last executing test programs: 23.17929654s ago: executing program 0 (id=9693): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) close(r0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) close(0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r5, &(0x7f0000000280), &(0x7f0000000000), 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x75, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x9c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 23.077721511s ago: executing program 0 (id=9696): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 22.947841084s ago: executing program 0 (id=9698): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES64=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) (async, rerun: 32) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x8) (async, rerun: 64) sendmsg$tipc(r1, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) (async, rerun: 64) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) (async) sendmsg$tipc(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x7f, 0xef0, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)="b9c83d5f40f72ab5", &(0x7f0000000ec0)="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", 0x402, r9}, 0x38) (async) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000000)={0x0, &(0x7f00000004c0)=""/233, &(0x7f00000001c0), &(0x7f0000000240), 0x6, r9}, 0x38) 22.815868856s ago: executing program 0 (id=9702): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x2, 0x5, &(0x7f00000001c0)=ANY=[], 0x0, 0x5, 0x93, &(0x7f0000000100)=""/147, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000080)={'bridge_slave_1\x00'}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'pim6reg\x00', 0x1811}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f0000000180)={'batadv0\x00', 0x400}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0004000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009501000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB="0040000015000000000000000011000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) 22.633937259s ago: executing program 0 (id=9706): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000005c0), 0x12) r7 = openat$cgroup_freezer_state(r3, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r7, &(0x7f00000000c0)='THAWED\x00', 0x7) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r8 = perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0xffffffffffffffff, 0x4000000000000009, r8, 0xa) close(r1) 22.098737406s ago: executing program 1 (id=9712): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)}, {&(0x7f0000000140)="ec", 0x1}, {0x0}], 0x308}, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000800000000000000000000000052ed2d49fcbc470939931263cff9affb042e6322e24cac5288632b1c51e8c106907272714c01444eb11e7da71bd25d30223aa5bf17c885f895bc08f34d4b1eb040c8c70878f6852b6f8d5431a3cb5c08716b87a97fc0aef93cdd8fb7be90e06a1b45841a5ee6ada38043f4c5f1256646ce0ab713f17e0a309fe761267661d2fe0c35aac2ff8d82bc40f397a161e912c2ecb29e6a0c7201afc1b306cc4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1d, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000340), 0xffffffffffffff87) close(0xffffffffffffffff) r5 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) recvmsg$unix(r2, &(0x7f0000000b40)={&(0x7f00000004c0), 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/57, 0x39}, {&(0x7f00000005c0)=""/202, 0xca}, {&(0x7f00000006c0)=""/37, 0x25}, {&(0x7f0000000700)=""/220, 0xdc}, {&(0x7f0000000c80)=""/186, 0xba}, {&(0x7f00000008c0)=""/249, 0xf9}], 0x6, &(0x7f0000000800)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x40000000) write$cgroup_pid(r5, 0x0, 0x0) openat$cgroup_ro(r6, &(0x7f0000000880)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r9}, 0x10) 21.21356131s ago: executing program 1 (id=9716): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) syz_clone(0x24084200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)) (async, rerun: 32) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r1, &(0x7f0000000980), 0x20000992) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r1, 0xffffffffffffffff}, 0x0, 0x0}, 0xffffffffffffff05) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x240) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000008c0)="a18b5ecac78f3ac5", 0x8}], 0x1}, 0x8008) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)=@abs, 0x6e, 0x0}, 0x0) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="b9180bb7600a070c009e40f086dd1fff310005e03300fd010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 21.159091141s ago: executing program 1 (id=9718): bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="090000000800000004000000094000000a000000", @ANYRES32], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000140)={'veth0_macvtap\x00', 0x200}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000e30000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) 20.748501067s ago: executing program 3 (id=9725): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r4, &(0x7f0000000180)={'some', 0x20, 0x92, 0x20, 0xedda}, 0x2f) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) 20.700119748s ago: executing program 1 (id=9727): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x881) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000200)="948218012bdc2920ba15851ac558", &(0x7f00000004c0)=""/4096}, 0x20) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_type(r4, &(0x7f0000000100), 0x9) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f0000000100)="e0b954", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) 20.617571609s ago: executing program 3 (id=9728): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f00000100000012"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffad, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000001c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000740), 0x80000002, r0}, 0x38) (async) 20.58014117s ago: executing program 1 (id=9729): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000480)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000400)={r0, 0x0, &(0x7f0000002780)=""/4120}, 0x20) 20.54852043s ago: executing program 2 (id=9730): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='percpu_free_percpu\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000c200"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="000000000000004e10ef34f4c9ea4300000000000000000000000000eb14f742eb05c1f4bf25e3e4d4bfa8e9c62e0d9b1f5a8c2a788b4261312b2866b7475f7590cc6636506afa903170785b194986387eba75c1014ba606d692633c6d755d51f896902bdd2f858280168b0cb58fe4383386e964242c6612b83a0568750518af6d049bf86214fb727db5ed2e4215e00a8aded8b778ed8eb24b2fa835cf216f18782c5a2dbe8cdfe910cb681e1e70fb2fa323d94ccd7c93ff688484"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r4, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079122800000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x0, 0xa, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x18, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000500000000000000030000001858000000000000000000000000000018110000", @ANYRES32=r6], &(0x7f00000004c0)='GPL\x00', 0x800, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780), &(0x7f00000007c0)=[{0x2, 0x2, 0x3, 0x5}, {0x3, 0x3, 0xb, 0x3}, {0x4, 0x5, 0x10, 0x6}, {0x2, 0x4, 0x3, 0xb}, {0x4, 0x5, 0x2, 0x1}], 0x10, 0xb, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r4, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000440)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f60bdd3c2aa9601456e3bdfd0d883f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b48bf64b442ded12f27d5c1fefd49050ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd9075084f34b", 0x73, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000600)=@base={0xa, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 20.427529682s ago: executing program 1 (id=9731): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000900000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300b70000000000000095000000000000f3641eeead282d5d00"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00000000000000120000f1850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r3, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f0000000880)={&(0x7f00000007c0)=""/176, 0xb0, 0x0, &(0x7f00000006c0)=""/99, 0x63}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x3, &(0x7f0000000380)=@raw=[@call={0x85, 0x0, 0x0, 0x49}, @exit, @generic={0x8a, 0x5, 0x7, 0x23b8, 0x516}], &(0x7f00000003c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x12, '\x00', r7, @fallback=0x1c, r6, 0x8, &(0x7f0000000680)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, r8, r4, 0x3, &(0x7f0000000900)=[r1, r3], &(0x7f0000000940)=[{0x2, 0x1, 0xc, 0xc}, {0x5, 0x2, 0x1, 0x5}, {0x5, 0x3, 0x2, 0x8}], 0x10, 0x0, @void, @value}, 0x94) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, &(0x7f0000000980), 0x20000992) openat$cgroup_subtree(r9, &(0x7f0000000a80), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r11, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 20.272022925s ago: executing program 4 (id=9732): socketpair(0x26, 0x6, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2d, 'hugetlb'}, {0x2d, 'hugetlb'}, {0x0, 'pids'}, {0x2d, 'io'}]}, 0x1c) recvmsg$unix(0xffffffffffffffff, &(0x7f0000003380)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000003280)=[{&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/254, 0xfe}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/16, 0x10}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x6, &(0x7f0000003300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}, 0x2043) r7 = perf_event_open$cgroup(&(0x7f0000003480)={0x3, 0x80, 0xe, 0x2, 0x7f, 0x80, 0x0, 0x3, 0x89744, 0xb, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000003440), 0x1}, 0x8000, 0x9, 0x1000, 0x5, 0x1, 0x9f8, 0xe, 0x0, 0x10, 0x0, 0x7000000000000000}, r3, 0x9, r1, 0x6) perf_event_open(&(0x7f00000033c0)={0x3, 0x80, 0x6, 0x23, 0x8, 0x0, 0x0, 0x4, 0x4100, 0x9, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x6}, 0x180, 0x9, 0x800, 0x2, 0xfffffffffffffffb, 0x5, 0x4, 0x0, 0x7fff, 0x0, 0x2}, r5, 0xffffffffffffffff, r7, 0x9) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000003500)={r2}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000003540)='hugetlb') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000047c0)={r3, 0x0, 0xc4, 0x4, &(0x7f0000003580)="c759319bc2985c4b9e20ffc9f90cce4d59e8f96bbdb9ddf7b131786afd300178c0222774fb574126e46ce461e474a1486b55e20fa25215c220b5ed64bef349d119e07f73970401dbf38d892033f467d31b9c829c285dc32bb4fc975eb7974cc3503eceb8ee01b5de95e9338e696c81b61efe52ed66b7f5a14698264b749c4a4aefa211b888c022638620d782b38770a4589f95df90fc1a5870b8a6c43ebfd31d984f9ee553450745f27521a1cc42b74285150a0d18b725b303233e6b4b711d66527d90a1", &(0x7f0000003680)=""/4, 0x6, 0x0, 0xc4, 0x1000, &(0x7f00000036c0)="36dabb3400546e848f6ed59fe757511d37bc0da159cc6151f816da84b1d319a4c3952e30d306b6b0daeb77ce920d12da13d092e2c568fc9039926c6606f1c18c4a89eda65bc8237b63b193be9bcb80d131cc819ab91fecafec557a85f9d59553790e371200650fd49d0c27df833467f1ff59772a6ff674e1593f5e9533855b1dc9b62071a2d66bd961d074c4770e19d087e618c1c1bf3aa4c3a09c34eb466809a4ea3d06e532ddcd72a8d0a443ec4b845efa9aa6cd32f34e9799668856375ef0678c353e", &(0x7f00000037c0)="a57186efe71b6215309838b30c5ec8b082af5401a1e42e265e0c95ccd3806197944577801962358a1eecdda08737f3e7e2caa2263a0cbb03b1dbd127bb7a52e51809315de730c71e309b2533f2b2033b84f667147e663f81c122f1d16b944e8cbac391ee761d0432380cf56b1ff15e2e177acc8e34651fa20a13901729561e24488ad1bd28a15e63c87365208ea5eaf9cdba08d6a3788e94af47ec5b2a6543c78315ce20cb0c7c11bb9f3bc4fe81a9f7999f744f70af70652b103c0ab100cf3346e8302b5a63ea264ee19110520d646fc825fff0748e711be71ee1cf112d7e78179c74d2149ee8766981640d657be08a1ff45615b5062860eccdca507db66f850810b84e53ec142aa8c2806cb5b238ba4e81641378084e577d03b3d536a8862573ae635099009bc572215dd49a8b6e624c72da60b4a7cca20bd40adbf2749eabdc84103b4d8680574efcca7339740312087b90523469e34f8fd5f3c5c8d143ff56dc6620bb43a5fe54dfba407050e89494ffb6060f18ea46ea7a910b752d091654cb7df0cda0b191bf71650da8cbb7c229785492ba781a239aa22e9921e2136f883c90a8bdfac9accb6b548eb5f7c695bf9af052d19e2520d550ce6c9805375ad1851643e27ec24b79fba21ed019fd606cd95596324b257670d7cf376b1a30e0d37ab9be8c3f0e424cb4a07c89311a2e656d16faccea333cef78b9770ecb8ab5272c1c3599ea6e19604645f4bf742a51de486e4d81d84831f45ee2f20e8c1e111c1ef6288b86211fdf631c7596f5e32be9144a973bdf68a56a5c5f64b9cd693cd5f5437fa4a1f35100056fb1a92568ed4275ea999184e571bfda320914efc1a8838e6a786d977f13e7c88800249182c6aeaadd0804ea69040beaab8ec0d2e77cd90b80cf6945a20833c71b19436914ece0f6f1b8fc88a3626d90982187fab0cfcc5bd53cc282974bbfc0d6214c251e9766ef510e0ffd7c8acebc3dbf230483815850886670d5d15e2ccbbced5df6334fd49e144ba80120cc5e0913cb74ef3e45eb3e977d3891afedead6f85edc5613fd9bdc515c361ad4bd8a390fcbe1ccf89d43338de10748fbefdb2b3db7f9b8c223549c7b8ce5094f99299d50f6f48fa7703a0e73c8b16cfe9613856f350073fbe7371b0f6ab7fda1093ec0332ea2156efac75ee65e362455d226cf6ac4df9a5789312b0af886cc02e01eca55ed6719aa70fdfbc43e85a5ae8d334046e7bb4caa102ae7a2e280bceefc179b9dbea9abb7f67412fb7708a0afdb2668be461a2f3434efb36c357736e7addd3ea30e8de114f170f1313f3e7de0f25f3804d2958b0db94a5cad0aa5a6d22621b2869ff38f247474cc0f0c51b4fbd06989fcae100b9817800e57977e5a1cbbd9bed6321a660d881a528fe1eb5a93df3dc417bc972cb168be3fd051f652b44990196f1940f0c69c3a2b840f5700c69f29dec7c5c2a862b83733855f802d68d13fa998d5bd311294a96bdf5d0aa855c995ccbb2110f1ef134a8fa5a614d6e36e6ee3bcda4f3053cf61f0da9baac540eebdde3dbc5fbc43d368de58b3496a60454ae047798f694f7fb54d61a3e2f4e6632664bf1561926a89b96c494616ced7a3ec16325573d95ec62e20102e69a1dbcd60331033b48cd6a00abea9375671451a3885cc7813846b0929333311d66b88e8b34cef4c34f5cf57675a8ac3c323efa0cc914118c257339147b5d41ba224b9b9efa9b3aa307556d31e51d414f6bbb906ba1518bc80f888712301dec1dd21625083f5d7199b2e52ee7e0c0a8b6a8ebc0070d6e59fb748fc7ec3937b92d38d9e730a663abc3f5e872c8c8b39930cd38a955c679eeac94629bb09c09af535518c959cfc96f5ccf180e633bdb6885f2b74b3d3a99730104f37da51e10cdd37c4c4cd4466419930632eefabb34d11b67e83ca27cdaa1e89585a8606f6bf60fb44593c7187984031518da41b31da47ad328e1000775ab4a40803a5972d35fab21565eb285b4c32c86ec096e23e8bc82b0baa198e9361b24922879efff11ddf5bac446ce9a349ac126b0d9d35332cb9ddd94ba6b308395765df66cc522b98106972b123e01378fd656c675e79ea9855d79021d1548c685c56e86ccae51ac9ddb4a697e06f795b33ebb52d7825903656f7c5ce3f8e260465fbb020c3dfb04b48094b801b3874a87b2ac40147da719e2138a6b4bf2690052d4c63d3fbf89c978b4807a4f41f5815aff5615eaaca60571850520d6553722eb15cd9799b38c29fa1e2f30bb178eb652f5dc2b7f51a21320230eb0d54e6b4808189f700681a30c2a4117d1eada9ef926cc7ec1192b98c56408d641599e5095d557144e5370ffb8fe5ef02fc24dcbc996aa6941b4d353dd349d19584d3cee5369b631c3d2286bcd9358e6bfa67f8cb50c16f8cf5f07c57a56649bcf28e4c301cd81661eac3ea97d70eadc43d720b731e9be9d0681f389c71afde40159d3a1368ebd7c433957e8a1802f6b25e810465c01ce92d8977898f511f4ff9c0cf653cf16fb757bf57ab58a10dc17fae818c7e72385aca07871e69730f6cf8ec4dac7a8d6bd25e5648fcaf8c4046f25fa369da3b36a3a237f24dcdb08e46020e5f0a381596a77ed381aba822353ab3a2905b2b8cc9e0afc7f7a7434e09309ff37b885e8a1c7759407b8996b30690cf5f18bb2071bfe011238cf353c4ce779c127a1447da5bb3f1a71a5254818b9219fab2957cfe2946f22a19f4c683ef1064b6d0cd74edaabade6e6d2e411b0a0d9563c93a0f7f67ff910be9d5d3cd90b311362234a2eada1ac913fbe63cb8a0aba2f86316e5714e2aa40506f4c5de84413cd43ee96527c3a3ec75004d6d9623c5442b3ef98645315a985a16d40a52430ea1ccec156617093f70cb8869a66eaccc9366aa73afe903dac5f4f48bd7127fe60d26628ac6d5d717c1965ab2b77add811d1ccc602478f3d839bccf33940564d167c3b430d236921f106c1d0c17aa6535dde27ed8666b014cd5f6f811e2fe1afa08f331b65f9087790072a7a8f28b5755b1bb2cf031d9b5e178a01bed28b7ecac458f86a9c04ebd23b40d1c288bdf0cd51b9032d32af7d0bc119b717baa6dd2de9f7f4e24c32d5b03bf8d63db936866e21b152ebb33a34a6c71d3898e60444bf61bea497ebb91085efffa25199778df0dd1bfdf11c70fb1c62b5ccd873c7c4505c13bdd6c733be29210db150184aace863d60b0fa82d0cd57bf39aa3d20b767b94918fa233021a94e97bbe1d3ad3fe0af0809c5b865278795346047e00e0cb869be21b3db9088ff65c588df8b62e6bf43247f31d5a861bea87fe1cff62366581e96bb56dfc9104fb70ccf3b594b97fc172fe8c819f0ef20bfa887f6ac5e36f95ef5ad48bbcad523590b2ca151b2efc09aa98a7faf2997eb52818790111c01f75041fe68a77e9cac1337c19ccb7a68fdde0ce9f860e5f7f2605ba65be9d81a260fe47b9b6ae9c19e4e9093471a9ddfa7858130da79b08c0e0acbb734a6299d9905d6979e8c46501aa4aded5d1f4267d51b5634a56aef7b721a828bee79dd65f07b1f4cd327ec22c2a26d45ae2109c80f5fff73d05a6b9d81d4bd29cfdc8573bb323d0e2e25e82d8aabc52c67ec582bc5fd1c135309a397213a598190b5a13df3f2e52b3e68a2404251a830478498afb85b612138984cdeb3a36bcb7da56ae727fc18626997fc6c05aa1e7f2e3d8d472c9d49d5b4dc25fa6ae81122a445ab8fa59de31cfd2e31fa2e908a30f09c1b0b038cc5a021f7a4cdb0e84dffb7796331d6cdc10b15468501aface9db3a478bf983156d0e5f8d1f7174e6d007f431d0de3964a2c119cb97771602cd78b372943d4f03f1635301d5ea0d744488a42a19b7daaf78b2e7390938060e7c7260273281f24ac00287cf66fb319344c9db85d72e141aaadddd66b9ad9f26279eb37a59ea3b0c0c521ffe1ebcdfd43edec0598edba6afde4d979487c6a0416120056344eb55d7486bc961c8339afc7f4ebbc831a421e1e766910e9babf520357f9b282d804bc5b1c43d057754066dad75b88301deb479973e8eacd42e70c37e81cc014f386e655cc95deb67cac3c5e4c9bd4ff5f40175b543f9e4fecf4802a3f3f551848c3eaea6a9d46356b89063f1d211ffa9d374c1ae787bb180a33375712d8b195f2375fa4cf3e0bea843a92e8eb8d25eaee3171ad0c3ee289d6f2881b60b6040c9ccf5694d6ada0abab737bf8ac32411a98e9c45b13a1e1dd7f94318a0e6da571ad952833af86210d1f48a87960d837c292ad2344928aa056b130f6954e19555eed40d2004a33dc35eab0efacd82888c947ff92087a7bc08bfbd0a6f6786f95e38356127e0b9c6482196d06cf996c72e00def12b6ee6f810b2e3d747e9dd6efd3006c078168dd1818a0dc678ab23f9788e1dfb6a1185ec29283af673b25c97c14b103db3ec6899f94955032ded4e5d52740b6bab738bee4519f17689f24bb5167abaf21e89084d9c7c1f09a28333a8968f787e24d9e51177a3990a39933956a9ae612fd5e3e711c78f33479f41efd2f600871f8d5db58add2aaeeec7aebcf65fa6da8161ef85a0132307573aa35a500ccf6e6ad9864b990c05e948c1f07b5f401dac1b61e5d231c2eb88e19118575f3d89f0a6138e4f3ee71180a17363d0540f76ac3f3f42a9b5ca76e0fadf70481366332839afe11e6ed43b74aedb7381f41dcae483eb83daa992f3cd314ef80cb0121613e5d9dac7f3d08027a54cdf59bdf9b0f328b12ef5b55f0ce3761c11c563452c44216a55f4f48a2f2934ed175f9d5263ca2907bd30830ae5070f355273b5259df2c01c0183fc21bfea97654ef2b1a23dcae2b3173decb779b3edf6d8ad14e7bb9c9cda851a17e84772403f221e5cd516da3d30e916ea89cbaa06b7af4bbc578762dac6147193e5f600f6c5200df1222f6eec7c56baa1f1a7ed73d2906b0ceb54a75036a5e86a9ee26c09fb2d98acd5980d1c11825aaef0c5954c3a93017a0914916dc9da6084b1661ffd53bfa470bf61ffebf3066f0de72bbbaf2f2b352f03f38dc70f0331d253399f61b0ebd188dc3328918719bc28298c7233389e98939dab66293425a1f8818b36e6d135d264caeb68971fd23dd7c5c40baf3b5a62d6e723832872dad8fb21731c4dcafda71a511a3965250d92b752363d2301709fec32d25deab0af793943c8ef7677bb4bd1ee5aff1aa0d5c7cc1eb78f5691fb1520b2802ef55099104e9f9a51fbd7d346ab44ee7b14b267569ca1f50deaec631c97eaf312454fb5d53f12c4c21db814460d0868c516c62fad6bdc3bf92de3147d5f662e9a1a60084500bae31d76661e468186a646c6d93ff284e6beec0f8d2fd62f3c4e1732f5f694d25289cfcfe073eaaa286a436651b0eb2813e5adbe3f42929a7146818c49a8904c389519835dec2295d5dd74efb695a344f65a91da050b3cdd584a9d0217d2b3c92e13d43323b3fed8b04ac6c80e075764e4096cc8fe289410eebb917b256f1025e945667e130cae714c9463c26b1c90a272026dfbbd13100d4e7954e847437c67f2c6e518978364bcb61655486e8b590b2c11f93e6f836b5de7013fd8f467c9974c455cdc35eab90ed1a5a9e023464f6f5a82106d0c9c378cd7890fe569a65be0cbca29fb014b016ffab51c1a027f39e0241ad3f7702bc96babfa28e1174a2bce2ac6d25e7bd5c61f9d30104d319df5fc796dd1144f13322e3c2342204bf456dbcc58fe2c32ac8bab45168b471b0be11d9efc8f877e2b2f41328b450a7bc344d01e13db73de4c34b4", 0x1}, 0x50) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000004840)) openat$cgroup_procs(r8, &(0x7f0000004880)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000048c0)={0x0, r4}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000004900), 0x10481, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000005c00)={r2, 0x20, &(0x7f0000005bc0)={&(0x7f0000005ac0)=""/96, 0x60, 0x0, &(0x7f0000005b40)=""/72, 0x48}}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000005cc0)={0x14, 0x1c, &(0x7f0000004940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xc1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @printk={@d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000004a40)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000004a80)=""/4096, 0x41000, 0x10, '\x00', 0x0, @lirc_mode2=0x10, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000005a80)={0x0, 0x1, 0x3, 0x3a}, 0x10, r10, 0xffffffffffffffff, 0x1, &(0x7f0000005c40)=[r9], &(0x7f0000005c80)=[{0x0, 0x1, 0xb, 0x4}], 0x10, 0x1000, @void, @value}, 0x94) syz_open_procfs$namespace(r5, &(0x7f0000005d80)='ns/time\x00') openat$cgroup_ro(r8, &(0x7f0000005dc0)='memory.numa_stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000005e00)={0x7ff, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000005e40)={r12}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000005ec0)={&(0x7f0000005e80)='rtc_alarm_irq_enable\x00', r6, 0x0, 0x3}, 0x18) recvmsg$unix(r1, &(0x7f0000006380)={&(0x7f0000005f00)=@abs, 0x6e, &(0x7f0000006240)=[{&(0x7f0000005f80)=""/2, 0x2}, {&(0x7f0000005fc0)=""/53, 0x35}, {&(0x7f0000006000)=""/100, 0x64}, {&(0x7f0000006080)=""/252, 0xfc}, {&(0x7f0000006180)=""/175, 0xaf}], 0x5, &(0x7f00000062c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x98}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f00000063c0), 0x246800, 0x0) syz_clone(0x2c0800, &(0x7f0000006400)="2bbc725f5a36d1700eb5588b736430e532d1dab95665f758e7de77bd954d7b4acaf3b02c30fb247d723726eb833d8887a2f6508efb3f62f03dfe40a49d47", 0x3e, &(0x7f0000006440), &(0x7f0000006480), &(0x7f00000064c0)="b3688736e3cfbde5126bb1f302e2b63a23cc855eb6b3caeba09337cf07eccdf15df37794d5db96563b1c79d9c88dbd835eb007ab0847a2fbf407e035e25a9e8dfd952e5a5c5f18d66044ffbcf40804be89be1ece3f6becc4b4998e5cc5c498604d534cb3a8cdc9588052e0976fe79009ddd5262f7cc6d86e591c8b68027c0ed5fc39e61558b56f1ad8b4c5d3c50c8a210f1eddfe1e48866dc642b755633451652e3b6e0fd3bb857aceeb10b4d31ceb646746e9a794bce682a229fda7c8a8ef61909efa909a65b02641e56ec3ff96cb893cdb13b37984") close(r11) r13 = openat$cgroup(r3, &(0x7f00000065c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r13, &(0x7f0000006600)='blkio.bfq.time\x00', 0x0, 0x0) write$cgroup_devices(r2, &(0x7f0000006640)={'c', ' *:* ', 'wm\x00'}, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000006940)={r4, 0xe0, &(0x7f0000006840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000006680)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000066c0)=[0x0], &(0x7f0000006700)=[0x0, 0x0], 0x0, 0x12, &(0x7f0000006740)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000006780), &(0x7f00000067c0), 0x8, 0x71, 0x8, 0x8, &(0x7f0000006800)}}, 0x10) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000006980)={0x0, 0x6, [@link_local, @multicast, @multicast, @random="f6b83e898d5f", @broadcast, @local]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000069c0)) 20.229632645s ago: executing program 4 (id=9733): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000840}, 0x4010) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6010, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4010, r3}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r4, r2}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) close(r0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000840}, 0x4010) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6010, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4010, r3}, 0x18) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r4, r2}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) (async) close(r0) (async) 20.169546506s ago: executing program 2 (id=9734): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x103000, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x8004745a, 0x12) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fib_table_lookup\x00', r1}, 0x10) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x86) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000181000000000", @ANYRES32, @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) close(r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r3) (async) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="9a50fdffffffffffe37e4c9d"], 0xc) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f00000002c0)=r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r4}, &(0x7f0000000300), &(0x7f0000000340)='%+9llu \x00'}, 0x20) (async) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0e00000004000000080000000200000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000039d261005e1313998b5a37ce9ad3fca78cd5da", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r7, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)=r7}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r8, &(0x7f0000000100), &(0x7f0000000040)=""/17, 0x2}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) (async) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='virtio_transport_recv_pkt\x00', r9}, 0x18) (async) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000140)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061120400000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 20.126825537s ago: executing program 2 (id=9735): perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3315}, 0xa000, 0xc8, 0x0, 0x5}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6c, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) syz_clone(0x80000000, &(0x7f00000004c0)="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", 0xfb, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000005c0)="f7b055d57bb8d7c0bc4728197b0503e003960877fc28e768a3b443813af8cff09b716dee49f33ddbd004ec39913494ca544d4e31c28c80a6c730e40d223cf987b9d819001342cb3693b4cf9fa0242aab91661215ab3ca75457ad9c32e6e680497b1e34488b36cfc639722b995014049429a20f8f3e0bdb9920fa4623857d17b52476931adc5c76ec4ba1d0cab73042e993e2ba2f81eef60e633d5744ea3fd9227d77e2fd0f42984b1175206a") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 20.107929318s ago: executing program 4 (id=9736): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 19.96171592s ago: executing program 2 (id=9737): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)="b3", 0x1}], 0x1}, 0x8c00) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0xc48, 0xc8, 0x0, 0x7, 0x0, 0x0, 0xfffe, 0x0, 0x80000, 0x0, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$unix(r6, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r7, &(0x7f00000004c0)=ANY=[], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697"], 0xfdef) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000009c0)=""/211, 0xd3}], 0x1}, 0x61) 19.939519281s ago: executing program 3 (id=9738): mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) (rerun: 32) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='@@\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fdffffff00"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b3063f040404b37d00e", 0x66}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) (async) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) (async) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x4004743d, 0x110e22fff6) (async) close(r5) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000200418110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7020000206a3cea000000850000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) (async) write$cgroup_type(r6, &(0x7f0000000280), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 19.903291551s ago: executing program 3 (id=9739): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000040000000000000000000000d9b4411c6c64e517cdd1e3f4f0683bbc49a00f8b7c5f6cd4a2eb5fd3430d042235f5f62b5a7aaee6653f17c9af5ae7ba6ab762464103cdfb3c259f443fef57c38702e63379b6063de6a9c40c02d0426f391c4d5576882b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r4], &(0x7f0000000500)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4891, 0x0, @perf_bp={0x0, 0x7}, 0xc00, 0xc8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 19.900793191s ago: executing program 4 (id=9740): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)={'bridge0\x00'}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x8f3, @mcast1, 0x7, 0x1}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)="4f126e6d68bfc39670562014109c12be226d6e8da2dbfb2a4c6ef0f9caadc7affd5657d0db32b86e9b795724ceba1f1e5e6367d97480bfffff1cff1f8f6d334ebfcf9b", 0x43}, {&(0x7f0000000140)="a2bee169e793fd23fe7831937722a8bf51dfa33a731a84d39f774d35c5", 0x1d}, {&(0x7f0000000180)="da993ca3a7309ef2233c691394fac4a86af5720aee0fd374adfc7d02805ed1ef52600c80e2a2c30af74ca07c8fc5b47316ca83d79850a02bf7146a8bc7d66b24bc375f282a9281f6240f54992b686143bb9e272f13d729965c5bee14d284d48bd3f6e076c661f34126e7bb3d7067051f6df26ce2c2f01d9b1fb2366f77b59c7b2127ca00635dacd4774bc859c607f65f1ebaf904330d39568a947f22e5cf2c7a11ef12f1c9448b30c56f57f5a52aaad1c597507dde011028fe98090e6495ca029ed8afa1b5b0bfadb3", 0xc9}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="a2fca9c527685962ad1301a89b97c01128456beb91a540f00fb8918d111e96e2ccbf2c0e59cb69", 0x27}, {&(0x7f0000000a40)="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", 0x1000}], 0x6}, 0x24000840) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0xb}, {0x65}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x4, 0x1, 0x4, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x15}}], {{0x7, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 19.805564632s ago: executing program 3 (id=9741): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x2000000000, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r5}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x15, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_fd={0x18, 0x4, 0x1, 0x0, r1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='GPL\x00', 0x1, 0xd7, &(0x7f00000005c0)=""/215, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x5, 0x7ff, 0x619}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000200)=[r0, r6, r0, r6, r0, r6, r1, r6, r0, r6], &(0x7f0000000300)=[{0x5, 0x3, 0x10, 0x7}, {0x0, 0x3, 0xb, 0x2}, {0x0, 0x3, 0x7, 0x7}], 0x10, 0x4, @void, @value}, 0x94) 19.804589722s ago: executing program 4 (id=9742): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000020", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x3b, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x2}]}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r9}, 0x10) write$cgroup_subtree(r7, 0x0, 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89a2, &(0x7f0000000080)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES8, @ANYRESHEX=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000008000000000181100001926430e3b86f8fa8e3388db9daad38d0f34092d5df29cf43cabb1fb58e810d6e05b6b99fb105a110f4898484f7d73a85d30be9b4b2f31bcf8915b611080b9e2feb321ad6428abffffffffffffffff530b4cdd6bf1450a264b678cf7a733e9ec430b7b1b3ac470ea87b6a775d40f4dca5d914cc593d027962a9654b6f58e99f0134448e1af44599d50d9b84e53203a", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095", @ANYRES8=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 19.768748783s ago: executing program 2 (id=9743): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="003b00000000000008000000080000000000e9ff", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000000340), 0x2, 0x0) close(r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 19.734794773s ago: executing program 3 (id=9744): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000003c0)={&(0x7f0000000240), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/41, 0x29}, {&(0x7f0000000340)=""/105, 0x69}, {&(0x7f0000000440)=""/242, 0xf2}, {&(0x7f0000000600)=""/130, 0x82}, {&(0x7f00000006c0)=""/226, 0xe2}], 0x5, &(0x7f0000000840)}, 0x100) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 19.641613795s ago: executing program 4 (id=9745): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1a00000005000000050000000900000001000000e2dc634242301e376919dc9dca13ce082a0d74233e499b8a9b7c6a940a42202c83e9b907348b557f6b"], 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000100)) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000000)=0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x2000000000c9, 0x0, 0x3, 0x3, 0x0, 0x9, 0x0, 0x20, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETDEVNETNS(r9, 0x54e3, 0x0) 19.640734895s ago: executing program 2 (id=9746): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x18, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000094b6f7bf000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000006a9030009000000181b0000", @ANYRES32, @ANYBLOB="000000000000000018120000", @ANYRES32, @ANYBLOB="2000c00100000000b703000000000000000000f949000000b700000000000000d443e0ff00000000bfd40000ae000000b7020000000000008500000084000000b7000000000018542afac8b6e2353339"], &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, r1, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x9}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000240)=0x6fa6, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x200000000000002a, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 19.623199805s ago: executing program 0 (id=9747): socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(0xffffffffffffffff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xec, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5f, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x43, &(0x7f0000000040), 0x3b) ioctl$TUNSETOFFLOAD(r1, 0x8004745a, 0x12) 2.478764633s ago: executing program 32 (id=9747): socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(0xffffffffffffffff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c23003f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xec, &(0x7f00000002c0)=[{}, {}], 0x10, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xce, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5f, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r4}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x43, &(0x7f0000000040), 0x3b) ioctl$TUNSETOFFLOAD(r1, 0x8004745a, 0x12) 2.459386493s ago: executing program 33 (id=9731): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x2, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000900000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300b70000000000000095000000000000f3641eeead282d5d00"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00000000000000120000f1850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0100000001000000050008000100000001"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r3, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f0000000880)={&(0x7f00000007c0)=""/176, 0xb0, 0x0, &(0x7f00000006c0)=""/99, 0x63}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x3, &(0x7f0000000380)=@raw=[@call={0x85, 0x0, 0x0, 0x49}, @exit, @generic={0x8a, 0x5, 0x7, 0x23b8, 0x516}], &(0x7f00000003c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x12, '\x00', r7, @fallback=0x1c, r6, 0x8, &(0x7f0000000680)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, r8, r4, 0x3, &(0x7f0000000900)=[r1, r3], &(0x7f0000000940)=[{0x2, 0x1, 0xc, 0xc}, {0x5, 0x2, 0x1, 0x5}, {0x5, 0x3, 0x2, 0x8}], 0x10, 0x0, @void, @value}, 0x94) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r9, &(0x7f0000000980), 0x20000992) openat$cgroup_subtree(r9, &(0x7f0000000a80), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r11, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.438405753s ago: executing program 34 (id=9746): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000700"], 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x18, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000094b6f7bf000000000200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000006a9030009000000181b0000", @ANYRES32, @ANYBLOB="000000000000000018120000", @ANYRES32, @ANYBLOB="2000c00100000000b703000000000000000000f949000000b700000000000000d443e0ff00000000bfd40000ae000000b7020000000000008500000084000000b7000000000018542afac8b6e2353339"], &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, r1, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x9}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000240)=0x6fa6, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x200000000000002a, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 2.392251574s ago: executing program 35 (id=9744): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f00000003c0)={&(0x7f0000000240), 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/41, 0x29}, {&(0x7f0000000340)=""/105, 0x69}, {&(0x7f0000000440)=""/242, 0xf2}, {&(0x7f0000000600)=""/130, 0x82}, {&(0x7f00000006c0)=""/226, 0xe2}], 0x5, &(0x7f0000000840)}, 0x100) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.362340155s ago: executing program 36 (id=9745): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1a00000005000000050000000900000001000000e2dc634242301e376919dc9dca13ce082a0d74233e499b8a9b7c6a940a42202c83e9b907348b557f6b"], 0x48) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000100)) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000000)=0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x2000000000c9, 0x0, 0x3, 0x3, 0x0, 0x9, 0x0, 0x20, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNGETDEVNETNS(r9, 0x54e3, 0x0) 70.091779ms ago: executing program 7 (id=9750): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 0s ago: executing program 5 (id=9748): perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000001940)=ANY=[@ANYBLOB="b40800000000000073115000000000008510000002000000b7000000000000009500c2000000000095000012000000004467cfb22280e32911f02c6e3de8b9fc0afaae33fce79ed51f0d8f37e1057680d601de7af5659ac3418e39b5d99b024c54a68f9c5c5135144b3302d3a49299af38a2a74883f2fda2"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async, rerun: 64) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r5 = getpid() (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) sendmsg$unix(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="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", 0xec0}, {0x0}, {&(0x7f0000000140)="bd", 0x1}], 0x3, &(0x7f00000018c0)=ANY=[@ANYBLOB="0c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r6, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=r1], 0x60}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r9 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x38001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000001880), 0x2}, 0x0, 0xfffffffffffffffe, 0x0, 0x9, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='blkio.bfq.io_service_time\x00', 0x0, 0x0) kernel console output (not intermixed with test programs): sm_sysvec_apic_timer_interrupt+0x12/0x20 [ 374.144585][T14033] ? reuseport_array_alloc_check+0x90/0x90 [ 374.150482][T14033] ? array_map_alloc_check+0x284/0x390 [ 374.156029][T14033] map_create+0x441/0x2190 [ 374.161092][T14033] __se_sys_bpf+0x203/0x680 [ 374.165773][T14033] ? __x64_sys_bpf+0x90/0x90 [ 374.170384][T14033] ? debug_smp_processor_id+0x17/0x20 [ 374.176199][T14033] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 374.182699][T14033] __x64_sys_bpf+0x7b/0x90 [ 374.187514][T14033] do_syscall_64+0x31/0x40 [ 374.191953][T14033] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 374.198041][T14033] RIP: 0033:0x7f5f7e50c929 [ 374.202554][T14033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 374.222687][T14033] RSP: 002b:00007f5f7cb75038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.231551][T14033] RAX: ffffffffffffffda RBX: 00007f5f7e733fa0 RCX: 00007f5f7e50c929 [ 374.239608][T14033] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 374.247753][T14033] RBP: 00007f5f7cb75090 R08: 0000000000000000 R09: 0000000000000000 [ 374.255724][T14033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 374.263691][T14033] R13: 0000000000000000 R14: 00007f5f7e733fa0 R15: 00007ffda0355d48 [ 374.786728][T14062] device syzkaller0 entered promiscuous mode [ 375.485288][T14082] FAULT_INJECTION: forcing a failure. [ 375.485288][T14082] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 375.499648][T14082] CPU: 0 PID: 14082 Comm: syz.3.3844 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 375.511112][T14082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 375.521434][T14082] Call Trace: [ 375.524747][T14082] __dump_stack+0x21/0x24 [ 375.529273][T14082] dump_stack_lvl+0x169/0x1d8 [ 375.533971][T14082] ? show_regs_print_info+0x18/0x18 [ 375.539317][T14082] dump_stack+0x15/0x1c [ 375.543500][T14082] should_fail+0x3c1/0x510 [ 375.547930][T14082] should_fail_alloc_page+0x4f/0x60 [ 375.553634][T14082] __alloc_pages_nodemask+0x109/0x5f0 [ 375.559192][T14082] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 375.564950][T14082] ? __kmalloc+0x1a7/0x330 [ 375.569365][T14082] ? __vmalloc_node_range+0x29f/0x780 [ 375.574736][T14082] __vmalloc_node_range+0x353/0x780 [ 375.579932][T14082] bpf_map_area_alloc+0xd5/0xe0 [ 375.584809][T14082] ? reuseport_array_alloc+0x16e/0x260 [ 375.590449][T14082] reuseport_array_alloc+0x16e/0x260 [ 375.595802][T14082] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 375.602070][T14082] ? reuseport_array_alloc_check+0x90/0x90 [ 375.608182][T14082] ? array_map_alloc_check+0x284/0x390 [ 375.613637][T14082] map_create+0x441/0x2190 [ 375.618472][T14082] __se_sys_bpf+0x203/0x680 [ 375.623306][T14082] ? __x64_sys_bpf+0x90/0x90 [ 375.628230][T14082] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 375.634593][T14082] __x64_sys_bpf+0x7b/0x90 [ 375.639135][T14082] do_syscall_64+0x31/0x40 [ 375.643673][T14082] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.649566][T14082] RIP: 0033:0x7f0b95735929 [ 375.654210][T14082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.673941][T14082] RSP: 002b:00007f0b93d9e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.682362][T14082] RAX: ffffffffffffffda RBX: 00007f0b9595cfa0 RCX: 00007f0b95735929 [ 375.690379][T14082] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 375.699154][T14082] RBP: 00007f0b93d9e090 R08: 0000000000000000 R09: 0000000000000000 [ 375.707491][T14082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 375.715654][T14082] R13: 0000000000000000 R14: 00007f0b9595cfa0 R15: 00007fff06131258 [ 375.914723][T14118] device wg2 left promiscuous mode [ 375.945124][T14118] device wg2 entered promiscuous mode [ 376.179677][T14134] device veth0_vlan left promiscuous mode [ 376.217019][T14134] device veth0_vlan entered promiscuous mode [ 376.404839][T14152] device wg2 left promiscuous mode [ 376.737963][T14169] device gretap0 entered promiscuous mode [ 378.586761][T14271] device wg2 entered promiscuous mode [ 379.712718][T14289] device syzkaller0 entered promiscuous mode [ 380.925748][T14340] device sit0 left promiscuous mode [ 381.029064][T14340] device sit0 entered promiscuous mode [ 382.039703][T14408] device wg2 left promiscuous mode [ 382.052032][T14409] device wg2 entered promiscuous mode [ 382.215681][T14419] device syzkaller0 entered promiscuous mode [ 382.382976][T14431] device wg2 entered promiscuous mode [ 383.023752][T14436] device syzkaller0 entered promiscuous mode [ 383.901065][T14516] device pim6reg1 entered promiscuous mode [ 383.990258][T14523] FAULT_INJECTION: forcing a failure. [ 383.990258][T14523] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.033308][T14523] CPU: 1 PID: 14523 Comm: syz.1.3965 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 384.044741][T14523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 384.055136][T14523] Call Trace: [ 384.058546][T14523] __dump_stack+0x21/0x24 [ 384.063054][T14523] dump_stack_lvl+0x169/0x1d8 [ 384.067850][T14523] ? show_regs_print_info+0x18/0x18 [ 384.073081][T14523] dump_stack+0x15/0x1c [ 384.077262][T14523] should_fail+0x3c1/0x510 [ 384.081899][T14523] should_fail_alloc_page+0x4f/0x60 [ 384.087300][T14523] __alloc_pages_nodemask+0x109/0x5f0 [ 384.092990][T14523] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 384.098566][T14523] ? __kmalloc+0x1a7/0x330 [ 384.103764][T14523] ? __vmalloc_node_range+0x29f/0x780 [ 384.109344][T14523] __vmalloc_node_range+0x353/0x780 [ 384.114865][T14523] bpf_map_area_alloc+0xd5/0xe0 [ 384.120008][T14523] ? reuseport_array_alloc+0x16e/0x260 [ 384.125684][T14523] reuseport_array_alloc+0x16e/0x260 [ 384.131063][T14523] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 384.137844][T14523] ? reuseport_array_alloc_check+0x90/0x90 [ 384.143768][T14523] ? array_map_alloc_check+0x284/0x390 [ 384.149512][T14523] map_create+0x441/0x2190 [ 384.154123][T14523] __se_sys_bpf+0x203/0x680 [ 384.158831][T14523] ? __x64_sys_bpf+0x90/0x90 [ 384.164091][T14523] __x64_sys_bpf+0x7b/0x90 [ 384.168530][T14523] do_syscall_64+0x31/0x40 [ 384.172965][T14523] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 384.179098][T14523] RIP: 0033:0x7fe70d3cc929 [ 384.183632][T14523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.203722][T14523] RSP: 002b:00007fe70ba35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 384.212232][T14523] RAX: ffffffffffffffda RBX: 00007fe70d5f3fa0 RCX: 00007fe70d3cc929 [ 384.220204][T14523] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 384.228576][T14523] RBP: 00007fe70ba35090 R08: 0000000000000000 R09: 0000000000000000 [ 384.236624][T14523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 384.244826][T14523] R13: 0000000000000000 R14: 00007fe70d5f3fa0 R15: 00007fff2f4922c8 [ 384.909217][T14582] FAULT_INJECTION: forcing a failure. [ 384.909217][T14582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.966358][T14582] CPU: 0 PID: 14582 Comm: syz.4.3983 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 384.978026][T14582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 384.988297][T14582] Call Trace: [ 384.991759][T14582] __dump_stack+0x21/0x24 [ 384.996180][T14582] dump_stack_lvl+0x169/0x1d8 [ 385.000864][T14582] ? show_regs_print_info+0x18/0x18 [ 385.006155][T14582] dump_stack+0x15/0x1c [ 385.010508][T14582] should_fail+0x3c1/0x510 [ 385.015189][T14582] should_fail_alloc_page+0x4f/0x60 [ 385.020480][T14582] __alloc_pages_nodemask+0x109/0x5f0 [ 385.025859][T14582] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 385.031518][T14582] ? __kmalloc+0x1a7/0x330 [ 385.035938][T14582] ? __vmalloc_node_range+0x29f/0x780 [ 385.041535][T14582] __vmalloc_node_range+0x353/0x780 [ 385.046749][T14582] bpf_map_area_alloc+0xd5/0xe0 [ 385.051741][T14582] ? reuseport_array_alloc+0x16e/0x260 [ 385.057206][T14582] reuseport_array_alloc+0x16e/0x260 [ 385.062520][T14582] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 385.069167][T14582] ? reuseport_array_alloc_check+0x90/0x90 [ 385.075067][T14582] ? array_map_alloc_check+0x284/0x390 [ 385.080654][T14582] map_create+0x441/0x2190 [ 385.085165][T14582] __se_sys_bpf+0x203/0x680 [ 385.089875][T14582] ? __x64_sys_bpf+0x90/0x90 [ 385.094772][T14582] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 385.100931][T14582] __x64_sys_bpf+0x7b/0x90 [ 385.105384][T14582] do_syscall_64+0x31/0x40 [ 385.109807][T14582] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 385.116057][T14582] RIP: 0033:0x7f5f7e50c929 [ 385.120776][T14582] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.140384][T14582] RSP: 002b:00007f5f7cb75038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 385.148805][T14582] RAX: ffffffffffffffda RBX: 00007f5f7e733fa0 RCX: 00007f5f7e50c929 [ 385.156980][T14582] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 385.164953][T14582] RBP: 00007f5f7cb75090 R08: 0000000000000000 R09: 0000000000000000 [ 385.172931][T14582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 385.181363][T14582] R13: 0000000000000000 R14: 00007f5f7e733fa0 R15: 00007ffda0355d48 [ 385.607264][T14627] device pim6reg1 entered promiscuous mode [ 385.973557][T14638] FAULT_INJECTION: forcing a failure. [ 385.973557][T14638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.032168][T14645] syz.2.3999[14645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.032225][T14645] syz.2.3999[14645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.043951][T14638] CPU: 1 PID: 14638 Comm: syz.1.3997 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 386.066694][T14638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 386.076766][T14638] Call Trace: [ 386.080070][T14638] __dump_stack+0x21/0x24 [ 386.084500][T14638] dump_stack_lvl+0x169/0x1d8 [ 386.089298][T14638] ? show_regs_print_info+0x18/0x18 [ 386.094517][T14638] dump_stack+0x15/0x1c [ 386.098688][T14638] should_fail+0x3c1/0x510 [ 386.103287][T14638] should_fail_alloc_page+0x4f/0x60 [ 386.108509][T14638] __alloc_pages_nodemask+0x109/0x5f0 [ 386.113901][T14638] ? __irq_exit_rcu+0x40/0x150 [ 386.118816][T14638] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 386.124484][T14638] ? irq_exit_rcu+0x9/0x10 [ 386.129002][T14638] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 386.134835][T14638] __vmalloc_node_range+0x353/0x780 [ 386.140048][T14638] bpf_map_area_alloc+0xd5/0xe0 [ 386.144965][T14638] ? reuseport_array_alloc+0x16e/0x260 [ 386.150433][T14638] reuseport_array_alloc+0x16e/0x260 [ 386.155760][T14638] ? reuseport_array_alloc_check+0x90/0x90 [ 386.161587][T14638] ? __irq_exit_rcu+0x40/0x150 [ 386.166488][T14638] ? array_map_alloc_check+0x284/0x390 [ 386.172126][T14638] map_create+0x441/0x2190 [ 386.176951][T14638] __se_sys_bpf+0x203/0x680 [ 386.181556][T14638] ? __x64_sys_bpf+0x90/0x90 [ 386.186161][T14638] __x64_sys_bpf+0x7b/0x90 [ 386.190594][T14638] do_syscall_64+0x31/0x40 [ 386.195055][T14638] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.201140][T14638] RIP: 0033:0x7fe70d3cc929 [ 386.206153][T14638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.226141][T14638] RSP: 002b:00007fe70ba35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.235077][T14638] RAX: ffffffffffffffda RBX: 00007fe70d5f3fa0 RCX: 00007fe70d3cc929 [ 386.243405][T14638] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 386.251430][T14638] RBP: 00007fe70ba35090 R08: 0000000000000000 R09: 0000000000000000 [ 386.259665][T14638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.267640][T14638] R13: 0000000000000000 R14: 00007fe70d5f3fa0 R15: 00007fff2f4922c8 [ 386.378520][T14645] syz.2.3999[14645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.378582][T14645] syz.2.3999[14645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.709581][T14721] FAULT_INJECTION: forcing a failure. [ 386.709581][T14721] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.762670][T14721] CPU: 0 PID: 14721 Comm: syz.2.4019 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 386.774400][T14721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 386.784589][T14721] Call Trace: [ 386.787942][T14721] __dump_stack+0x21/0x24 [ 386.792478][T14721] dump_stack_lvl+0x169/0x1d8 [ 386.797162][T14721] ? show_regs_print_info+0x18/0x18 [ 386.802452][T14721] dump_stack+0x15/0x1c [ 386.806840][T14721] should_fail+0x3c1/0x510 [ 386.811347][T14721] should_fail_alloc_page+0x4f/0x60 [ 386.816544][T14721] __alloc_pages_nodemask+0x109/0x5f0 [ 386.821998][T14721] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 386.827539][T14721] ? __kmalloc+0x1a7/0x330 [ 386.831946][T14721] ? __vmalloc_node_range+0x29f/0x780 [ 386.837311][T14721] __vmalloc_node_range+0x353/0x780 [ 386.842512][T14721] bpf_map_area_alloc+0xd5/0xe0 [ 386.847440][T14721] ? reuseport_array_alloc+0x16e/0x260 [ 386.852976][T14721] reuseport_array_alloc+0x16e/0x260 [ 386.858665][T14721] ? array_map_alloc_check+0xda/0x390 [ 386.864027][T14721] ? reuseport_array_alloc_check+0x90/0x90 [ 386.869826][T14721] ? array_map_alloc_check+0xe7/0x390 [ 386.875291][T14721] ? array_map_alloc_check+0x284/0x390 [ 386.880743][T14721] map_create+0x441/0x2190 [ 386.885282][T14721] __se_sys_bpf+0x203/0x680 [ 386.889955][T14721] ? __x64_sys_bpf+0x90/0x90 [ 386.894540][T14721] __x64_sys_bpf+0x7b/0x90 [ 386.898948][T14721] do_syscall_64+0x31/0x40 [ 386.903362][T14721] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.909424][T14721] RIP: 0033:0x7f31bd7e0929 [ 386.913836][T14721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.933615][T14721] RSP: 002b:00007f31bbe49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.942111][T14721] RAX: ffffffffffffffda RBX: 00007f31bda07fa0 RCX: 00007f31bd7e0929 [ 386.950248][T14721] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 386.958212][T14721] RBP: 00007f31bbe49090 R08: 0000000000000000 R09: 0000000000000000 [ 386.966629][T14721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.974679][T14721] R13: 0000000000000000 R14: 00007f31bda07fa0 R15: 00007ffd4a868328 [ 387.529814][T14758] FAULT_INJECTION: forcing a failure. [ 387.529814][T14758] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.566241][T14758] CPU: 0 PID: 14758 Comm: syz.0.4031 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 387.578032][T14758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 387.588116][T14758] Call Trace: [ 387.591443][T14758] __dump_stack+0x21/0x24 [ 387.595890][T14758] dump_stack_lvl+0x169/0x1d8 [ 387.600595][T14758] ? show_regs_print_info+0x18/0x18 [ 387.606018][T14758] ? irq_exit_rcu+0x9/0x10 [ 387.610539][T14758] dump_stack+0x15/0x1c [ 387.614832][T14758] should_fail+0x3c1/0x510 [ 387.619260][T14758] should_fail_alloc_page+0x4f/0x60 [ 387.624488][T14758] __alloc_pages_nodemask+0x109/0x5f0 [ 387.629862][T14758] ? __irq_exit_rcu+0x40/0x150 [ 387.634623][T14758] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 387.640219][T14758] ? irq_exit_rcu+0x9/0x10 [ 387.644817][T14758] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 387.650622][T14758] __vmalloc_node_range+0x353/0x780 [ 387.655821][T14758] bpf_map_area_alloc+0xd5/0xe0 [ 387.660759][T14758] ? reuseport_array_alloc+0x16e/0x260 [ 387.666392][T14758] reuseport_array_alloc+0x16e/0x260 [ 387.671845][T14758] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 387.678188][T14758] ? reuseport_array_alloc_check+0x90/0x90 [ 387.684165][T14758] ? array_map_alloc_check+0x284/0x390 [ 387.689709][T14758] map_create+0x441/0x2190 [ 387.694157][T14758] __se_sys_bpf+0x203/0x680 [ 387.698768][T14758] ? __x64_sys_bpf+0x90/0x90 [ 387.703424][T14758] ? debug_smp_processor_id+0x17/0x20 [ 387.708789][T14758] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 387.715116][T14758] __x64_sys_bpf+0x7b/0x90 [ 387.719526][T14758] do_syscall_64+0x31/0x40 [ 387.723952][T14758] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 387.729835][T14758] RIP: 0033:0x7f78972d0929 [ 387.734268][T14758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.754067][T14758] RSP: 002b:00007f7895939038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 387.762476][T14758] RAX: ffffffffffffffda RBX: 00007f78974f7fa0 RCX: 00007f78972d0929 [ 387.770555][T14758] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 387.778612][T14758] RBP: 00007f7895939090 R08: 0000000000000000 R09: 0000000000000000 [ 387.786598][T14758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 387.794880][T14758] R13: 0000000000000000 R14: 00007f78974f7fa0 R15: 00007ffea87026c8 [ 388.687532][T14811] FAULT_INJECTION: forcing a failure. [ 388.687532][T14811] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.755908][T14811] CPU: 1 PID: 14811 Comm: syz.1.4046 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 388.767344][T14811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 388.777630][T14811] Call Trace: [ 388.780995][T14811] __dump_stack+0x21/0x24 [ 388.785649][T14811] dump_stack_lvl+0x169/0x1d8 [ 388.790520][T14811] ? show_regs_print_info+0x18/0x18 [ 388.796223][T14811] dump_stack+0x15/0x1c [ 388.800444][T14811] should_fail+0x3c1/0x510 [ 388.804896][T14811] should_fail_alloc_page+0x4f/0x60 [ 388.810287][T14811] __alloc_pages_nodemask+0x109/0x5f0 [ 388.815740][T14811] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 388.821543][T14811] ? __kmalloc+0x1a7/0x330 [ 388.825963][T14811] ? __vmalloc_node_range+0x29f/0x780 [ 388.831335][T14811] __vmalloc_node_range+0x353/0x780 [ 388.836535][T14811] bpf_map_area_alloc+0xd5/0xe0 [ 388.841471][T14811] ? reuseport_array_alloc+0x16e/0x260 [ 388.846924][T14811] reuseport_array_alloc+0x16e/0x260 [ 388.852490][T14811] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 388.859091][T14811] ? reuseport_array_alloc_check+0x90/0x90 [ 388.865138][T14811] ? array_map_alloc_check+0x284/0x390 [ 388.870644][T14811] map_create+0x441/0x2190 [ 388.875066][T14811] __se_sys_bpf+0x203/0x680 [ 388.879699][T14811] ? __x64_sys_bpf+0x90/0x90 [ 388.884329][T14811] __x64_sys_bpf+0x7b/0x90 [ 388.888833][T14811] do_syscall_64+0x31/0x40 [ 388.893338][T14811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 388.899339][T14811] RIP: 0033:0x7fe70d3cc929 [ 388.903753][T14811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.923726][T14811] RSP: 002b:00007fe70ba35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 388.932133][T14811] RAX: ffffffffffffffda RBX: 00007fe70d5f3fa0 RCX: 00007fe70d3cc929 [ 388.940359][T14811] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 388.948423][T14811] RBP: 00007fe70ba35090 R08: 0000000000000000 R09: 0000000000000000 [ 388.956653][T14811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 388.964624][T14811] R13: 0000000000000000 R14: 00007fe70d5f3fa0 R15: 00007fff2f4922c8 [ 391.125254][T14901] device pim6reg1 entered promiscuous mode [ 391.709493][T14925] device wg2 left promiscuous mode [ 391.722747][T14933] FAULT_INJECTION: forcing a failure. [ 391.722747][T14933] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 391.812665][T14933] CPU: 1 PID: 14933 Comm: syz.2.4084 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 391.824520][T14933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 391.834779][T14933] Call Trace: [ 391.838449][T14933] __dump_stack+0x21/0x24 [ 391.842783][T14933] dump_stack_lvl+0x169/0x1d8 [ 391.847467][T14933] ? show_regs_print_info+0x18/0x18 [ 391.852962][T14933] dump_stack+0x15/0x1c [ 391.857242][T14933] should_fail+0x3c1/0x510 [ 391.861798][T14933] should_fail_alloc_page+0x4f/0x60 [ 391.867005][T14933] __alloc_pages_nodemask+0x109/0x5f0 [ 391.872475][T14933] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 391.878030][T14933] ? __kmalloc+0x1a7/0x330 [ 391.882766][T14933] ? __vmalloc_node_range+0x29f/0x780 [ 391.888139][T14933] __vmalloc_node_range+0x353/0x780 [ 391.893353][T14933] bpf_map_area_alloc+0xd5/0xe0 [ 391.898208][T14933] ? reuseport_array_alloc+0x16e/0x260 [ 391.904151][T14933] reuseport_array_alloc+0x16e/0x260 [ 391.909437][T14933] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 391.915239][T14933] ? reuseport_array_alloc_check+0x90/0x90 [ 391.921043][T14933] ? array_map_alloc_check+0x284/0x390 [ 391.926503][T14933] map_create+0x441/0x2190 [ 391.931723][T14933] __se_sys_bpf+0x203/0x680 [ 391.936253][T14933] ? __x64_sys_bpf+0x90/0x90 [ 391.940951][T14933] __x64_sys_bpf+0x7b/0x90 [ 391.945382][T14933] do_syscall_64+0x31/0x40 [ 391.950022][T14933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 391.956194][T14933] RIP: 0033:0x7f31bd7e0929 [ 391.960701][T14933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.980481][T14933] RSP: 002b:00007f31bbe49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.989165][T14933] RAX: ffffffffffffffda RBX: 00007f31bda07fa0 RCX: 00007f31bd7e0929 [ 391.997532][T14933] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 392.005763][T14933] RBP: 00007f31bbe49090 R08: 0000000000000000 R09: 0000000000000000 [ 392.013748][T14933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 392.021818][T14933] R13: 0000000000000000 R14: 00007f31bda07fa0 R15: 00007ffd4a868328 [ 392.069776][T14939] device wg2 entered promiscuous mode [ 392.527643][T14964] device syzkaller0 entered promiscuous mode [ 392.576228][T14975] device syzkaller0 entered promiscuous mode [ 393.161050][T14991] FAULT_INJECTION: forcing a failure. [ 393.161050][T14991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 393.182083][T14991] CPU: 1 PID: 14991 Comm: syz.4.4097 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 393.194530][T14991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 393.204913][T14991] Call Trace: [ 393.208339][T14991] __dump_stack+0x21/0x24 [ 393.212683][T14991] dump_stack_lvl+0x169/0x1d8 [ 393.217396][T14991] ? show_regs_print_info+0x18/0x18 [ 393.222743][T14991] dump_stack+0x15/0x1c [ 393.226926][T14991] should_fail+0x3c1/0x510 [ 393.231433][T14991] should_fail_alloc_page+0x4f/0x60 [ 393.236821][T14991] __alloc_pages_nodemask+0x109/0x5f0 [ 393.242276][T14991] ? __irq_exit_rcu+0x40/0x150 [ 393.247131][T14991] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 393.252787][T14991] ? irq_exit_rcu+0x9/0x10 [ 393.257337][T14991] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 393.263382][T14991] __vmalloc_node_range+0x353/0x780 [ 393.268782][T14991] bpf_map_area_alloc+0xd5/0xe0 [ 393.273893][T14991] ? reuseport_array_alloc+0x16e/0x260 [ 393.279347][T14991] reuseport_array_alloc+0x16e/0x260 [ 393.284717][T14991] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 393.290607][T14991] ? reuseport_array_alloc_check+0x90/0x90 [ 393.296409][T14991] ? array_map_alloc_check+0x284/0x390 [ 393.301992][T14991] map_create+0x441/0x2190 [ 393.306488][T14991] __se_sys_bpf+0x203/0x680 [ 393.311218][T14991] ? __x64_sys_bpf+0x90/0x90 [ 393.315828][T14991] ? debug_smp_processor_id+0x17/0x20 [ 393.321210][T14991] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 393.327306][T14991] __x64_sys_bpf+0x7b/0x90 [ 393.331727][T14991] do_syscall_64+0x31/0x40 [ 393.336143][T14991] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 393.342030][T14991] RIP: 0033:0x7f5f7e50c929 [ 393.346779][T14991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.366684][T14991] RSP: 002b:00007f5f7cb75038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 393.375288][T14991] RAX: ffffffffffffffda RBX: 00007f5f7e733fa0 RCX: 00007f5f7e50c929 [ 393.383258][T14991] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 393.391434][T14991] RBP: 00007f5f7cb75090 R08: 0000000000000000 R09: 0000000000000000 [ 393.399575][T14991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 393.407642][T14991] R13: 0000000000000000 R14: 00007f5f7e733fa0 R15: 00007ffda0355d48 [ 393.480270][T14993] device sit0 left promiscuous mode [ 393.562124][T14995] device sit0 entered promiscuous mode [ 393.579617][T14997] device veth0_vlan left promiscuous mode [ 393.591793][T14997] device veth0_vlan entered promiscuous mode [ 393.636431][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.655941][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 393.666680][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.187740][T15032] FAULT_INJECTION: forcing a failure. [ 394.187740][T15032] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.201714][T15032] CPU: 0 PID: 15032 Comm: syz.0.4109 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 394.213091][T15032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 394.223433][T15032] Call Trace: [ 394.226743][T15032] __dump_stack+0x21/0x24 [ 394.231436][T15032] dump_stack_lvl+0x169/0x1d8 [ 394.236152][T15032] ? show_regs_print_info+0x18/0x18 [ 394.241369][T15032] ? irq_exit_rcu+0x9/0x10 [ 394.245799][T15032] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 394.251722][T15032] dump_stack+0x15/0x1c [ 394.255889][T15032] should_fail+0x3c1/0x510 [ 394.260314][T15032] should_fail_alloc_page+0x4f/0x60 [ 394.265813][T15032] __alloc_pages_nodemask+0x109/0x5f0 [ 394.271330][T15032] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 394.277076][T15032] ? __kmalloc+0x1a7/0x330 [ 394.281520][T15032] ? __vmalloc_node_range+0x29f/0x780 [ 394.287144][T15032] __vmalloc_node_range+0x353/0x780 [ 394.292659][T15032] bpf_map_area_alloc+0xd5/0xe0 [ 394.297550][T15032] ? reuseport_array_alloc+0x16e/0x260 [ 394.303376][T15032] reuseport_array_alloc+0x16e/0x260 [ 394.308667][T15032] ? reuseport_array_alloc_check+0x90/0x90 [ 394.314833][T15032] ? array_map_alloc_check+0x284/0x390 [ 394.320381][T15032] map_create+0x441/0x2190 [ 394.324968][T15032] __se_sys_bpf+0x203/0x680 [ 394.329474][T15032] ? __x64_sys_bpf+0x90/0x90 [ 394.334109][T15032] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 394.340436][T15032] __x64_sys_bpf+0x7b/0x90 [ 394.344903][T15032] do_syscall_64+0x31/0x40 [ 394.349341][T15032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 394.355774][T15032] RIP: 0033:0x7f78972d0929 [ 394.360198][T15032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.380006][T15032] RSP: 002b:00007f7895939038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.389243][T15032] RAX: ffffffffffffffda RBX: 00007f78974f7fa0 RCX: 00007f78972d0929 [ 394.397244][T15032] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 394.405809][T15032] RBP: 00007f7895939090 R08: 0000000000000000 R09: 0000000000000000 [ 394.413986][T15032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 394.422067][T15032] R13: 0000000000000000 R14: 00007f78974f7fa0 R15: 00007ffea87026c8 [ 394.580571][T15035] device pim6reg1 entered promiscuous mode [ 395.375611][T15057] device sit0 left promiscuous mode [ 395.506393][T15062] device sit0 entered promiscuous mode [ 395.657368][T15068] device syzkaller0 entered promiscuous mode [ 395.762346][T15071] kfree: port 1(veth1) entered blocking state [ 395.783674][T15071] kfree: port 1(veth1) entered disabled state [ 395.804301][T15071] device veth1 entered promiscuous mode [ 396.107065][T15111] device pim6reg1 entered promiscuous mode [ 396.144777][T15115] device syzkaller0 entered promiscuous mode [ 396.530140][T15152] device syzkaller0 entered promiscuous mode [ 396.760658][T15171] device pim6reg1 entered promiscuous mode [ 396.837406][T15179] device syzkaller0 entered promiscuous mode [ 397.109049][T15202] device sit0 left promiscuous mode [ 397.195120][T15190] device pim6reg1 entered promiscuous mode [ 397.621532][T15236] device pim6reg1 entered promiscuous mode [ 398.017576][T15247] device wg2 left promiscuous mode [ 398.017598][T15252] syz.4.4169[15252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.023017][T15252] syz.4.4169[15252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.061240][T15252] syz.4.4169[15252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.118726][T15252] syz.4.4169[15252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.149078][T15251] €Â0: renamed from pim6reg1 [ 398.281475][T15258] ÿÿÿÿÿÿ: renamed from vlan1 [ 398.577830][T15271] device pim6reg1 entered promiscuous mode [ 398.697560][T15273] kfree: port 1(veth1) entered blocking state [ 398.704049][T15273] kfree: port 1(veth1) entered disabled state [ 398.715438][T15273] device veth1 entered promiscuous mode [ 398.838974][T15279] device sit0 entered promiscuous mode [ 399.008841][T15283] syz.4.4181 (15283) used obsolete PPPIOCDETACH ioctl [ 399.084649][T15285] €Â0: renamed from pim6reg1 [ 399.448504][T15314] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 400.107723][T15353] device veth0_vlan left promiscuous mode [ 400.119388][T15353] device veth0_vlan entered promiscuous mode [ 400.170530][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.185164][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 400.196813][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 400.502670][T15379] syz.4.4209[15379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.502734][T15379] syz.4.4209[15379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.510796][T15378] syz.4.4209[15378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.727617][T15393] syz.4.4214[15393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.739243][T15393] syz.4.4214[15393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.782988][T15391] device syzkaller0 entered promiscuous mode [ 401.035293][T15404] device pim6reg1 entered promiscuous mode [ 401.540921][T15429] FAULT_INJECTION: forcing a failure. [ 401.540921][T15429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 401.604916][T15429] CPU: 1 PID: 15429 Comm: syz.2.4226 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 401.616465][T15429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 401.626822][T15429] Call Trace: [ 401.630133][T15429] __dump_stack+0x21/0x24 [ 401.634461][T15429] dump_stack_lvl+0x169/0x1d8 [ 401.639187][T15429] ? show_regs_print_info+0x18/0x18 [ 401.644382][T15429] dump_stack+0x15/0x1c [ 401.648535][T15429] should_fail+0x3c1/0x510 [ 401.653038][T15429] should_fail_alloc_page+0x4f/0x60 [ 401.658317][T15429] __alloc_pages_nodemask+0x109/0x5f0 [ 401.663693][T15429] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 401.669255][T15429] ? __kmalloc+0x1a7/0x330 [ 401.673664][T15429] ? __vmalloc_node_range+0x29f/0x780 [ 401.679113][T15429] __vmalloc_node_range+0x353/0x780 [ 401.684308][T15429] bpf_map_area_alloc+0xd5/0xe0 [ 401.689192][T15429] ? reuseport_array_alloc+0x16e/0x260 [ 401.695245][T15429] reuseport_array_alloc+0x16e/0x260 [ 401.700722][T15429] ? reuseport_array_alloc_check+0x90/0x90 [ 401.706523][T15429] ? array_map_alloc_check+0x223/0x390 [ 401.711974][T15429] ? array_map_alloc_check+0x284/0x390 [ 401.717428][T15429] map_create+0x441/0x2190 [ 401.721931][T15429] __se_sys_bpf+0x203/0x680 [ 401.726428][T15429] ? __x64_sys_bpf+0x90/0x90 [ 401.731295][T15429] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 401.737468][T15429] __x64_sys_bpf+0x7b/0x90 [ 401.742142][T15429] do_syscall_64+0x31/0x40 [ 401.746559][T15429] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 401.752448][T15429] RIP: 0033:0x7f31bd7e0929 [ 401.756870][T15429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.776471][T15429] RSP: 002b:00007f31bbe49038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.785146][T15429] RAX: ffffffffffffffda RBX: 00007f31bda07fa0 RCX: 00007f31bd7e0929 [ 401.793222][T15429] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 401.801199][T15429] RBP: 00007f31bbe49090 R08: 0000000000000000 R09: 0000000000000000 [ 401.809169][T15429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 401.817315][T15429] R13: 0000000000000000 R14: 00007f31bda07fa0 R15: 00007ffd4a868328 [ 401.882158][T15438] syz.2.4229[15438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.154283][T15438] device veth0_vlan left promiscuous mode [ 402.181613][T15438] device veth0_vlan entered promiscuous mode [ 402.239950][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.249165][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.259564][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.396195][T15459] €Â0: renamed from pim6reg1 [ 404.542002][T15557] device pim6reg1 entered promiscuous mode [ 404.930133][T15609] device syzkaller0 entered promiscuous mode [ 405.455281][T15627] device pim6reg1 entered promiscuous mode [ 405.738497][T15644] device syzkaller0 entered promiscuous mode [ 405.912582][T15655] device sit0 left promiscuous mode [ 406.184310][T15680] device pim6reg1 entered promiscuous mode [ 406.955393][T15723] device pim6reg1 entered promiscuous mode [ 407.007525][T15726] device sit0 left promiscuous mode [ 407.235490][T15726] device sit0 entered promiscuous mode [ 407.607328][T15745] device pim6reg1 entered promiscuous mode [ 407.711022][T15756] device pim6reg1 entered promiscuous mode [ 408.441494][T15812] device pim6reg1 entered promiscuous mode [ 408.544855][T15815] device pim6reg1 entered promiscuous mode [ 408.739026][T15829] device pim6reg1 entered promiscuous mode [ 409.149034][T15848] device syzkaller0 entered promiscuous mode [ 409.479459][T15860] device sit0 left promiscuous mode [ 409.676786][T15870] device pim6reg1 entered promiscuous mode [ 410.433621][T15916] device pim6reg1 entered promiscuous mode [ 410.456497][T15917] device syzkaller0 entered promiscuous mode [ 410.775300][T15935] p: renamed from pim6reg1 [ 411.051260][T15947] device pim6reg1 entered promiscuous mode [ 411.272124][T15959] device veth0_vlan left promiscuous mode [ 411.289285][T15959] device veth0_vlan entered promiscuous mode [ 411.316395][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.341383][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.377631][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.117305][T15998] device pim6reg1 entered promiscuous mode [ 412.916488][T16014] device wg2 entered promiscuous mode [ 413.287310][T16027] device syzkaller0 entered promiscuous mode [ 413.660672][T16036] device pim6reg1 entered promiscuous mode [ 414.135327][T16046] device pim6reg1 entered promiscuous mode [ 415.353171][T16087] device pim6reg1 entered promiscuous mode [ 415.423235][T16085] device pim6reg1 entered promiscuous mode [ 415.435386][T16077] bridge0: port 3(veth0) entered disabled state [ 415.443004][T16077] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.451602][T16077] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.517825][T16091] device veth0 left promiscuous mode [ 415.527922][T16091] bridge0: port 3(veth0) entered disabled state [ 415.536389][T16091] device bridge_slave_1 left promiscuous mode [ 415.552868][T16091] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.571265][T16091] device bridge_slave_0 left promiscuous mode [ 415.580638][T16091] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.044775][T16108] device veth1_macvtap entered promiscuous mode [ 416.079872][T16108] device macsec0 entered promiscuous mode [ 416.128131][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.156749][T16111] device wg2 left promiscuous mode [ 416.547907][T16110] device syzkaller0 entered promiscuous mode [ 417.004015][T16129] device pim6reg1 entered promiscuous mode [ 417.464190][T16134] device syzkaller0 entered promiscuous mode [ 417.700190][T16154] device veth0_vlan left promiscuous mode [ 417.713525][T16154] device veth0_vlan entered promiscuous mode [ 417.754496][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.771225][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.813194][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 417.861394][T16156] device macsec0 entered promiscuous mode [ 418.147081][T16168] device syzkaller0 entered promiscuous mode [ 418.246407][T16179] device pim6reg1 entered promiscuous mode [ 418.866508][T16190] device syzkaller0 entered promiscuous mode [ 419.135530][T16193] device sit0 entered promiscuous mode [ 419.834516][T16203] device syzkaller0 entered promiscuous mode [ 421.055736][T16217] device pim6reg1 entered promiscuous mode [ 421.093602][T16224] device pim6reg1 entered promiscuous mode [ 421.598093][T16228] device sit0 entered promiscuous mode [ 422.267615][T16264] device pim6reg1 entered promiscuous mode [ 422.843220][T16284] Â: renamed from pim6reg1 [ 422.941910][T16289] device syzkaller0 entered promiscuous mode [ 422.950241][T16286] device sit0 left promiscuous mode [ 423.154178][T16295] device sit0 entered promiscuous mode [ 423.551929][T16304] device pim6reg1 entered promiscuous mode [ 423.677607][T16312] device syzkaller0 entered promiscuous mode [ 424.340874][T16346] device sit0 left promiscuous mode [ 424.470621][T16363] device pim6reg1 entered promiscuous mode [ 424.632964][T16378] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 424.641402][T16378] device syzkaller0 entered promiscuous mode [ 424.721296][T16389] device pim6reg1 entered promiscuous mode [ 426.299899][T16470] GPL: mtu less than device minimum [ 426.307203][T16474] device veth0_vlan left promiscuous mode [ 426.317742][T16474] device veth0_vlan entered promiscuous mode [ 426.367304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.375994][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.385242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.968441][T16499] device sit0 left promiscuous mode [ 427.037293][T16502] device sit0 entered promiscuous mode [ 427.717732][T16519] device sit0 left promiscuous mode [ 427.860793][T16530] device veth1_macvtap left promiscuous mode [ 427.908234][T16530] device veth1_macvtap entered promiscuous mode [ 427.915485][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 428.114595][T16541] device wg2 left promiscuous mode [ 428.165570][T16552] device pim6reg1 entered promiscuous mode [ 428.939556][T16578] device pim6reg1 entered promiscuous mode [ 429.817884][T16594] device pim6reg1 entered promiscuous mode [ 430.641945][T16641] device sit0 left promiscuous mode [ 431.701274][T16699] device wg2 entered promiscuous mode [ 432.327665][T16731] device sit0 entered promiscuous mode [ 432.767424][T16766] device sit0 entered promiscuous mode [ 433.081473][T16777] device syzkaller0 entered promiscuous mode [ 433.273996][T16805] device pim6reg1 entered promiscuous mode [ 433.474555][T16813] device pim6reg1 entered promiscuous mode [ 434.002140][T16829] device sit0 entered promiscuous mode [ 435.133987][T16852] device pim6reg1 entered promiscuous mode [ 435.684117][T16863] device pim6reg1 entered promiscuous mode [ 436.265640][T16868] device syzkaller0 entered promiscuous mode [ 436.587426][T16894] device sit0 entered promiscuous mode [ 436.968206][T16918] device wg2 left promiscuous mode [ 437.014312][T16922] device macsec0 left promiscuous mode [ 437.729436][T16971] device bridge_slave_1 entered promiscuous mode [ 437.769966][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 438.273837][T17005] ªªªªªª: renamed from vlan0 [ 438.347171][T17009] device pim6reg1 entered promiscuous mode [ 438.956509][T17026] device syzkaller0 entered promiscuous mode [ 440.712918][T17106] device pim6reg1 entered promiscuous mode [ 441.010083][ T24] audit: type=1400 audit(1750166916.190:169): avc: denied { create } for pid=17124 comm="syz.3.4723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 441.122221][T17129] device sit0 left promiscuous mode [ 441.152486][T17128] device veth1_macvtap left promiscuous mode [ 441.158903][T17128] device macsec0 left promiscuous mode [ 441.280592][T17129] device sit0 entered promiscuous mode [ 441.370949][T17137] bpf_get_probe_write_proto: 1 callbacks suppressed [ 441.370959][T17137] syz.4.4724[17137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.477460][T17137] syz.4.4724[17137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.767348][T17143] device pim6reg1 entered promiscuous mode [ 441.903658][T17153] device syzkaller0 entered promiscuous mode [ 441.912166][T17153] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 442.006687][T17153] device syzkaller0 left promiscuous mode [ 442.310293][T17173] device veth0_vlan left promiscuous mode [ 442.329293][T17173] device veth0_vlan entered promiscuous mode [ 442.361084][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.374249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.414915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 442.493651][T17178] Ÿë: port 1(veth0_to_team) entered blocking state [ 442.502881][T17178] Ÿë: port 1(veth0_to_team) entered disabled state [ 442.511175][T17178] device veth0_to_team entered promiscuous mode [ 442.529220][T17181] Ÿë: port 2(erspan0) entered blocking state [ 442.535629][T17181] Ÿë: port 2(erspan0) entered disabled state [ 442.542551][T17181] device erspan0 entered promiscuous mode [ 442.911246][T17211] device syzkaller0 entered promiscuous mode [ 442.918900][T17211] device sit0 left promiscuous mode [ 442.942205][T17211] device sit0 entered promiscuous mode [ 443.363874][T17245] device pim6reg1 entered promiscuous mode [ 443.451347][T17252] syz.0.4755[17252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.451415][T17252] syz.0.4755[17252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.470833][T17255] syz.0.4755[17255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.686328][T17265] device veth0_vlan left promiscuous mode [ 443.757906][T17265] device veth0_vlan entered promiscuous mode [ 443.779809][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.794028][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 443.811696][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 444.026044][T17286] device pim6reg1 entered promiscuous mode [ 444.032911][T17274] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 444.831443][T17323] device pim6reg1 entered promiscuous mode [ 445.307181][T17337] syz.0.4780[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.307249][T17337] syz.0.4780[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.055650][ T24] audit: type=1400 audit(1750166921.240:170): avc: denied { create } for pid=17368 comm="syz.0.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 446.074114][T17367] device pim6reg1 entered promiscuous mode [ 446.133973][T17376] device wg2 entered promiscuous mode [ 446.352059][T17393] device pim6reg1 entered promiscuous mode [ 446.414231][T17400] syz.3.4800[17400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.414354][T17400] syz.3.4800[17400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.541372][T17403] device syzkaller0 entered promiscuous mode [ 447.435075][T17436] device veth0_vlan left promiscuous mode [ 447.442012][T17436] device veth0_vlan entered promiscuous mode [ 447.894279][T17550] device pim6reg1 entered promiscuous mode [ 447.987656][ T24] audit: type=1400 audit(1750166923.170:171): avc: denied { mounton } for pid=17555 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 448.016244][T17557] device pim6reg1 entered promiscuous mode [ 448.105311][T17555] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.119430][T17555] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.131837][T17555] device bridge_slave_0 entered promiscuous mode [ 448.139243][T17555] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.147349][T17555] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.155159][T17555] device bridge_slave_1 entered promiscuous mode [ 448.343536][T17575] device pim6reg1 entered promiscuous mode [ 448.826979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 448.835360][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 448.888443][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 448.904342][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 448.913389][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.920828][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.929317][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 448.946611][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 448.955329][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.962398][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.971990][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 449.175110][T17597] device veth0_vlan left promiscuous mode [ 449.239771][T17597] device veth0_vlan entered promiscuous mode [ 449.376160][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 449.384771][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 449.400035][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 449.409104][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 449.412905][T17607] syz.4.4830[17607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.418739][T17607] syz.4.4830[17607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.426288][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 449.452875][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 449.465495][T17555] device veth0_vlan entered promiscuous mode [ 449.480789][T17607] syz.4.4830[17607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.545313][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 449.565173][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.577423][T17555] device veth1_macvtap entered promiscuous mode [ 449.593062][T17610] device pim6reg1 entered promiscuous mode [ 449.602133][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 449.609818][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 449.620243][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 449.629664][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 449.638872][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 449.683498][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 449.692865][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 449.702418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 449.711941][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 449.767400][ T24] audit: type=1400 audit(1750166924.940:172): avc: denied { unmount } for pid=17555 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 449.887828][T17624] device pim6reg1 entered promiscuous mode [ 450.322303][ T9] device veth1 left promiscuous mode [ 450.328194][ T9] kfree: port 1(veth1) entered disabled state [ 450.360345][ T9] device veth0_vlan left promiscuous mode [ 451.126780][T17668] device pim6reg1 entered promiscuous mode [ 452.013803][T17696] device syzkaller0 entered promiscuous mode [ 452.109364][T17712] device pim6reg1 entered promiscuous mode [ 452.869764][T17745] device veth0_vlan left promiscuous mode [ 452.876144][T17745] device veth0_vlan entered promiscuous mode [ 452.912177][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.922028][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 452.936734][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 453.101165][T17756] device pim6reg1 entered promiscuous mode [ 453.362899][T17767] device syzkaller0 entered promiscuous mode [ 453.399800][T17770] cgroup: fork rejected by pids controller in /syz1 [ 454.039524][T17789] device sit0 entered promiscuous mode [ 454.386357][T17792] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.435698][T17792] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.458977][T17792] device bridge_slave_0 entered promiscuous mode [ 454.478271][T17800] device pim6reg1 entered promiscuous mode [ 454.489076][T17792] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.504991][T17792] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.513173][T17792] device bridge_slave_1 entered promiscuous mode [ 455.048581][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 455.060810][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.111300][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.131990][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.140762][ T2588] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.148059][ T2588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.162121][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.176329][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.185366][ T2588] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.192932][ T2588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.203049][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 455.213431][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.223085][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 455.232046][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.268197][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.279966][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 455.306005][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.331309][T17792] device veth0_vlan entered promiscuous mode [ 455.346311][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.380529][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 455.402508][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.421231][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.447280][T17792] device veth1_macvtap entered promiscuous mode [ 455.463715][ T9] GPL: port 1(erspan0) entered disabled state [ 455.478611][ T9] device erspan0 left promiscuous mode [ 455.490631][ T9] GPL: port 1(erspan0) entered disabled state [ 455.513062][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 455.525290][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.559554][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 455.620903][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 455.672171][T17852] device pim6reg1 entered promiscuous mode [ 455.844123][ T9] device bridge_slave_1 left promiscuous mode [ 455.866438][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.892971][ T9] device bridge_slave_0 left promiscuous mode [ 456.016286][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.042702][ T9] device veth1_macvtap left promiscuous mode [ 456.055426][ T9] device veth0_vlan left promiscuous mode [ 456.446191][T17864] device syzkaller0 entered promiscuous mode [ 456.474326][T17871] device wg2 left promiscuous mode [ 456.631393][T17893] device pim6reg1 entered promiscuous mode [ 456.669515][T17895] device pim6reg1 entered promiscuous mode [ 457.739773][T17936] tap0: tun_chr_ioctl cmd 1074025677 [ 457.751750][T17936] tap0: linktype set to 825 [ 457.942421][T17946] device pim6reg1 entered promiscuous mode [ 458.406833][T17967] device veth0_vlan left promiscuous mode [ 458.421046][T17967] device veth0_vlan entered promiscuous mode [ 460.863006][T18081] 7B’ç÷ï: renamed from syzkaller0 [ 461.396273][T18112] device wg2 entered promiscuous mode [ 461.676216][T18132] device pim6reg1 entered promiscuous mode [ 462.645113][T18173] device pim6reg1 entered promiscuous mode [ 463.760743][T18193] device syzkaller0 entered promiscuous mode [ 464.019954][T18217] device pim6reg1 entered promiscuous mode [ 465.008965][T18245] device sit0 left promiscuous mode [ 465.314256][T18261] device pim6reg1 entered promiscuous mode [ 465.626082][T18284] device sit0 left promiscuous mode [ 465.860268][T18298] device syzkaller0 entered promiscuous mode [ 466.143484][T18311] device sit0 entered promiscuous mode [ 466.560969][T18312] device pim6reg1 entered promiscuous mode [ 466.658227][T18329] device sit0 left promiscuous mode [ 466.771200][T18337] device sit0 entered promiscuous mode [ 467.575193][T18392] device pim6reg1 entered promiscuous mode [ 467.666202][T18398] syz.0.5060[18398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.666260][T18398] syz.0.5060[18398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.714106][T18398] device syzkaller0 entered promiscuous mode [ 468.724781][T18442] device pim6reg1 entered promiscuous mode [ 468.763022][T18456] device sit0 left promiscuous mode [ 468.786308][T18456] device sit0 entered promiscuous mode [ 469.029066][T18481] device pim6reg1 entered promiscuous mode [ 469.548148][T18510] device pim6reg1 entered promiscuous mode [ 470.507015][T18539] syz.4.5100[18539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.507075][T18539] syz.4.5100[18539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.044297][T18555] device pim6reg1 entered promiscuous mode [ 472.578463][T18598] device pim6reg1 entered promiscuous mode [ 472.911226][T18606] device veth0_vlan left promiscuous mode [ 472.963308][T18606] device veth0_vlan entered promiscuous mode [ 473.684772][T18644] device pim6reg1 entered promiscuous mode [ 474.999905][T18697] device pim6reg1 entered promiscuous mode [ 476.204995][T18727] device pim6reg1 entered promiscuous mode [ 477.138783][T18772] device pim6reg1 entered promiscuous mode [ 477.831420][T18823] device pim6reg1 entered promiscuous mode [ 478.380001][T18838] device veth0_vlan left promiscuous mode [ 478.398729][T18838] device veth0_vlan entered promiscuous mode [ 478.466178][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.476898][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.484970][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.555387][T18847] device pim6reg1 entered promiscuous mode [ 478.669311][T18865] device pim6reg1 entered promiscuous mode [ 478.723568][T18870] device sit0 left promiscuous mode [ 478.829771][T18879] device sit0 entered promiscuous mode [ 479.129953][T18896] device syzkaller0 entered promiscuous mode [ 479.381897][T18904] device veth1_macvtap left promiscuous mode [ 480.202174][T18910] device syzkaller0 entered promiscuous mode [ 480.216207][T18919] device pim6reg1 entered promiscuous mode [ 480.476495][T18936] device veth0_vlan left promiscuous mode [ 480.497058][T18936] device veth0_vlan entered promiscuous mode [ 480.752754][T18922] device syzkaller0 entered promiscuous mode [ 480.804079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.827828][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.896853][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 481.130811][T18953] syz.2.5220[18953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.130895][T18953] syz.2.5220[18953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.199553][T18957] device sit0 left promiscuous mode [ 481.315923][T18957] device sit0 entered promiscuous mode [ 482.703985][T19030] device pim6reg1 entered promiscuous mode [ 482.772145][ T24] audit: type=1400 audit(1750166957.960:173): avc: denied { create } for pid=19031 comm="syz.2.5241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 482.896740][T19037] device syzkaller0 entered promiscuous mode [ 484.819748][T19109] device syzkaller0 entered promiscuous mode [ 485.250300][T19127] GPL: port 1(erspan0) entered blocking state [ 485.293512][T19127] GPL: port 1(erspan0) entered disabled state [ 485.331019][T19127] device erspan0 entered promiscuous mode [ 485.339113][T19124] GPL: port 1(erspan0) entered blocking state [ 485.345612][T19124] GPL: port 1(erspan0) entered forwarding state [ 485.469653][T19135] syz.1.5270[19135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.469756][T19135] syz.1.5270[19135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.493589][T19135] syz.1.5270[19135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.515663][T19135] syz.1.5270[19135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.557846][T19137] device veth0_vlan left promiscuous mode [ 485.627663][T19137] device veth0_vlan entered promiscuous mode [ 485.657826][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 485.666943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 485.691108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 485.740629][T19141] device pim6reg1 entered promiscuous mode [ 485.950579][T19147] device pim6reg1 entered promiscuous mode [ 486.528817][T19189] device pim6reg1 entered promiscuous mode [ 487.431632][T19200] device pim6reg1 entered promiscuous mode [ 488.113302][T19232] device pim6reg1 entered promiscuous mode [ 488.609494][T19260] device syzkaller0 entered promiscuous mode [ 489.435857][T19284] device veth0_vlan left promiscuous mode [ 489.454858][T19284] device veth0_vlan entered promiscuous mode [ 489.560257][T19291] device pim6reg1 entered promiscuous mode [ 495.721643][T19326] device pim6reg1 entered promiscuous mode [ 495.858733][T19336] device pim6reg1 entered promiscuous mode [ 497.331387][T19372] device pim6reg1 entered promiscuous mode [ 498.059676][T19393] device syzkaller0 entered promiscuous mode [ 499.236921][T19420] device pim6reg1 entered promiscuous mode [ 500.660628][T19470] device syzkaller0 entered promiscuous mode [ 500.867849][T19479] device sit0 left promiscuous mode [ 500.987050][T19479] device sit0 entered promiscuous mode [ 501.471791][T19496] device pim6reg1 entered promiscuous mode [ 502.708498][T19546] device pim6reg1 entered promiscuous mode [ 503.366377][T19586] device pim6reg1 entered promiscuous mode [ 503.580829][T19591] device pim6reg1 entered promiscuous mode [ 504.630803][T19628] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.638399][T19628] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.732142][T19634] device pim6reg1 entered promiscuous mode [ 504.938870][T19641] device wg2 entered promiscuous mode [ 505.996732][T19685] device pim6reg1 entered promiscuous mode [ 506.372893][T19687] device syzkaller0 entered promiscuous mode [ 506.524722][T19699] device syzkaller0 entered promiscuous mode [ 506.630638][T19710] device pim6reg1 entered promiscuous mode [ 507.048316][T19733] device pim6reg1 entered promiscuous mode [ 507.775894][T19792] device veth0_vlan left promiscuous mode [ 507.785619][T19792] device veth0_vlan entered promiscuous mode [ 507.812943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.832097][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 507.852485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 508.014168][T19806] device sit0 entered promiscuous mode [ 508.822057][T19844] device syzkaller0 entered promiscuous mode [ 508.991676][T19861] device pim6reg1 entered promiscuous mode [ 509.988968][T19910] Â: renamed from pim6reg1 [ 511.674261][T19977] device sit0 entered promiscuous mode [ 512.823949][T20001] device sit0 left promiscuous mode [ 512.967700][T20001] device sit0 entered promiscuous mode [ 514.119096][T20056] device veth0_vlan left promiscuous mode [ 514.196131][T20056] device veth0_vlan entered promiscuous mode [ 514.299549][T20077] device pim6reg1 entered promiscuous mode [ 514.545840][T20094] device veth0_vlan left promiscuous mode [ 514.552995][T20094] device veth0_vlan entered promiscuous mode [ 515.271992][T20120] device syzkaller0 entered promiscuous mode [ 515.709021][T20136] device pim6reg1 entered promiscuous mode [ 515.822890][T20142] device wg2 left promiscuous mode [ 515.879388][T20142] device wg2 entered promiscuous mode [ 516.059648][T20176] device pim6reg1 entered promiscuous mode [ 516.435481][T20211] device syzkaller0 entered promiscuous mode [ 516.726484][T20228] device pim6reg1 entered promiscuous mode [ 516.832950][T20237] syz.0.5582[20237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.833008][T20237] syz.0.5582[20237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.991403][T20300] device wg2 entered promiscuous mode [ 520.725990][T20418] device sit0 left promiscuous mode [ 524.428428][T20533] device syzkaller0 entered promiscuous mode [ 524.853494][T20543] device pim6reg1 entered promiscuous mode [ 524.883711][T20545] device sit0 left promiscuous mode [ 525.605853][T20598] device syzkaller0 entered promiscuous mode [ 527.079632][T20650] device syzkaller0 entered promiscuous mode [ 527.359051][T20669] device wg2 left promiscuous mode [ 527.374290][T20661] device syzkaller0 entered promiscuous mode [ 527.398253][T20670] device wg2 entered promiscuous mode [ 527.847240][T20679] ÿÿÿÿÿÿ: renamed from vlan1 [ 528.634718][T20698] ref_ctr_offset mismatch. inode: 0x35a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 528.877001][T20714] device pim6reg1 entered promiscuous mode [ 529.018404][T20720] FAULT_INJECTION: forcing a failure. [ 529.018404][T20720] name failslab, interval 1, probability 0, space 0, times 0 [ 529.031684][T20720] CPU: 0 PID: 20720 Comm: syz.0.5724 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 529.043184][T20720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 529.053291][T20720] Call Trace: [ 529.056611][T20720] __dump_stack+0x21/0x24 [ 529.061050][T20720] dump_stack_lvl+0x169/0x1d8 [ 529.065756][T20720] ? thaw_kernel_threads+0x220/0x220 [ 529.071085][T20720] ? show_regs_print_info+0x18/0x18 [ 529.076486][T20720] dump_stack+0x15/0x1c [ 529.080982][T20720] should_fail+0x3c1/0x510 [ 529.085417][T20720] ? call_usermodehelper_setup+0x71/0x1d0 [ 529.091154][T20720] __should_failslab+0xa4/0xe0 [ 529.095932][T20720] should_failslab+0x9/0x20 [ 529.100431][T20720] kmem_cache_alloc_trace+0x3a/0x2e0 [ 529.105722][T20720] call_usermodehelper_setup+0x71/0x1d0 [ 529.111259][T20720] ? __request_module+0x890/0x890 [ 529.116275][T20720] __request_module+0x35d/0x890 [ 529.121367][T20720] ? selinux_capable+0x29c/0x380 [ 529.126316][T20720] ? copy_regset_to_user+0x200/0x200 [ 529.131632][T20720] ? cap_capable+0x19c/0x220 [ 529.136301][T20720] ? cap_capable+0x19c/0x220 [ 529.141036][T20720] ? security_capable+0x87/0xb0 [ 529.146200][T20720] dev_load+0x5b/0xb0 [ 529.150311][T20720] dev_ioctl+0x53d/0xb80 [ 529.154997][T20720] sock_do_ioctl+0x235/0x330 [ 529.159708][T20720] ? sock_show_fdinfo+0xa0/0xa0 [ 529.164680][T20720] ? irq_work_queue+0xc1/0x150 [ 529.169453][T20720] ? selinux_file_ioctl+0x377/0x480 [ 529.174920][T20720] ? mutex_trylock+0xa0/0xa0 [ 529.179503][T20720] ? __fget_files+0x2c4/0x320 [ 529.184182][T20720] sock_ioctl+0x504/0x710 [ 529.188905][T20720] ? sock_poll+0x360/0x360 [ 529.193592][T20720] ? __fget_files+0x2c4/0x320 [ 529.198464][T20720] ? security_file_ioctl+0x84/0xa0 [ 529.203704][T20720] ? sock_poll+0x360/0x360 [ 529.208145][T20720] __se_sys_ioctl+0x121/0x1a0 [ 529.213019][T20720] __x64_sys_ioctl+0x7b/0x90 [ 529.217823][T20720] do_syscall_64+0x31/0x40 [ 529.222357][T20720] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 529.228585][T20720] RIP: 0033:0x7fbda12b9929 [ 529.232988][T20720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.252768][T20720] RSP: 002b:00007fbd9f901038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.261274][T20720] RAX: ffffffffffffffda RBX: 00007fbda14e1080 RCX: 00007fbda12b9929 [ 529.269563][T20720] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 529.277722][T20720] RBP: 00007fbd9f901090 R08: 0000000000000000 R09: 0000000000000000 [ 529.285954][T20720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.294649][T20720] R13: 0000000000000000 R14: 00007fbda14e1080 R15: 00007ffc25a9bd38 [ 530.114527][T20776] device pim6reg1 entered promiscuous mode [ 534.693676][T20954] device pim6reg1 entered promiscuous mode [ 535.092624][T20972] device syzkaller0 entered promiscuous mode [ 536.201062][T21005] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.219307][T21005] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.278692][T21005] device bridge_slave_0 entered promiscuous mode [ 536.452114][T21005] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.459333][T21005] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.479730][T21005] device bridge_slave_1 entered promiscuous mode [ 536.634241][T21035] FAULT_INJECTION: forcing a failure. [ 536.634241][T21035] name failslab, interval 1, probability 0, space 0, times 0 [ 536.652535][T21035] CPU: 1 PID: 21035 Comm: syz.4.5804 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 536.664437][T21035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 536.674960][T21035] Call Trace: [ 536.678406][T21035] __dump_stack+0x21/0x24 [ 536.683148][T21035] dump_stack_lvl+0x169/0x1d8 [ 536.687865][T21035] ? thaw_kernel_threads+0x220/0x220 [ 536.693292][T21035] ? show_regs_print_info+0x18/0x18 [ 536.698534][T21035] dump_stack+0x15/0x1c [ 536.702904][T21035] should_fail+0x3c1/0x510 [ 536.707438][T21035] ? kvmalloc_node+0x88/0x130 [ 536.712455][T21035] __should_failslab+0xa4/0xe0 [ 536.717340][T21035] should_failslab+0x9/0x20 [ 536.722057][T21035] __kmalloc+0x60/0x330 [ 536.726317][T21035] ? kvmalloc_node+0x88/0x130 [ 536.731014][T21035] kvmalloc_node+0x88/0x130 [ 536.735515][T21035] pfifo_fast_init+0x3af/0x7a0 [ 536.740386][T21035] qdisc_create_dflt+0x136/0x3a0 [ 536.745322][T21035] dev_activate+0x292/0x11c0 [ 536.749949][T21035] __dev_open+0x3aa/0x4c0 [ 536.754571][T21035] ? dev_open+0x230/0x230 [ 536.759074][T21035] ? _raw_spin_unlock_bh+0x51/0x60 [ 536.764367][T21035] ? dev_set_rx_mode+0x212/0x2c0 [ 536.769572][T21035] ? __kasan_check_read+0x11/0x20 [ 536.774678][T21035] __dev_change_flags+0x20a/0x6a0 [ 536.779782][T21035] ? dev_get_flags+0x1e0/0x1e0 [ 536.784893][T21035] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 536.792039][T21035] dev_change_flags+0x88/0x1a0 [ 536.797002][T21035] dev_ifsioc+0x113/0xa50 [ 536.801721][T21035] ? dev_ioctl+0xb80/0xb80 [ 536.806186][T21035] dev_ioctl+0x550/0xb80 [ 536.810616][T21035] sock_do_ioctl+0x235/0x330 [ 536.815225][T21035] ? sock_show_fdinfo+0xa0/0xa0 [ 536.820947][T21035] ? selinux_file_ioctl+0x377/0x480 [ 536.826168][T21035] ? mutex_trylock+0xa0/0xa0 [ 536.830995][T21035] ? __fget_files+0x2c4/0x320 [ 536.835744][T21035] sock_ioctl+0x504/0x710 [ 536.840254][T21035] ? sock_poll+0x360/0x360 [ 536.844756][T21035] ? __fget_files+0x2c4/0x320 [ 536.849452][T21035] ? security_file_ioctl+0x84/0xa0 [ 536.854738][T21035] ? sock_poll+0x360/0x360 [ 536.859146][T21035] __se_sys_ioctl+0x121/0x1a0 [ 536.864008][T21035] __x64_sys_ioctl+0x7b/0x90 [ 536.868705][T21035] do_syscall_64+0x31/0x40 [ 536.873116][T21035] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 536.879174][T21035] RIP: 0033:0x7f5f7e50c929 [ 536.883590][T21035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.903377][T21035] RSP: 002b:00007f5f7cb54038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 536.911996][T21035] RAX: ffffffffffffffda RBX: 00007f5f7e734080 RCX: 00007f5f7e50c929 [ 536.920418][T21035] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 536.928855][T21035] RBP: 00007f5f7cb54090 R08: 0000000000000000 R09: 0000000000000000 [ 536.936929][T21035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.945085][T21035] R13: 0000000000000000 R14: 00007f5f7e734080 R15: 00007ffda0355d48 [ 536.957734][T21035] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 536.965965][T21035] device pim6reg1 entered promiscuous mode [ 537.229147][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 537.245803][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.296116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 537.335909][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 537.381341][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.388970][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.471553][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 537.498232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 537.506989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 537.515417][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.522665][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.618650][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 537.629337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 537.673517][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 537.682532][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 537.800705][T21005] device veth0_vlan entered promiscuous mode [ 537.807195][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 537.840809][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.003519][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 538.011773][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.126525][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 538.141236][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 538.203112][T21005] device veth1_macvtap entered promiscuous mode [ 538.312703][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 538.360867][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 538.428783][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 538.490275][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 538.499211][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 538.853961][ T7] device veth1_macvtap left promiscuous mode [ 539.289510][T21060] device pim6reg1 entered promiscuous mode [ 540.620759][T21133] device pim6reg1 entered promiscuous mode [ 540.934496][T21147] device veth0_vlan left promiscuous mode [ 540.951075][T21147] device veth0_vlan entered promiscuous mode [ 540.970378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 541.021324][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 541.057347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 542.001114][T21195] syz.2.5850[21195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.001187][T21195] syz.2.5850[21195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.912144][T21250] device veth0_vlan left promiscuous mode [ 543.935891][T21250] device veth0_vlan entered promiscuous mode [ 543.943578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.954488][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.968402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 544.629947][T21284] device pim6reg1 entered promiscuous mode [ 546.395485][T21336] device pim6reg1 entered promiscuous mode [ 546.536070][T21338] device veth0_vlan left promiscuous mode [ 546.565213][T21338] device veth0_vlan entered promiscuous mode [ 546.603756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.622456][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 546.673178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 547.026409][T21362] device syzkaller0 entered promiscuous mode [ 547.033129][T21363] device pim6reg1 entered promiscuous mode [ 547.472300][T21374] device sit0 entered promiscuous mode [ 548.439714][T21388] device sit0 left promiscuous mode [ 548.883238][T21395] device syzkaller0 entered promiscuous mode [ 554.133453][T21551] device syzkaller0 entered promiscuous mode [ 554.759914][T21584] device sit0 left promiscuous mode [ 554.850145][T21590] device sit0 entered promiscuous mode [ 555.916217][T21638] device wg2 left promiscuous mode [ 556.328415][T21653] device syzkaller0 entered promiscuous mode [ 556.385756][T21649] device wg2 left promiscuous mode [ 556.746119][T21682] device syzkaller0 entered promiscuous mode [ 557.840665][T21722] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 558.817132][T21767] device syzkaller0 entered promiscuous mode [ 558.842856][T21780] device wg2 entered promiscuous mode [ 559.054286][T21789] device pim6reg1 entered promiscuous mode [ 559.231432][T21809] device sit0 left promiscuous mode [ 559.714956][T21820] Q±6ã`Ò˜: renamed from lo [ 561.604924][T21923] device veth1_macvtap left promiscuous mode [ 561.998236][T21929] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.103693][T21929] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.160515][T21929] device bridge_slave_0 entered promiscuous mode [ 562.383476][T21929] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.394405][T21929] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.411420][T21929] device bridge_slave_1 entered promiscuous mode [ 562.463564][T21942] device ip6tnl0 entered promiscuous mode [ 562.688990][T21929] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.696468][T21929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 562.704026][T21929] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.711482][T21929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 562.947646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 562.956860][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 562.966636][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 562.976100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 562.984782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 563.041882][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 563.054752][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 563.072574][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 563.081867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 563.090359][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 563.099184][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 563.140574][T21929] device veth0_vlan entered promiscuous mode [ 563.149096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 563.164992][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 563.217502][T21929] device veth1_macvtap entered promiscuous mode [ 563.233611][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 563.253567][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 563.268669][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 563.352399][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 563.362445][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 563.372505][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 563.382401][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 563.933165][ T9] device veth1 left promiscuous mode [ 563.939125][ T9] kfree: port 1(veth1) entered disabled state [ 563.954455][ T9] device veth0_vlan left promiscuous mode [ 564.246262][T22002] device syzkaller0 entered promiscuous mode [ 565.293385][T22073] device veth0_vlan left promiscuous mode [ 565.299956][T22073] device veth0_vlan entered promiscuous mode [ 565.379251][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 565.388700][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 565.405669][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 566.402085][T22098] device veth0_vlan left promiscuous mode [ 566.413183][T22098] device veth0_vlan entered promiscuous mode [ 568.194223][T22193] device syzkaller0 entered promiscuous mode [ 568.277435][T22198] bridge0: port 3(veth0) entered blocking state [ 568.304062][T22198] bridge0: port 3(veth0) entered disabled state [ 568.388178][T22198] device veth0 entered promiscuous mode [ 568.413668][T22198] bridge0: port 3(veth0) entered blocking state [ 568.420754][T22198] bridge0: port 3(veth0) entered forwarding state [ 568.940489][T22208] device syzkaller0 entered promiscuous mode [ 569.037192][T22213] syz.4.6127[22213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.038536][T22213] syz.4.6127[22213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.210827][T22208] device wg2 entered promiscuous mode [ 573.080051][T22376] device pim6reg1 entered promiscuous mode [ 573.301345][T22378] device syzkaller0 entered promiscuous mode [ 573.569048][T22379] device wg2 entered promiscuous mode [ 575.334997][T22454] device sit0 entered promiscuous mode [ 575.922806][T22498] device pim6reg1 entered promiscuous mode [ 576.448650][T22519] device pim6reg1 entered promiscuous mode [ 577.193111][T22535] device veth1_to_bond entered promiscuous mode [ 578.609602][T22575] device syzkaller0 entered promiscuous mode [ 578.822092][T22590] device veth0_vlan left promiscuous mode [ 578.872343][T22590] device veth0_vlan entered promiscuous mode [ 578.942703][T22592] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.997713][T22593] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.004900][T22593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.476911][T22606] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.534149][T22606] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.542212][T22606] device bridge_slave_0 entered promiscuous mode [ 579.572404][T22606] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.600572][T22606] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.608232][T22606] device bridge_slave_1 entered promiscuous mode [ 579.820626][T22624] device sit0 entered promiscuous mode [ 579.897970][T22606] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.905288][T22606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.913056][T22606] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.920288][T22606] bridge0: port 1(bridge_slave_0) entered forwarding state [ 580.013441][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 580.032098][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.061939][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.155020][T22641] device pim6reg1 entered promiscuous mode [ 580.261697][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 580.270210][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.277301][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 580.409647][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 580.449490][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.456630][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 580.655969][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 580.666277][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 580.751871][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 580.763726][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 580.896843][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 580.907304][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 580.918877][ T9] device erspan0 left promiscuous mode [ 580.924807][ T9] Ÿë: port 2(erspan0) entered disabled state [ 580.971824][T22606] device veth0_vlan entered promiscuous mode [ 580.980824][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 580.989682][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 581.045973][T22606] device veth1_macvtap entered promiscuous mode [ 581.054257][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 581.062808][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 581.071007][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 581.079376][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 581.088625][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 581.223999][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 581.250936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 581.260826][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 581.277224][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 581.352103][ T9] device veth0_to_team left promiscuous mode [ 581.384856][ T9] Ÿë: port 1(veth0_to_team) entered disabled state [ 581.439369][ T9] device veth0_vlan left promiscuous mode [ 581.914226][T22687] syz.4.6258[22687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 581.914296][T22687] syz.4.6258[22687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.516271][T22703] device veth0_vlan left promiscuous mode [ 582.599807][T22703] device veth0_vlan entered promiscuous mode [ 582.899585][T22736] device syzkaller0 entered promiscuous mode [ 583.565575][T22772] tun0: tun_chr_ioctl cmd 1074025681 [ 584.135082][T22795] device wg2 left promiscuous mode [ 584.277406][T22803] tap0: tun_chr_ioctl cmd 2147767511 [ 584.283149][T22804] tap0: tun_chr_ioctl cmd 2147767511 [ 584.526759][T22825] device pim6reg1 entered promiscuous mode [ 587.859912][T22972] device veth0_vlan left promiscuous mode [ 587.925692][T22972] device veth0_vlan entered promiscuous mode [ 588.644170][T23020] device syzkaller0 entered promiscuous mode [ 589.235285][ T24] audit: type=1400 audit(1750167064.390:174): avc: denied { read } for pid=23075 comm="syz.4.6367" name="cgroup.subtree_control" dev="cgroup2" ino=226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 590.400821][T23135] device wg2 entered promiscuous mode [ 592.174921][T23186] device syzkaller0 entered promiscuous mode [ 594.343388][T23286] device syzkaller0 entered promiscuous mode [ 596.439789][T23371] device syzkaller0 entered promiscuous mode [ 596.555967][T23386] tun0: tun_chr_ioctl cmd 1074025692 [ 596.561636][T23385] tun0: tun_chr_ioctl cmd 1074025673 [ 596.743268][T23403] device syzkaller0 entered promiscuous mode [ 596.972727][T23406] device pim6reg1 entered promiscuous mode [ 597.253832][T23429] device pim6reg1 entered promiscuous mode [ 597.430920][T23451] device wg2 left promiscuous mode [ 603.357114][T23622] device syzkaller0 entered promiscuous mode [ 603.637608][T23653] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.645520][T23653] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.213522][T23679] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 604.246818][T23679] pim6reg0: linktype set to 530 [ 604.271230][T23679] pim6reg0: tun_chr_ioctl cmd 35108 [ 604.627534][T23707] syz.4.6541[23707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.627607][T23707] syz.4.6541[23707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.054353][ T24] audit: type=1400 audit(1750167080.240:175): avc: denied { create } for pid=23730 comm="syz.3.6547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 605.209614][T23728] device syzkaller0 entered promiscuous mode [ 606.610541][T23780] device pim6reg1 entered promiscuous mode [ 607.792886][T23825] device bridge_slave_1 left promiscuous mode [ 607.811213][T23825] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.836203][T23825] device bridge_slave_0 left promiscuous mode [ 607.871201][T23825] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.019827][T23837] device syzkaller0 entered promiscuous mode [ 608.042043][T23838] device syzkaller0 entered promiscuous mode [ 608.470339][T23856] device wg2 left promiscuous mode [ 608.548965][T23856] device wg2 entered promiscuous mode [ 608.672705][T23861] device veth1_macvtap left promiscuous mode [ 608.680677][T23861] device macsec0 entered promiscuous mode [ 609.539426][T23885] device pim6reg1 entered promiscuous mode [ 609.748280][T23887] bridge0: port 3(veth0) entered disabled state [ 609.755820][T23887] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.764225][T23887] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.857106][T23893] device veth0 left promiscuous mode [ 609.866923][T23893] bridge0: port 3(veth0) entered disabled state [ 609.879439][T23893] device bridge_slave_1 left promiscuous mode [ 609.885780][T23893] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.894143][T23893] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.413495][T23919] device pim6reg1 entered promiscuous mode [ 610.681590][T23927] device wg2 entered promiscuous mode [ 610.727521][T23932] device sit0 entered promiscuous mode [ 611.290660][T23987] device pim6reg1 entered promiscuous mode [ 611.487654][T23998] device syzkaller0 entered promiscuous mode [ 611.579129][T24004] device syzkaller0 entered promiscuous mode [ 611.795709][T24016] syz.3.6629[24016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.795810][T24016] syz.3.6629[24016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 612.536995][T24047] device pim6reg1 entered promiscuous mode [ 614.111743][T24114] device pim6reg1 entered promiscuous mode [ 614.827820][T24137] device pim6reg1 entered promiscuous mode [ 614.984278][T24158] syz.2.6669[24158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.984348][T24158] syz.2.6669[24158] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.768506][T24271] device sit0 left promiscuous mode [ 617.822843][T24273] device sit0 entered promiscuous mode [ 618.536490][T24290] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 619.343336][T24325] device syzkaller0 entered promiscuous mode [ 619.549175][T24307] cgroup: fork rejected by pids controller in /syz4 [ 619.976539][T24390] device syzkaller0 entered promiscuous mode [ 620.446009][T24416] device syzkaller0 entered promiscuous mode [ 621.199511][T24461] device syzkaller0 entered promiscuous mode [ 621.426073][T24466] device veth0_vlan left promiscuous mode [ 621.443720][T24466] device veth0_vlan entered promiscuous mode [ 621.571652][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 621.611178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 621.644105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 621.801487][T24487] kfree: port 1(veth1) entered blocking state [ 621.809207][T24487] kfree: port 1(veth1) entered disabled state [ 621.832009][T24487] device veth1 entered promiscuous mode [ 621.916501][T24497] device wg2 entered promiscuous mode [ 622.202333][T24519] device veth0_vlan left promiscuous mode [ 622.299286][T24519] device veth0_vlan entered promiscuous mode [ 622.323852][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 622.341717][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 622.368444][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.305634][T24551] device syzkaller0 entered promiscuous mode [ 623.766745][T24576] device syzkaller0 entered promiscuous mode [ 624.083750][T24600] ÿÿÿÿÿÿ: renamed from vlan1 [ 624.466346][T24618] device syzkaller0 entered promiscuous mode [ 625.259717][T24662] device wg2 entered promiscuous mode [ 625.696978][T24683] syz.4.6798[24683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.697784][T24683] syz.4.6798[24683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.929022][T24749] device sit0 entered promiscuous mode [ 629.350088][T24873] ÿÿÿÿÿÿ: renamed from vlan1 [ 630.012773][T24907] device syzkaller0 entered promiscuous mode [ 630.558928][T24915] device syzkaller0 entered promiscuous mode [ 631.102764][T24954] device syzkaller0 entered promiscuous mode [ 631.577643][T24965] device wg2 left promiscuous mode [ 631.609329][T24975] device wg2 entered promiscuous mode [ 631.677174][T24983] device syzkaller0 entered promiscuous mode [ 632.459375][T25007] device syzkaller0 entered promiscuous mode [ 637.003212][T25234] device syzkaller0 entered promiscuous mode [ 638.086198][T25256] device wg2 left promiscuous mode [ 638.174426][T25271] syz.0.6960[25271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.174505][T25271] syz.0.6960[25271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.199359][T25256] device wg2 entered promiscuous mode [ 638.904172][T25287] device syzkaller0 entered promiscuous mode [ 638.984935][T25291] device sit0 entered promiscuous mode [ 639.978108][T25350] device syzkaller0 entered promiscuous mode [ 640.587260][T25408] device sit0 left promiscuous mode [ 640.642117][T25409] device sit0 entered promiscuous mode [ 642.750895][T25457] device pim6reg1 entered promiscuous mode [ 644.034449][T25511] device pim6reg1 entered promiscuous mode [ 644.807780][T25541] device pim6reg1 entered promiscuous mode [ 645.811900][T25588] device sit0 left promiscuous mode [ 645.947129][T25595] €Â0: renamed from pim6reg1 [ 646.129208][T25608] device wg2 left promiscuous mode [ 646.176351][T25608] device wg2 entered promiscuous mode [ 649.276662][T25641] device wg2 left promiscuous mode [ 649.332679][T25642] device wg2 entered promiscuous mode [ 649.609228][T25666] device sit0 left promiscuous mode [ 649.753825][T25675] device sit0 entered promiscuous mode [ 650.734395][T25751] device wg2 entered promiscuous mode [ 651.199198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 651.242642][ C1] Illegal XDP return value 16128, expect packet loss! [ 651.716593][T25800] syz.1.7106[25800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.716656][T25800] syz.1.7106[25800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.800802][T25799] syz.1.7106[25799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.871013][T25799] syz.1.7106[25799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.059455][T25834] ref_ctr_offset mismatch. inode: 0x925 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 654.177724][T25848] syz.1.7120[25848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.462190][T25846] device syzkaller0 entered promiscuous mode [ 654.652730][T25861] device pim6reg1 entered promiscuous mode [ 656.656271][T25946] device syzkaller0 entered promiscuous mode [ 656.833218][T25962] ref_ctr_offset mismatch. inode: 0x965 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 656.961348][T25963] device sit0 entered promiscuous mode [ 657.102529][T25974] bridge0: port 3(veth0) entered blocking state [ 657.109356][T25974] bridge0: port 3(veth0) entered disabled state [ 657.123273][T25974] device veth0 entered promiscuous mode [ 657.129725][T25974] bridge0: port 3(veth0) entered blocking state [ 657.136496][T25974] bridge0: port 3(veth0) entered forwarding state [ 657.212645][T25985] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.269931][T25987] device veth0_to_team entered promiscuous mode [ 657.718494][T26012] ÿÿÿÿÿÿ: renamed from vlan1 [ 660.287937][T26119] device syzkaller0 entered promiscuous mode [ 661.504942][T26185] device wg2 left promiscuous mode [ 661.581071][T26185] device wg2 entered promiscuous mode [ 661.950831][T26212] syz.3.7214[26212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 661.950886][T26212] syz.3.7214[26212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.628632][T26267] device sit0 left promiscuous mode [ 662.725488][T26265] bridge0: port 3(veth0) entered disabled state [ 662.733437][T26265] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.743763][T26265] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.801207][T26277] device veth0 left promiscuous mode [ 662.806698][T26277] bridge0: port 3(veth0) entered disabled state [ 662.814015][T26277] device bridge_slave_1 left promiscuous mode [ 662.820246][T26277] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.837400][T26277] device bridge_slave_0 left promiscuous mode [ 662.845321][T26277] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.406620][T26297] device syzkaller0 entered promiscuous mode [ 663.723337][T26312] device syzkaller0 entered promiscuous mode [ 663.822786][T26317] device pim6reg1 entered promiscuous mode [ 663.889073][T26319] device wg2 left promiscuous mode [ 663.970966][T26319] device wg2 entered promiscuous mode [ 665.752830][T26395] device veth0_vlan left promiscuous mode [ 665.763293][T26395] device veth0_vlan entered promiscuous mode [ 665.784082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.796494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.811348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 666.638966][T26444] device veth0_vlan left promiscuous mode [ 666.646968][T26444] device veth0_vlan entered promiscuous mode [ 666.656744][T26446] syz.0.7285[26446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.656802][T26446] syz.0.7285[26446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.675714][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.756419][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.797768][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 667.513728][T26476] device syzkaller0 entered promiscuous mode [ 669.871828][T26600] device syzkaller0 entered promiscuous mode [ 671.238006][T26669] bridge0: port 3(veth0) entered blocking state [ 671.276566][T26669] bridge0: port 3(veth0) entered disabled state [ 671.320133][T26669] device veth0 entered promiscuous mode [ 671.420437][T26661] device wg2 left promiscuous mode [ 671.959275][T26725] syz.2.7364[26725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 671.959374][T26725] syz.2.7364[26725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 674.585455][T26796] device sit0 left promiscuous mode [ 675.104202][T26820] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 675.118904][T26820] syzkaller0: linktype set to 1 [ 675.281659][T26832] syz.3.7396[26832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 675.281766][T26832] syz.3.7396[26832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 676.256126][T26887] device pim6reg1 entered promiscuous mode [ 677.134393][T26895] device syzkaller0 entered promiscuous mode [ 678.565900][T26936] device syzkaller0 entered promiscuous mode [ 678.648380][T26945] device veth0 left promiscuous mode [ 678.655405][T26945] bridge0: port 3(veth0) entered disabled state [ 678.663240][T26945] device bridge_slave_1 left promiscuous mode [ 678.669515][T26945] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.679421][T26945] device bridge_slave_0 left promiscuous mode [ 678.685884][T26945] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.893077][T26953] device pim6reg1 entered promiscuous mode [ 681.183130][T27051] syz.4.7470[27051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.183204][T27051] syz.4.7470[27051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.284042][T27051] syz.4.7470[27051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.296958][T27051] syz.4.7470[27051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.608996][T27076] device pim6reg1 entered promiscuous mode [ 684.282511][T27135] device veth1_to_bond entered promiscuous mode [ 684.524699][T27141] device syzkaller0 entered promiscuous mode [ 684.711458][T27145] device veth1_to_bond entered promiscuous mode [ 689.591131][T27411] device pim6reg1 entered promiscuous mode [ 690.088091][T27437] device wg2 left promiscuous mode [ 690.227048][T27449] device pim6reg1 entered promiscuous mode [ 690.577000][T27461] device sit0 left promiscuous mode [ 690.637546][T27462] device sit0 entered promiscuous mode [ 692.125471][T27513] device sit0 left promiscuous mode [ 692.247577][T27513] device sit0 entered promiscuous mode [ 692.492526][T27530] device syzkaller0 entered promiscuous mode [ 693.212568][T27543] device wg2 left promiscuous mode [ 693.261216][T27543] device wg2 entered promiscuous mode [ 693.540988][T27557] device sit0 left promiscuous mode [ 694.312915][T27581] device veth0_vlan left promiscuous mode [ 694.335165][T27581] device veth0_vlan entered promiscuous mode [ 694.367089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 694.381004][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 694.391734][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 695.272834][T27653] device wg2 left promiscuous mode [ 695.305138][T27653] device wg2 entered promiscuous mode [ 695.532562][T27667] device pim6reg1 entered promiscuous mode [ 695.884381][T27681] device pim6reg1 entered promiscuous mode [ 696.544358][T27698] 7B’ç÷ï: renamed from syzkaller0 [ 696.870860][T27728] device veth0_vlan left promiscuous mode [ 696.904112][T27728] device veth0_vlan entered promiscuous mode [ 696.977918][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.999867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 697.102050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 697.440119][T27756] device wg2 entered promiscuous mode [ 703.427679][T27940] device wg2 left promiscuous mode [ 703.459573][T27939] device wg2 entered promiscuous mode [ 704.583724][T27980] device syzkaller0 entered promiscuous mode [ 705.009224][T28028] device wg2 left promiscuous mode [ 705.047788][T28028] device wg2 entered promiscuous mode [ 706.476739][T28078] device veth0_vlan left promiscuous mode [ 706.488543][T28078] device veth0_vlan entered promiscuous mode [ 706.533289][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.541865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.570865][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 708.063220][T28171] device sit0 entered promiscuous mode [ 709.707138][T28215] device syzkaller0 entered promiscuous mode [ 709.759662][ T95] udevd[95]: worker [19306] terminated by signal 33 (Unknown signal 33) [ 709.775382][ T95] udevd[95]: worker [19306] failed while handling '/devices/virtual/block/loop1' [ 709.908090][T28234] device sit0 left promiscuous mode [ 710.023272][T28237] device sit0 entered promiscuous mode [ 710.731813][T28249] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.739194][T28249] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.747168][T28249] device bridge_slave_0 entered promiscuous mode [ 710.755249][T28249] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.762624][T28249] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.770634][T28249] device bridge_slave_1 entered promiscuous mode [ 710.864501][T28249] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.871888][T28249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 710.879296][T28249] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.886381][T28249] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.949558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 710.958881][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.966943][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.003840][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 711.013138][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.020342][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.028323][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 711.039499][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.046632][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.061301][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 711.069587][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 711.109286][T28249] device veth0_vlan entered promiscuous mode [ 711.122952][T28249] device veth1_macvtap entered promiscuous mode [ 711.150122][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 711.161578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 711.202059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 711.211213][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.219528][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.227270][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 711.235331][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 711.528833][T28279] syz.1.7828[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.528952][T28279] syz.1.7828[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.543433][T28279] syz.1.7828[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 711.630712][T28279] syz.1.7828[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 712.174831][ T2588] GPL: port 1(erspan0) entered disabled state [ 712.217264][ T2588] GPL: port 1(erspan0) entered disabled state [ 712.799871][T28326] device syzkaller0 entered promiscuous mode [ 714.125230][T28387] €Â0: renamed from pim6reg1 [ 714.512030][T28404] device pim6reg1 entered promiscuous mode [ 715.227300][T28427] syz.2.7869[28427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.227407][T28427] syz.2.7869[28427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 715.713142][T28437] device wg2 entered promiscuous mode [ 715.875359][T28441] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.884558][T28473] device veth0_vlan left promiscuous mode [ 716.904852][T28473] device veth0_vlan entered promiscuous mode [ 716.943007][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 716.953685][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.962632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 717.005782][T28486] device pim6reg1 entered promiscuous mode [ 717.061510][T28489] device syzkaller0 entered promiscuous mode [ 717.135859][T28497] @ÿ: renamed from bond_slave_0 [ 717.374924][T28515] device wg2 left promiscuous mode [ 717.708393][T28515] device syzkaller0 entered promiscuous mode [ 717.839449][T28545] device veth0_vlan left promiscuous mode [ 717.847784][T28545] device veth0_vlan entered promiscuous mode [ 718.265694][T28569] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 718.999407][T28630] syz.2.7923[28630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 718.999507][T28630] syz.2.7923[28630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 719.415408][T28619] device syzkaller0 entered promiscuous mode [ 720.263519][T28669] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.275203][T28669] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.283035][T28669] device bridge_slave_0 entered promiscuous mode [ 720.292604][T28669] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.311497][T28669] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.409687][T28669] device bridge_slave_1 entered promiscuous mode [ 720.704040][T28669] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.711430][T28669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.718831][T28669] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.725941][T28669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.875021][T28707] device sit0 entered promiscuous mode [ 721.062097][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.091006][T24104] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.172110][T24104] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.219675][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.232861][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.250947][T24104] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.258143][T24104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.268252][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.277477][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.289236][T24104] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.296341][T24104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.430373][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 721.447361][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.459124][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 721.468849][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.524899][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 721.544953][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 721.570277][T28669] device veth0_vlan entered promiscuous mode [ 721.617334][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 721.644101][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 721.827580][T28669] device veth1_macvtap entered promiscuous mode [ 721.896041][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 721.936208][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 721.986073][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 722.027849][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 722.040912][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 722.092366][T28761] device syzkaller0 entered promiscuous mode [ 722.124260][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 722.151461][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 722.179424][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 722.192938][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 722.441394][T28778] device syzkaller0 entered promiscuous mode [ 722.858968][T28806] device syzkaller0 entered promiscuous mode [ 723.022897][T28816] bridge0: port 3(veth0) entered blocking state [ 723.040113][T28816] bridge0: port 3(veth0) entered disabled state [ 723.105245][T28816] device veth0 entered promiscuous mode [ 723.139268][T28816] bridge0: port 3(veth0) entered blocking state [ 723.146068][T28816] bridge0: port 3(veth0) entered forwarding state [ 723.221125][T28833] device wg2 left promiscuous mode [ 723.247781][T28835] device wg2 left promiscuous mode [ 723.326118][T28835] device wg2 entered promiscuous mode [ 723.363170][T28838] device sit0 left promiscuous mode [ 723.398773][ T7] device veth0_vlan left promiscuous mode [ 724.764438][T28914] device sit0 left promiscuous mode [ 725.354381][T28927] device sit0 entered promiscuous mode [ 725.741494][T28939] device sit0 entered promiscuous mode [ 726.711629][T28947] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 726.735470][T28947] pim6reg0: linktype set to 780 [ 726.760999][T28947] pim6reg0: tun_chr_ioctl cmd 35092 [ 726.839761][T28956] device sit0 left promiscuous mode [ 727.725104][T28961] device syzkaller0 entered promiscuous mode [ 728.412364][T28986] device sit0 entered promiscuous mode [ 729.063744][T29001] device sit0 left promiscuous mode [ 729.814984][T29015] device pim6reg1 entered promiscuous mode [ 730.690834][T29044] device syzkaller0 entered promiscuous mode [ 731.160001][T29066] device pim6reg1 entered promiscuous mode [ 732.096901][T29099] device syzkaller0 entered promiscuous mode [ 732.149014][T29113] device pim6reg1 entered promiscuous mode [ 732.193728][T29115] device syzkaller0 entered promiscuous mode [ 732.295200][T29117] tap0: tun_chr_ioctl cmd 1074025677 [ 732.308537][T29117] tap0: linktype set to 778 [ 733.129609][T29161] device pim6reg1 entered promiscuous mode [ 733.858212][T29195] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.875628][T29195] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.933233][T29192] device wg2 left promiscuous mode [ 734.932337][T29248] ref_ctr_offset mismatch. inode: 0x721 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 734.952785][T29258] device syzkaller0 entered promiscuous mode [ 736.357379][T29326] syz.0.8109[29326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.357482][T29326] syz.0.8109[29326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 736.627592][T29335] device bridge_slave_1 left promiscuous mode [ 736.683104][T29335] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.724422][T29335] device bridge_slave_0 left promiscuous mode [ 736.740602][T29335] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.948806][T29340] device pim6reg1 entered promiscuous mode [ 738.770715][T29420] device wg2 left promiscuous mode [ 738.830096][T29420] device veth0_vlan left promiscuous mode [ 738.850565][T29420] device veth0_vlan entered promiscuous mode [ 738.879325][T29420] device wg2 entered promiscuous mode [ 738.962416][T29427] device syzkaller0 entered promiscuous mode [ 739.885682][T29452] device syzkaller0 entered promiscuous mode [ 739.892602][T29446] syz.0.8140[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.892685][T29446] syz.0.8140[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.005604][T29446] syz.0.8140[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.049984][T29446] syz.0.8140[29446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 740.251786][T29469] device pim6reg1 entered promiscuous mode [ 740.340990][T29472] device wg2 entered promiscuous mode [ 740.537551][T29475] device pim6reg1 entered promiscuous mode [ 741.060956][T29501] device pim6reg1 entered promiscuous mode [ 741.318731][T29524] device pim6reg1 entered promiscuous mode [ 742.454726][T29562] device syzkaller0 entered promiscuous mode [ 742.480662][T29560] device wg2 entered promiscuous mode [ 742.561335][T29576] device pim6reg1 entered promiscuous mode [ 742.768979][T29586] device veth0_vlan left promiscuous mode [ 742.775989][T29586] device veth0_vlan entered promiscuous mode [ 743.435212][T29618] device pim6reg1 entered promiscuous mode [ 744.878793][T29666] device syzkaller0 entered promiscuous mode [ 745.613797][T29727] device sit0 entered promiscuous mode [ 746.731683][T29775] device syzkaller0 entered promiscuous mode [ 747.195304][T29800] device pim6reg1 entered promiscuous mode [ 748.183102][T29856] device sit0 left promiscuous mode [ 748.322973][T29860] device sit0 entered promiscuous mode [ 749.137969][T29885] device pim6reg1 entered promiscuous mode [ 749.169352][T29887] device syzkaller0 entered promiscuous mode [ 751.088320][T29977] syz.4.8289[29977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.088426][T29977] syz.4.8289[29977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 751.691874][T29999] device syzkaller0 entered promiscuous mode [ 751.852316][T30010] device syzkaller0 entered promiscuous mode [ 752.394004][T30023] device pim6reg1 entered promiscuous mode [ 752.951614][T30037] device pim6reg1 entered promiscuous mode [ 753.422919][T30063] device veth1_to_bond entered promiscuous mode [ 755.037720][T30123] device wg2 left promiscuous mode [ 755.341195][T30127] device sit0 left promiscuous mode [ 755.359104][T30129] device sit0 entered promiscuous mode [ 757.666163][T30241] device pim6reg1 entered promiscuous mode [ 757.858271][T30247] device sit0 left promiscuous mode [ 757.898771][T30247] device sit0 entered promiscuous mode [ 758.454166][T30280] device syzkaller0 entered promiscuous mode [ 758.541928][T30288] device pim6reg1 entered promiscuous mode [ 759.656043][T30331] device pim6reg1 entered promiscuous mode [ 760.308541][T30348] device pim6reg1 entered promiscuous mode [ 760.359390][T30348] device pim6reg1 left promiscuous mode [ 761.782024][T30389] device pim6reg1 entered promiscuous mode [ 762.388404][T30404] ±ÿ: renamed from team_slave_1 [ 765.458964][T30596] device syzkaller0 entered promiscuous mode [ 765.722116][T30620] device pim6reg1 entered promiscuous mode [ 766.161838][T30634] device syzkaller0 entered promiscuous mode [ 768.114110][T30712] syz.1.8506[30712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.114221][T30712] syz.1.8506[30712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.127818][T30715] syz.0.8505[30715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.203527][T30715] syz.0.8505[30715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.232846][T30717] Â: renamed from pim6reg1 [ 768.922223][T30746] device pim6reg1 entered promiscuous mode [ 770.070193][T30810] device pim6reg1 entered promiscuous mode [ 770.903438][T30821] device syzkaller0 entered promiscuous mode [ 772.253781][T30864] device sit0 entered promiscuous mode [ 773.788302][T30923] device macsec0 left promiscuous mode [ 773.895495][T30934] device wg2 entered promiscuous mode [ 773.946304][T30929] device syzkaller0 entered promiscuous mode [ 774.841898][T30970] syz.3.8574[30970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 774.841971][T30970] syz.3.8574[30970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.119503][T30980] device wg2 left promiscuous mode [ 775.428918][T30980] device wg2 entered promiscuous mode [ 776.375903][T31042] device wg2 left promiscuous mode [ 776.447126][T31042] device syzkaller0 entered promiscuous mode [ 776.488142][T31049] device wg2 entered promiscuous mode [ 776.865332][T31064] device pim6reg1 entered promiscuous mode [ 777.053926][T31079] device sit0 left promiscuous mode [ 777.478103][T31099] device sit0 entered promiscuous mode [ 778.149832][T31158] device syzkaller0 entered promiscuous mode [ 778.157948][T31155] device pim6reg1 entered promiscuous mode [ 778.254631][T31169] device pim6reg1 entered promiscuous mode [ 778.377071][T31184] device sit0 left promiscuous mode [ 778.520882][T31193] syz.2.8637[31193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.520974][T31193] syz.2.8637[31193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.565647][T31185] device sit0 entered promiscuous mode [ 778.975126][T31210] device syzkaller0 entered promiscuous mode [ 779.101236][T31224] device wg2 left promiscuous mode [ 779.125762][T31224] device wg2 entered promiscuous mode [ 779.343364][T31232] device syzkaller0 entered promiscuous mode [ 779.666994][T31236] device sit0 entered promiscuous mode [ 779.688334][T31239] device veth1_macvtap left promiscuous mode [ 779.785722][T31245] syz.2.8650[31245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 779.785828][T31245] syz.2.8650[31245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 779.804860][T31242] device syzkaller0 entered promiscuous mode [ 779.929096][T31258] device pim6reg1 entered promiscuous mode [ 780.768770][T31298] device veth0_vlan left promiscuous mode [ 780.915397][T31298] device veth0_vlan entered promiscuous mode [ 780.959860][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 781.001795][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 781.030722][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 781.912176][T31353] device pim6reg1 entered promiscuous mode [ 783.722469][T31422] bridge0: port 1(bridge_slave_0) entered blocking state [ 783.729960][T31422] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.779463][T31422] device bridge_slave_0 entered promiscuous mode [ 783.953112][T31422] bridge0: port 2(bridge_slave_1) entered blocking state [ 783.962867][T31422] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.975071][T31422] device bridge_slave_1 entered promiscuous mode [ 784.288084][T31466] device syzkaller0 entered promiscuous mode [ 784.552198][T31481] device pim6reg1 entered promiscuous mode [ 784.593483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 784.602929][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 784.637128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 784.646677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 784.655214][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 784.662337][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 784.671011][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 784.679357][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 784.687884][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 784.695468][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 784.858233][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 784.866690][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 785.049268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 785.160164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 785.246792][T31422] device veth0_vlan entered promiscuous mode [ 785.253948][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 785.262663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 785.287870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 785.375811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 785.429012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 785.486151][T31422] device veth1_macvtap entered promiscuous mode [ 785.540248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 785.555943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 785.597289][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 785.664296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 785.673071][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 785.689164][ T48] device veth1_macvtap left promiscuous mode [ 786.227837][T31498] device sit0 entered promiscuous mode [ 786.854946][T31505] syz.1.8719[31505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 786.855014][T31505] syz.1.8719[31505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 787.142724][T31508] device veth0_vlan left promiscuous mode [ 787.187419][T31508] device veth0_vlan entered promiscuous mode [ 787.273377][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.287167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 787.324189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.407396][T31522] €Â0: renamed from pim6reg1 [ 788.779110][T31546] device pim6reg1 entered promiscuous mode [ 789.378341][T31602] device syzkaller0 entered promiscuous mode [ 789.523888][T31624] : port 1(vlan0) entered blocking state [ 789.530563][T31624] : port 1(vlan0) entered disabled state [ 789.536984][T31624] device vlan0 entered promiscuous mode [ 789.575565][T31620] device sit0 left promiscuous mode [ 789.843608][T31638] ÿÿÿÿÿÿ: renamed from vlan1 [ 790.249530][T31656] ªªªªªª: renamed from vlan1 [ 791.761456][T31746] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.222926][T31760] device sit0 entered promiscuous mode [ 793.478909][T31816] device sit0 left promiscuous mode [ 810.700239][T31937] device pim6reg1 entered promiscuous mode [ 810.742404][T31941] device veth1_macvtap left promiscuous mode [ 812.520950][T31994] device pim6reg1 entered promiscuous mode [ 812.984772][T32009] device sit0 entered promiscuous mode [ 813.019469][T32006] device wg2 left promiscuous mode [ 814.613367][T32085] device pim6reg1 entered promiscuous mode [ 815.428313][T32146] device pim6reg1 entered promiscuous mode [ 816.268583][T32195] syz.1.8906[32195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 816.268657][T32195] syz.1.8906[32195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 817.110620][T32236] device wg2 entered promiscuous mode [ 817.607433][T32265] device veth1_macvtap entered promiscuous mode [ 817.630577][T32265] device macsec0 entered promiscuous mode [ 817.784919][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 818.146391][T32302] device veth0_vlan left promiscuous mode [ 818.157147][T32302] device veth0_vlan entered promiscuous mode [ 818.194149][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 818.209183][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 818.260897][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 818.341283][T32311] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 818.347651][T32311] syzkaller0: linktype set to 1 [ 818.796715][T32323] device veth1_macvtap left promiscuous mode [ 818.937409][T32327] device wg2 entered promiscuous mode [ 819.261121][T32342] device sit0 left promiscuous mode [ 819.461226][T32351] device pim6reg1 entered promiscuous mode [ 820.218385][T32371] device sit0 left promiscuous mode [ 820.311985][T32371] device sit0 entered promiscuous mode [ 821.361585][T32418] device syzkaller0 entered promiscuous mode [ 821.761836][T32438] device wg2 entered promiscuous mode [ 821.949482][T32421] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.956761][T32421] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.964307][T32421] device bridge_slave_0 entered promiscuous mode [ 821.980649][T32421] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.990660][T32421] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.002977][T32421] device bridge_slave_1 entered promiscuous mode [ 822.020757][T32460] device sit0 left promiscuous mode [ 822.088083][T32461] device sit0 entered promiscuous mode [ 822.241071][T32421] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.249127][T32421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.256851][T32421] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.264673][T32421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.349227][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.385320][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.727078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 822.746314][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 822.820070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 822.830730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 822.839646][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.847788][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.024238][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 823.034563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.043742][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.051019][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.121818][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 823.132099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 823.188625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 823.197366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 823.376544][T32421] device veth0_vlan entered promiscuous mode [ 823.393906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 823.410819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 823.441425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 823.450759][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 823.465256][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 823.473912][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 823.508429][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 823.520742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 823.540979][T32421] device veth1_macvtap entered promiscuous mode [ 823.553048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 823.561943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 823.572218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 823.603400][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 823.671685][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 823.704793][ T48] device veth1 left promiscuous mode [ 823.710580][ T48] kfree: port 1(veth1) entered disabled state [ 824.214746][T32548] device pim6reg1 entered promiscuous mode [ 825.181314][T32595] device pim6reg1 entered promiscuous mode [ 825.618232][T32603] device pim6reg1 entered promiscuous mode [ 826.056734][T32626] device pim6reg1 entered promiscuous mode [ 826.276584][T32632] device pim6reg1 entered promiscuous mode [ 827.258169][T32679] device pim6reg1 entered promiscuous mode [ 827.609396][T32697] syz.1.9041[32697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.609480][T32697] syz.1.9041[32697] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.196945][T32714] device pim6reg1 entered promiscuous mode [ 828.638635][T32739] device pim6reg1 entered promiscuous mode [ 828.699217][T32744] 7B’ç÷ï: renamed from syzkaller0 [ 828.826637][T32749] device wg2 left promiscuous mode [ 829.262844][ T305] device pim6reg1 entered promiscuous mode [ 829.529917][ T315] device pim6reg1 entered promiscuous mode [ 830.463291][ T464] device pim6reg1 entered promiscuous mode [ 831.361105][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 831.400571][ T476] bridge0: port 1(bridge_slave_0) entered disabled state [ 831.409049][ T476] device bridge_slave_0 entered promiscuous mode [ 831.438771][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 831.450392][ T476] bridge0: port 2(bridge_slave_1) entered disabled state [ 831.458389][ T476] device bridge_slave_1 entered promiscuous mode [ 831.629773][ T514] device pim6reg1 entered promiscuous mode [ 831.764114][ T516] device sit0 left promiscuous mode [ 831.995199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 832.003098][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 832.124330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 832.135085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 832.145003][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.152263][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.160578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 832.324951][ T476] device veth0_vlan entered promiscuous mode [ 832.338795][ T476] device veth1_macvtap entered promiscuous mode [ 832.358388][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 832.391366][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 832.410102][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 832.417480][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 832.434902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 832.450820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 832.459135][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 832.468458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 832.477169][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 832.486911][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 832.496223][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 832.504636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 832.513290][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 832.521947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 832.530092][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 832.538044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 832.546576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 832.555757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 832.564349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 832.573257][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 832.581042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 832.723251][ T537] device pim6reg1 entered promiscuous mode [ 834.081477][ T563] device pim6reg1 entered promiscuous mode [ 834.409632][ T48] device vlan0 left promiscuous mode [ 834.433750][ T48] : port 1(vlan0) entered disabled state [ 834.462982][ T48] device bridge_slave_1 left promiscuous mode [ 834.469208][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.492510][ T48] device bridge_slave_0 left promiscuous mode [ 834.498811][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.509984][ T48] device veth0_vlan left promiscuous mode [ 834.692950][ T622] device pim6reg1 entered promiscuous mode [ 835.465388][ T662] syz.3.9127[662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.465489][ T662] syz.3.9127[662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 839.610137][ T802] device veth0_vlan left promiscuous mode [ 839.634381][ T802] device veth0_vlan entered promiscuous mode [ 839.656640][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 839.678548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 839.725656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 840.322396][ T817] device wg2 entered promiscuous mode [ 840.763757][ T834] device syzkaller0 entered promiscuous mode [ 842.105477][ T894] device veth0_vlan left promiscuous mode [ 842.151549][ T894] device veth0_vlan entered promiscuous mode [ 842.186299][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 842.201535][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 842.235423][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 842.333745][ T903] device pim6reg1 entered promiscuous mode [ 842.859887][ T943] device pim6reg1 entered promiscuous mode [ 844.668334][ T1018] device wg2 entered promiscuous mode [ 844.894468][ T1031] device veth1_macvtap left promiscuous mode [ 845.286345][ T1041] device pim6reg1 entered promiscuous mode [ 845.966997][ T1072] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.988604][ T1072] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.020779][ T1072] device bridge_slave_0 entered promiscuous mode [ 846.672054][ T48] device veth0 left promiscuous mode [ 846.677719][ T48] bridge0: port 3(veth0) entered disabled state [ 846.730867][ T48] device bridge_slave_1 left promiscuous mode [ 846.737213][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.800829][ T48] device bridge_slave_0 left promiscuous mode [ 846.807390][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.882248][ T48] device veth1_macvtap left promiscuous mode [ 846.888576][ T48] device veth0_vlan left promiscuous mode [ 847.061185][ T1072] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.068607][ T1072] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.076923][ T1072] device bridge_slave_1 entered promiscuous mode [ 847.087863][ T1110] device pim6reg1 entered promiscuous mode [ 847.235331][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 847.245767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 847.297649][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 847.314867][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 847.335125][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.342647][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 847.412515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 847.457551][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 847.501454][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.508897][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 847.597052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 847.617800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 847.642306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 847.685093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 847.694213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 847.703427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 847.746322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 847.800133][ T1072] device veth0_vlan entered promiscuous mode [ 847.826800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 847.835916][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 847.956414][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 847.970002][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 847.984738][ T1072] device veth1_macvtap entered promiscuous mode [ 848.039923][ T1161] device pim6reg1 entered promiscuous mode [ 848.075718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.085879][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 848.097775][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.173997][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.184794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 848.581201][ T1191] device wg2 left promiscuous mode [ 848.633203][ T1191] device wg2 entered promiscuous mode [ 850.407604][ T1285] device syzkaller0 entered promiscuous mode [ 851.515906][ T1326] device pim6reg1 entered promiscuous mode [ 852.186110][ T1365] device pim6reg1 entered promiscuous mode [ 853.030426][ T1414] device pim6reg1 entered promiscuous mode [ 853.144092][ T1428] syz.4.9339[1428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 853.144166][ T1428] syz.4.9339[1428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 853.529688][ T1444] device sit0 entered promiscuous mode [ 855.327604][ T1516] device pim6reg1 entered promiscuous mode [ 855.658085][ T1522] device pim6reg1 entered promiscuous mode [ 855.676004][ T1520] device pim6reg1 entered promiscuous mode [ 856.095362][ T1555] device pim6reg1 entered promiscuous mode [ 856.209314][ T1563] syz.1.9380[1563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.209392][ T1563] syz.1.9380[1563] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.247209][ T1563] -1: renamed from syzkaller0 [ 856.474111][ T1578] syz.1.9383[1578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.474219][ T1578] syz.1.9383[1578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.805670][ T1586] device sit0 left promiscuous mode [ 857.071695][ T1615] device pim6reg1 entered promiscuous mode [ 857.404281][ T1633] device wg2 entered promiscuous mode [ 857.544185][ T1640] device pim6reg1 entered promiscuous mode [ 857.806177][ T1652] device sit0 entered promiscuous mode [ 858.586300][ T1671] ref_ctr_offset mismatch. inode: 0x1dc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 858.775781][ T1671] GPL: port 1(erspan0) entered blocking state [ 858.800474][ T1671] GPL: port 1(erspan0) entered disabled state [ 858.828008][ T1671] device erspan0 entered promiscuous mode [ 858.869369][ T1675] GPL: port 1(erspan0) entered blocking state [ 858.875674][ T1675] GPL: port 1(erspan0) entered forwarding state [ 859.625587][ T1738] device pim6reg1 entered promiscuous mode [ 861.641627][ T1785] device pim6reg1 entered promiscuous mode [ 862.416138][ T1826] device veth0_vlan left promiscuous mode [ 862.448749][ T1826] device veth0_vlan entered promiscuous mode [ 862.555126][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 862.586011][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 862.642462][T24104] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 864.500066][ T1913] device sit0 left promiscuous mode [ 864.617137][ T1913] device sit0 entered promiscuous mode [ 865.118354][ T1955] device pim6reg1 entered promiscuous mode [ 865.507724][ T1968] device pim6reg1 entered promiscuous mode [ 866.269650][ T1996] device veth0_vlan left promiscuous mode [ 866.305610][ T1996] device veth0_vlan entered promiscuous mode [ 866.448827][ T2002] device wg2 left promiscuous mode [ 866.511769][ T2005] device pim6reg1 entered promiscuous mode [ 866.569131][ T2002] device wg2 entered promiscuous mode [ 866.738490][ T2009] bridge0: port 3(veth0) entered blocking state [ 866.756861][ T2009] bridge0: port 3(veth0) entered disabled state [ 866.768995][ T2009] device veth0 entered promiscuous mode [ 866.777804][ T2009] bridge0: port 3(veth0) entered blocking state [ 866.784327][ T2009] bridge0: port 3(veth0) entered forwarding state [ 866.796759][ T2013] device veth0 left promiscuous mode [ 866.821510][ T2013] bridge0: port 3(veth0) entered disabled state [ 867.071929][ T2046] device pim6reg1 entered promiscuous mode [ 867.187446][ T2048] device wg2 left promiscuous mode [ 867.307374][ T2056] device sit0 entered promiscuous mode [ 867.473228][ T2048] device wg2 entered promiscuous mode [ 867.529819][ T2059] device veth0_vlan left promiscuous mode [ 867.593902][ T2059] device veth0_vlan entered promiscuous mode [ 868.137825][ T2079] ªªªªªª: renamed from vlan0 [ 868.308924][ T2091] device pim6reg1 entered promiscuous mode [ 868.481541][ T2103] device wg2 left promiscuous mode [ 868.522244][ T2105] device pim6reg1 entered promiscuous mode [ 868.613972][ T2103] device wg2 entered promiscuous mode [ 868.778564][ T2116] device syzkaller0 entered promiscuous mode [ 868.896828][ T2129] device veth0_vlan left promiscuous mode [ 868.931039][ T2129] device veth0_vlan entered promiscuous mode [ 868.999499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 869.015140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 869.033483][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 869.078394][ T2138] device pim6reg1 entered promiscuous mode [ 869.096439][ T2141] device pim6reg1 entered promiscuous mode [ 869.136557][ T2143] device sit0 left promiscuous mode [ 869.383260][ T2146] bridge0: port 2(bridge_slave_1) entered disabled state [ 869.391767][ T2146] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.273948][ T2183] device veth1_macvtap left promiscuous mode [ 870.384263][ T2199] device pim6reg1 entered promiscuous mode [ 870.512379][ T2198] device pim6reg1 entered promiscuous mode [ 870.738026][ T2208] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.746826][ T2208] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.334729][ T2238] device pim6reg1 entered promiscuous mode [ 871.350211][ T2239] device syzkaller0 entered promiscuous mode [ 871.561139][ T2248] device pim6reg1 entered promiscuous mode [ 872.236733][ T2263] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.472130][ T2280] device pim6reg1 entered promiscuous mode [ 872.672144][ T2288] device wg2 left promiscuous mode [ 872.903209][ T2288] device wg2 entered promiscuous mode [ 872.976144][ T2300] device pim6reg1 entered promiscuous mode [ 873.217986][ T2308] device sit0 left promiscuous mode [ 873.476762][ T2325] device pim6reg1 entered promiscuous mode [ 873.644286][ T2327] device sit0 entered promiscuous mode [ 873.740127][ T2334] syz.0.9591[2334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.740204][ T2334] syz.0.9591[2334] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 873.962526][ T2334] device wg2 left promiscuous mode [ 874.746852][ T2387] device pim6reg1 entered promiscuous mode [ 875.599827][ T2408] device wg2 left promiscuous mode [ 875.669754][ T2402] device wg2 entered promiscuous mode [ 875.807086][ T2422] device pim6reg1 entered promiscuous mode [ 875.968215][ T2430] Â: renamed from pim6reg1 [ 876.866592][ T2484] device syzkaller0 entered promiscuous mode [ 877.524224][ T2505] device pim6reg1 entered promiscuous mode [ 878.476799][ T2531] device pim6reg1 entered promiscuous mode [ 878.596419][ T2537] device syzkaller0 entered promiscuous mode [ 878.609697][ T2535] device pim6reg1 entered promiscuous mode [ 878.807410][ T2538] device veth0_vlan left promiscuous mode [ 878.823743][ T2538] device veth0_vlan entered promiscuous mode [ 878.964022][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 878.981116][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 878.998111][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 879.507429][ T2580] device syzkaller0 entered promiscuous mode [ 879.729487][ T2590] device pim6reg1 entered promiscuous mode [ 880.739604][ T2635] device pim6reg1 entered promiscuous mode [ 880.767208][ T1279] syzkaller0: tun_net_xmit 76 [ 880.772329][ T1279] syzkaller0: tun_net_xmit 48 [ 880.780538][ T2633] syzkaller0: create flow: hash 110479394 index 1 [ 880.790136][ T2633] syzkaller0: delete flow: hash 110479394 index 1 [ 881.327499][ T2655] device syzkaller0 entered promiscuous mode [ 881.614472][ T2674] device pim6reg1 entered promiscuous mode [ 882.164036][ T2713] device pim6reg1 entered promiscuous mode [ 882.206907][ T2714] device pim6reg1 entered promiscuous mode [ 883.010970][ T2763] device pim6reg1 entered promiscuous mode [ 884.450132][ T2812] device pim6reg1 entered promiscuous mode [ 885.171647][ T2856] device pim6reg1 entered promiscuous mode [ 885.297710][ T2861] device pim6reg1 entered promiscuous mode [ 885.585853][ T2886] device syzkaller0 entered promiscuous mode [ 903.161547][ T2904] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.169079][ T2904] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.176960][ T2904] device bridge_slave_0 entered promiscuous mode [ 903.198086][ T2904] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.205425][ T2904] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.213951][ T2904] device bridge_slave_1 entered promiscuous mode [ 903.222047][ T2903] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.229105][ T2903] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.236675][ T2903] device bridge_slave_0 entered promiscuous mode [ 903.252799][ T2905] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.260126][ T2905] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.267677][ T2905] device bridge_slave_0 entered promiscuous mode [ 903.274465][ T2903] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.281767][ T2903] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.289201][ T2903] device bridge_slave_1 entered promiscuous mode [ 903.313337][ T2905] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.320857][ T2905] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.328580][ T2905] device bridge_slave_1 entered promiscuous mode [ 903.383157][ T2907] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.391192][ T2907] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.399652][ T2907] device bridge_slave_0 entered promiscuous mode [ 903.409395][ T2907] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.416612][ T2907] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.424554][ T2907] device bridge_slave_1 entered promiscuous mode [ 903.471177][ T2906] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.478443][ T2906] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.485952][ T2906] device bridge_slave_0 entered promiscuous mode [ 903.493818][ T2906] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.501917][ T2906] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.509846][ T2906] device bridge_slave_1 entered promiscuous mode [ 903.583374][ T2903] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.590798][ T2903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.598269][ T2903] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.605797][ T2903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.634577][ T2905] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.642259][ T2905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.649665][ T2905] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.657424][ T2905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.688013][ T2904] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.695995][ T2904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.703942][ T2904] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.711461][ T2904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.746785][ T2906] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.754071][ T2906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.761863][ T2906] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.769206][ T2906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.778639][ T2907] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.785709][ T2907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.793038][ T2907] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.800102][ T2907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.813851][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 903.821906][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.829183][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.836985][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.844487][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.852794][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.860731][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.868074][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.875487][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.883163][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.891453][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.924507][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 903.933548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 903.943806][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.950970][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.959233][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 903.968510][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.976206][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.983808][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 903.992403][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.999456][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.022495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 904.030158][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 904.039790][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 904.048407][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.056505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 904.067210][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.075883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 904.084269][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 904.092041][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.100689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.109175][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.117121][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.124832][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.134154][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.142979][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.150667][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.190795][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.199984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.211558][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.218882][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.226534][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.235051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.243311][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.250604][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.258966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 904.267737][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.276842][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 904.285537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.294456][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.303947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.312527][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.320764][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.328365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 904.337182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.346129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 904.355232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.363945][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 904.371802][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 904.379591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 904.388714][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 904.398042][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 904.405761][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 904.423739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 904.432472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.442021][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 904.449819][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.458493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 904.467076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.492111][ T2905] device veth0_vlan entered promiscuous mode [ 904.507720][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.515681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.523598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.532406][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.541572][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 904.549741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.558036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.566746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.575717][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.583509][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 904.591375][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 904.599682][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.607242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.617725][ T2904] device veth0_vlan entered promiscuous mode [ 904.639107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 904.658444][ T2907] device veth0_vlan entered promiscuous mode [ 904.667499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 904.676554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.684688][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.693044][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.700774][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 904.709008][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.717875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.746554][ T2903] device veth0_vlan entered promiscuous mode [ 904.754659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 904.762716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.773594][ T2904] device veth1_macvtap entered promiscuous mode [ 904.792490][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 904.800966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 904.808388][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 904.817725][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 904.830702][ T2905] device veth1_macvtap entered promiscuous mode [ 904.855242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 904.865023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 904.878599][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 904.887554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 904.903311][ T2907] device veth1_macvtap entered promiscuous mode [ 904.915594][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 904.924500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 904.933781][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 904.943122][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 904.952521][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 904.962218][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 904.971690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 904.981295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 904.989516][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 904.998748][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 905.024037][ T2906] device veth0_vlan entered promiscuous mode [ 905.033585][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 905.041750][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 905.050216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 905.058974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 905.069532][ T2903] device veth1_macvtap entered promiscuous mode [ 905.081914][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 905.091029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 905.111388][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 905.120057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 905.132460][ T48] GPL: port 1(erspan0) entered disabled state [ 905.142792][ T48] device erspan0 left promiscuous mode [ 905.149073][ T48] GPL: port 1(erspan0) entered disabled state [ 905.165840][ T2906] device veth1_macvtap entered promiscuous mode [ 905.192196][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 905.201184][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 905.211003][ T2588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 905.227342][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 905.236515][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 905.273564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 905.283421][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 905.298676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 905.307697][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 905.331864][ T2925] device pim6reg1 entered promiscuous mode [ 905.431836][ T48] device bridge_slave_1 left promiscuous mode [ 905.438052][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.445681][ T48] device bridge_slave_0 left promiscuous mode [ 905.452489][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.461101][ T48] device bridge_slave_1 left promiscuous mode [ 905.467851][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.476167][ T48] device bridge_slave_0 left promiscuous mode [ 905.482797][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.492351][ T48] device bridge_slave_1 left promiscuous mode [ 905.498869][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.506660][ T48] device bridge_slave_0 left promiscuous mode [ 905.513377][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.521750][ T48] device bridge_slave_1 left promiscuous mode [ 905.528172][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 905.536201][ T48] device bridge_slave_0 left promiscuous mode [ 905.542545][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 905.551736][ T48] device veth1_macvtap left promiscuous mode [ 905.558124][ T48] device veth0_vlan left promiscuous mode [ 905.564347][ T48] device veth1_macvtap left promiscuous mode [ 905.570432][ T48] device veth0_vlan left promiscuous mode [ 905.576300][ T48] device veth0_vlan left promiscuous mode