode [ 632.734022][T31052] device syzkaller0 entered promiscuous mode [ 633.708680][T31087] device syzkaller0 entered promiscuous mode [ 634.024903][T31099] device sit0 left promiscuous mode [ 634.322322][T31107] device sit0 entered promiscuous mode [ 636.817504][T31258] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 636.826658][T31258] device syzkaller0 entered promiscuous mode [ 636.843083][T31259] device syzkaller0 entered promiscuous mode [ 636.919253][T31261] device syzkaller0 entered promiscuous mode [ 637.144887][T31288] device syzkaller0 entered promiscuous mode [ 637.276469][T31301] device syzkaller0 entered promiscuous mode [ 637.658181][T31324] device syzkaller0 entered promiscuous mode [ 638.015341][T31370] device dummy0 entered promiscuous mode [ 638.135107][T31374] device syzkaller0 entered promiscuous mode [ 638.251015][T31387] device syzkaller0 entered promiscuous mode [ 638.372915][T31397] device syzkaller0 entered promiscuous mode [ 638.832352][T31418] device syzkaller0 entered promiscuous mode [ 639.126617][T31432] device aaaaaaaaaaaaaaa entered promiscuous mode [ 640.430436][T31517] Ÿë: port 1(vlan1) entered blocking state [ 640.436630][T31517] Ÿë: port 1(vlan1) entered disabled state [ 640.443487][T31517] device vlan1 entered promiscuous mode [ 641.337356][T31599] device syzkaller0 entered promiscuous mode [ 641.974010][T31647] device syzkaller0 entered promiscuous mode [ 642.565936][T31697] €Â0: renamed from pim6reg1 [ 642.938362][T31732] device syzkaller0 entered promiscuous mode [ 642.945704][T31718] device veth0_vlan left promiscuous mode [ 642.963769][T31718] device veth0_vlan entered promiscuous mode [ 642.986252][T31732] device sit0 entered promiscuous mode [ 643.401310][T31775] device syzkaller0 entered promiscuous mode [ 643.715548][T31806] tap0: tun_chr_ioctl cmd 1074025677 [ 643.736468][T31806] tap0: linktype set to 270 [ 643.776816][T31802] device syzkaller0 entered promiscuous mode [ 643.955874][T31813] device sit0 entered promiscuous mode [ 644.102261][T31822] device veth1_macvtap left promiscuous mode [ 644.142762][T31822] device veth1_macvtap entered promiscuous mode [ 644.238878][T31822] device macsec0 entered promiscuous mode [ 645.152746][T31864] device syzkaller0 entered promiscuous mode [ 645.168737][T31864] device veth1_macvtap left promiscuous mode [ 645.212895][T31864] device veth1_macvtap entered promiscuous mode [ 645.236934][T31864] device macsec0 entered promiscuous mode [ 645.782506][T31903] device wg2 entered promiscuous mode [ 647.238254][T32043] device sit0 left promiscuous mode [ 647.569451][T32069] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 647.618620][T32069] device syzkaller0 entered promiscuous mode [ 649.044636][T32191] device veth1_macvtap left promiscuous mode [ 649.068349][T32192] device veth1_macvtap entered promiscuous mode [ 649.127609][T32192] device macsec0 entered promiscuous mode [ 649.590045][T32214] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.597292][T32214] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.234851][T32237] device syzkaller0 entered promiscuous mode [ 650.780933][T32315] device syzkaller0 entered promiscuous mode [ 651.124994][T32334] device syzkaller0 entered promiscuous mode [ 653.550685][T32445] syzkaller0: refused to change device tx_queue_len [ 653.782225][T32474] device syzkaller0 entered promiscuous mode [ 655.453470][T32573] device syzkaller0 entered promiscuous mode [ 659.316617][ T346] ªªªªªª™™: renamed from vlan0 [ 660.682471][ T423] device syzkaller0 entered promiscuous mode [ 661.308783][ T461] device veth1_macvtap left promiscuous mode [ 661.316978][ T461] device macsec0 left promiscuous mode [ 662.423723][ T511] device syzkaller0 entered promiscuous mode [ 663.087915][ T518] device syzkaller0 entered promiscuous mode [ 664.325999][ T623] device syzkaller0 entered promiscuous mode [ 665.075124][ T681] device bond_slave_0 entered promiscuous mode [ 665.091657][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 665.105665][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 665.427631][ T707] bridge0: port 3(veth1) entered blocking state [ 665.433954][ T707] bridge0: port 3(veth1) entered disabled state [ 665.440567][ T707] device veth1 entered promiscuous mode [ 665.446310][ T707] bridge0: port 3(veth1) entered blocking state [ 665.452694][ T707] bridge0: port 3(veth1) entered forwarding state [ 665.477365][ T712] device veth1 left promiscuous mode [ 665.482910][ T712] bridge0: port 3(veth1) entered disabled state [ 665.622212][ T759] : port 1(syz_tun) entered blocking state [ 665.629521][ T759] : port 1(syz_tun) entered disabled state [ 665.636138][ T759] device syz_tun entered promiscuous mode [ 665.732209][ T766] device syzkaller0 entered promiscuous mode [ 665.841963][ T777] device syzkaller0 entered promiscuous mode [ 665.901761][ T783] device  entered promiscuous mode [ 666.549145][ T855] device pim6reg1 entered promiscuous mode [ 666.721090][ T873] nr0: port 1(macsec0) entered blocking state [ 666.738779][ T873] nr0: port 1(macsec0) entered disabled state [ 667.451780][ T953] device syzkaller0 entered promiscuous mode [ 669.576919][ T1080] : port 2(ip6gretap0) entered blocking state [ 669.587157][ T1080] : port 2(ip6gretap0) entered disabled state [ 669.609229][ T1080] device ip6gretap0 entered promiscuous mode [ 669.697263][ T1081] device ip6gretap0 left promiscuous mode [ 669.703262][ T1081] : port 2(ip6gretap0) entered disabled state [ 669.768817][ T1096] device syzkaller0 entered promiscuous mode [ 669.779123][ T1093] ÿÿÿÿÿÿ: renamed from vlan1 [ 669.828337][ T1099] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.844766][ T1104] device syzkaller0 entered promiscuous mode [ 669.933532][ T1110] device sit0 entered promiscuous mode [ 670.007286][ T1116] batadv0: tun_chr_ioctl cmd 1074025692 [ 670.846463][ T1173] device veth1_macvtap left promiscuous mode [ 670.912199][ T1173] device veth1_macvtap entered promiscuous mode [ 671.378826][ T1194] tap0: tun_chr_ioctl cmd 1074025677 [ 671.384168][ T1194] tap0: linktype set to 6 [ 672.278954][ T1231] device syzkaller0 entered promiscuous mode [ 672.955297][ T1263] device sit0 left promiscuous mode [ 673.805328][ T1287] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.812504][ T1287] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.820194][ T1287] device bridge_slave_0 entered promiscuous mode [ 673.828818][ T1287] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.835904][ T1287] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.844750][ T1287] device bridge_slave_1 entered promiscuous mode [ 674.085142][ T1287] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.092217][ T1287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 674.099480][ T1287] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.106502][ T1287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 674.150969][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 674.159082][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.166264][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 674.175458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 674.183679][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.190745][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 674.200064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 674.208429][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 674.215557][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 674.277103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 674.286221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 674.333142][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 674.363516][ T1287] device veth0_vlan entered promiscuous mode [ 674.370022][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 674.378072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 674.385519][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 674.428907][ T1287] device veth1_macvtap entered promiscuous mode [ 674.442105][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 674.461713][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 674.470186][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 674.541313][ T1317] : port 1(ip6gretap0) entered blocking state [ 674.547587][ T1317] : port 1(ip6gretap0) entered disabled state [ 674.554158][ T1317] device ip6gretap0 entered promiscuous mode [ 674.562259][ T1317] device ip6gretap0 left promiscuous mode [ 674.570903][ T1317] : port 1(ip6gretap0) entered disabled state [ 674.866235][ T1335] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 674.872559][ T1335] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 674.878991][ T1335] syzkaller0: Linktype set failed because interface is up [ 674.982427][ T9] device bridge_slave_1 left promiscuous mode [ 674.990980][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.083030][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.098288][ T9] device veth1_macvtap left promiscuous mode [ 676.593071][ T1419] device syzkaller0 entered promiscuous mode [ 676.729796][ T1421] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 676.744934][ T1421] syzkaller0: linktype set to 825 [ 677.145531][ T1459] device syzkaller0 entered promiscuous mode [ 678.885569][ T1540] device syzkaller0 entered promiscuous mode [ 679.738298][ T1607] device syzkaller0 entered promiscuous mode [ 680.781741][ T1647] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.789678][ T1647] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.797423][ T1647] device bridge_slave_0 entered promiscuous mode [ 680.807626][ T1647] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.856905][ T1647] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.879631][ T1647] device bridge_slave_1 entered promiscuous mode [ 681.049522][ T1647] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.056615][ T1647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.063929][ T1647] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.070970][ T1647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.132417][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.139824][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.173922][ T1675] device syzkaller0 entered promiscuous mode [ 681.277515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 681.289403][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 681.324031][ T1677] device syzkaller0 entered promiscuous mode [ 681.382326][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 681.394072][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 681.412133][ T327] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.419219][ T327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.560368][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 681.575530][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 681.625645][ T327] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.632741][ T327] bridge0: port 2(bridge_slave_1) entered forwarding state [ 681.711171][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 681.759820][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 681.800010][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 681.817549][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 681.855025][ T1647] device veth0_vlan entered promiscuous mode [ 681.903318][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 681.918417][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 682.008272][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 682.046697][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.073795][ T1647] device veth1_macvtap entered promiscuous mode [ 682.088117][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.098729][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 682.111573][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 682.140359][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 682.149556][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.178786][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 682.188489][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 682.198356][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 682.206600][ T3759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 682.953659][ T1775] tun0: tun_chr_ioctl cmd 1074025677 [ 682.986981][ T1775] tun0: linktype set to 804 [ 683.748723][ T1829] -: renamed from syzkaller0 [ 684.315416][ T1858] ªªªªªª™™: renamed from vlan0 [ 685.197051][ T1944] device veth0_vlan left promiscuous mode [ 685.213815][ T1944] device veth0_vlan entered promiscuous mode [ 685.234711][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 685.254300][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 685.285077][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 685.305410][ T1950] device wg2 left promiscuous mode [ 685.408092][ T1967] -: renamed from syzkaller0 [ 685.580676][ T1976] ------------[ cut here ]------------ [ 685.586263][ T1976] kernel BUG at kernel/bpf/arraymap.c:993! [ 685.670277][ T1976] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 685.676530][ T1976] CPU: 0 PID: 1976 Comm: syz.1.9876 Tainted: G W syzkaller #0 [ 685.685290][ T1976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 685.695371][ T1976] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 685.701625][ T1976] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 685.721239][ T1976] RSP: 0018:ffffc90001017c88 EFLAGS: 00010293 [ 685.727324][ T1976] RAX: ffffffff817b4f8b RBX: ffff88811a755ed0 RCX: ffff8881225762c0 [ 685.735329][ T1976] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 685.743306][ T1976] RBP: ffffc90001017d08 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 685.751285][ T1976] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 685.759271][ T1976] R13: ffff88812632cd80 R14: 0000000000000001 R15: ffff88812632cd00 [ 685.767272][ T1976] FS: 00007fbfc79f46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 685.776216][ T1976] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 685.782815][ T1976] CR2: 00007fbfc8fe6e80 CR3: 0000000137012000 CR4: 00000000003506b0 [ 685.790801][ T1976] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 685.798787][ T1976] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 685.806778][ T1976] Call Trace: [ 685.810092][ T1976] ? bpf_prog_178c55262a54958c+0xb/0x788 [ 685.815757][ T1976] fd_array_map_delete_elem+0x14c/0x250 [ 685.821324][ T1976] map_delete_elem+0x336/0x510 [ 685.826109][ T1976] __se_sys_bpf+0x40b/0x740 [ 685.830623][ T1976] ? __x64_sys_bpf+0x90/0x90 [ 685.835241][ T1976] ? __kasan_check_read+0x11/0x20 [ 685.840269][ T1976] __x64_sys_bpf+0x7b/0x90 [ 685.844692][ T1976] do_syscall_64+0x31/0x40 [ 685.849121][ T1976] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 685.855208][ T1976] RIP: 0033:0x7fbfc8f99799 [ 685.859665][ T1976] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 685.879286][ T1976] RSP: 002b:00007fbfc79f4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 685.887722][ T1976] RAX: ffffffffffffffda RBX: 00007fbfc9212fa0 RCX: 00007fbfc8f99799 [ 685.895712][ T1976] RDX: 0000000000000020 RSI: 00002000000007c0 RDI: 0000000000000003 [ 685.903703][ T1976] RBP: 00007fbfc902fc99 R08: 0000000000000000 R09: 0000000000000000 [ 685.911681][ T1976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 685.919663][ T1976] R13: 00007fbfc9213038 R14: 00007fbfc9212fa0 R15: 00007ffcd36efa68 [ 685.927658][ T1976] Modules linked in: [ 686.246869][ T1976] ---[ end trace 78b3241b1bd29ea4 ]--- [ 686.254576][ T1976] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 686.260926][ T1976] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 686.280694][ T1976] RSP: 0018:ffffc90001017c88 EFLAGS: 00010293 [ 686.287053][ T1976] RAX: ffffffff817b4f8b RBX: ffff88811a755ed0 RCX: ffff8881225762c0 [ 686.295183][ T1976] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 686.305153][ T1976] RBP: ffffc90001017d08 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 686.313243][ T1976] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 686.322572][ T1976] R13: ffff88812632cd80 R14: 0000000000000001 R15: ffff88812632cd00 [ 686.330706][ T1976] FS: 00007fbfc79f46c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 686.341598][ T1976] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 686.348203][ T1976] CR2: 0000001b30910ff8 CR3: 0000000137012000 CR4: 00000000003506a0 [ 686.356220][ T1976] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 686.364259][ T1976] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 686.372682][ T1976] Kernel panic - not syncing: Fatal exception [ 686.379044][ T1976] Kernel Offset: disabled [ 686.383376][ T1976] Rebooting in 86400 seconds..